The Yaksha security system

emerging information infrastructure, it is impor tan t that we look for similar flexibility. The Yaksha security system is a security technology [4, 5] capable of reusing a single security infrastructure to pe r fo rm various security f u n c t i o n s a u t h e n t i c a t i o n , key cooperat ion of the participants. Clearly, encrypting information being communica ted or stored could put the third parties at a significant disadvantage. Techniques for providing secure communicat ions and storage with intentional backdoors that allow exchange, digital signatures, and key escrow. This legitimate third parties access to the information fall article describes how the Yaksha security system can be used for key escrow. It is commonly accepted that encrypted communications and data storage make up an essential componen t of our emerging information infrastructure. into the broad category of what may be described as key escrow systems• T h r o u g h o u t this article, we use the te rm authority synonymously with legitimate third party. When the authority is the government and the participants are citizens, the entire concept is fairly controSomewhat more controversial is the concept that cerversial, as has been well documented in the pages of this tain third pa r t i e smother than those communica t ing or storing informat ion---may have a legitimate right.to seek access to the information without the active magazine [12] and other publications. In this context, the system that dominates the discussion is the so-called Escrow Encrypuon Standard or Clipper System [3]. An