Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,480,000 papers from all fields of science
Search
Sign In
Create Free Account
Key escrow
Known as:
Escrowed encryption
, Fair cryptosystem
, Key recovery
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
BitLocker
Capstone (cryptography)
Certificate policy
Certificateless cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Measuring small subgroup attacks against Diffie-Hellman
Luke Valenta
,
David Adrian
,
+5 authors
N. Heninger
Network and Distributed System Security Symposium
2017
Corpus ID: 14832504
Several recent standards, including NIST SP 80056A and RFC 5114, advocate the use of “DSA” parameters for Diffie-Hellman key…
Expand
2015
2015
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On
,
Itai Dinur
,
O. Dunkelman
,
Virginie Lallemand
,
Nathan Keller
,
B. Tsaban
International Conference on the Theory and…
2015
Corpus ID: 15982959
Design of SP networks in which the non-linear layer is applied to only a part of the state in each round was suggested by Gerard…
Expand
2012
2012
Accountable authority key policy attribute-based encryption
Yongtao Wang
,
Kefei Chen
,
Yu Long
,
Zhaohui Liu
Science China Information Sciences
2012
Corpus ID: 3617068
We present an accountable authority key policy attribute-based encryption (A-KPABE) scheme. In this paper, we extend Goyal’s work…
Expand
2012
2012
Key Escrow Scheme with the Cooperation Mechanism of Multiple Escrow Agents
Q. Fan
,
Mingjiang Zhang
,
Yue Zhang
2012
Corpus ID: 111021111
To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal…
Expand
2010
2010
Provable Partial Key Escrow
Hongwei Li
,
A. Dhawan
2010
Corpus ID: 59901650
In this paper, we propose a routing scheme, called MOSAR, which is able to handle the security classification of packets during…
Expand
2005
2005
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
T. Okamoto
,
R. Tso
,
E. Okamoto
Modeling Decisions for Artificial Intelligence
2005
Corpus ID: 40646012
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this…
Expand
2000
2000
Partial Key Escrow Monitoring Scheme
Jiang Shao
2000
Corpus ID: 204068860
During (partial) key escrow, monitoring is a vital phase. So how to monitor a user safely and efficiently is a very important…
Expand
1997
1997
Democratic Key Escrow Scheme
Chor Wah Man
,
R. Safavi-Naini
Australasian Conference on Information Security…
1997
Corpus ID: 10763059
Recently, key escrow schemes have been the topic of much debate and confusion. On the one hand, cryptography allows privacy of…
Expand
1996
1996
Key Escrow in Mutually Mistrusting Domains
Liqun Chen
,
D. Gollmann
,
C. Mitchell
Security Protocols Workshop
1996
Corpus ID: 6048570
In this paper we present a key escrow system which meets possible requirements for international key escrow, where different…
Expand
1994
1994
Failsafe Key Escrow Systems (Extended Abstract)
T. Leighton
1994
Corpus ID: 18382958
This paper describes a method for escrowing cryptographic keys, which w e call Failsafe Key Escrow FKE. The method is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required