Skip to search formSkip to main contentSkip to account menu

Key escrow

Known as: Escrowed encryption, Fair cryptosystem, Key recovery 
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Several recent standards, including NIST SP 80056A and RFC 5114, advocate the use of “DSA” parameters for Diffie-Hellman key… 
2015
2015
Design of SP networks in which the non-linear layer is applied to only a part of the state in each round was suggested by Gerard… 
2012
2012
We present an accountable authority key policy attribute-based encryption (A-KPABE) scheme. In this paper, we extend Goyal’s work… 
2012
2012
To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal… 
2010
2010
In this paper, we propose a routing scheme, called MOSAR, which is able to handle the security classification of packets during… 
2005
2005
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this… 
2000
2000
During (partial) key escrow, monitoring is a vital phase. So how to monitor a user safely and efficiently is a very important… 
1997
1997
Recently, key escrow schemes have been the topic of much debate and confusion. On the one hand, cryptography allows privacy of… 
1996
1996
In this paper we present a key escrow system which meets possible requirements for international key escrow, where different… 
1994
1994
This paper describes a method for escrowing cryptographic keys, which w e call Failsafe Key Escrow FKE. The method is…