Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key escrow

Known as: Escrowed encryption, Fair cryptosystem, Key recovery 
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
  • S. Chow
  • Public Key Cryptography
  • 2009
  • Corpus ID: 12624271
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user's… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting… Expand
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This… Expand
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 8.1
  • figure 8.2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A variety of \key recovery," \key escrow," and \trusted third-party" encryption requirements have been suggested in recent years… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
One of the main objections to existing proposals for key escrow is that the individual’s privacy relies on too high a level of… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis. The architecture… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand
Is this relevant?