Key Recovery System for the Commercial Environment

We propose an efficient, scalable, flexible key recovery solution for use in commercial environments. Our scheme takes a new approach in the design of key recovery systems, called hybrid key escrow. We shall demonstrate the claims by comparing the computation and communication requirements for our proposal with the key recovery solution implemented by IBM.

[1]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[2]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[3]  Jacques Stern,et al.  Recovering keys in open networks , 1999, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).

[4]  Chris J. Mitchell,et al.  A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.

[5]  David Safford,et al.  Two-phase cryptographic key recovery system , 1997, Comput. Secur..

[6]  Colin Boyd Enforcing traceability in software , 1997, ICICS.

[7]  Birgit Pfitzmann,et al.  How to break fraud-detectable key recovery , 1998, OPSR.

[8]  Lars R. Knudsen,et al.  In Search of Multiple Domain Key Recovery , 1998, J. Comput. Secur..

[9]  Eric R. Verheul,et al.  Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals , 1997, EUROCRYPT.

[10]  Lars R. Knudsen,et al.  On the Difficulty of Software Key Escrow , 1996, EUROCRYPT.

[11]  Dorothy E. Denning,et al.  A taxonomy for key escrow encryption systems , 1996, CACM.

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  Walter Fumy,et al.  Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.