Toward Fair International Key Escrow

We consider key escrow system for international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal.We solve this problem by incorporating a mechanism that allows message interception by law enforcement parties subject to the consent of both governments involved in the communication. That mechanism involves the establishment of an independent International Trusted Third Party (ITTP) that has the ultimate authority to check of the security policies of each country and permit or deny the interception of international messages. We present a scheme with multiple Diffie-Hellman type key distribution protocoland the ITTP copes with only the secret-key corresponding to its own public-key. We can also make the ITTP "multiple", and we apply recent developed techniques on distributed (threshold) cryptography to our multiple ITTPs. Thus, the establishment and control of an international trusted third party can done with incorporating by each governments.

[1]  Jennifer Seberry,et al.  Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.

[2]  Dieter Gollmann,et al.  Key Escrow in Mutually Mistrusting Domains , 1996, Security Protocols Workshop.

[3]  Henri Cohen,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[4]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[5]  Peter Winkler,et al.  A Key Escrow System with Warrant Bounds , 1995, CRYPTO.

[6]  Moti Yung,et al.  Distributed Public Key Cryptosystems , 1998, Public Key Cryptography.

[7]  Reihaneh Safavi-Naini,et al.  Democratic Key Escrow Scheme , 1997, ACISP.

[8]  Moti Yung,et al.  Escrow Encryption Systems Visited: Attacks, Analysis and Designs , 1995, CRYPTO.

[9]  Chris J. Mitchell,et al.  A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.

[10]  Peter G. Neumann,et al.  The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..

[11]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[12]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[13]  Dorothy E. Denning,et al.  A taxonomy for key recovery encryption systems , 1997 .

[14]  Dorothy E. Denning,et al.  A taxonomy for key escrow encryption systems , 1996, CACM.

[15]  Eric R. Verheul,et al.  Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals , 1997, EUROCRYPT.

[16]  Mihir Bellare,et al.  Verifiable partial key escrow , 1997, CCS '97.

[17]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Moti Yung,et al.  Auto-recoverable Auto-certifiable Cryptosystems (A Survey) , 1999, CQRE.

[20]  Matthew K. Franklin,et al.  Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.

[21]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[22]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[23]  Moti Yung,et al.  Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy , 1999, Public Key Cryptography.

[24]  Robert H. Deng,et al.  Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow , 1997, ACISP.

[25]  Silvio Micali,et al.  Fair Public-Key Cryptosystems , 1992, CRYPTO.

[26]  Moti Yung,et al.  Robust efficient distributed RSA-key generation , 1998, STOC '98.

[27]  Walter Fumy,et al.  Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.

[28]  Gustavus J. Simmons,et al.  A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.

[29]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[30]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[31]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[32]  Joe Kilian,et al.  Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract) , 1995, CRYPTO.

[33]  Yvo Desmedt Treshold Cryptosystems (invited talk) , 1992, AUSCRYPT.

[34]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[35]  Ernest F. Brickell,et al.  SKIPJACK review: interim report , 1995 .