A new approach to software key escrow encryption
暂无分享,去创建一个
The major deficiency ascribed to key escrow techniques when they are implemented solely in software is that they can be bypassed or subverted relatively easily and thus cannot be relied upon to meet the objectives of law enforcement that motivate the Clipper Initiative. Further, no technique has been proposed that addresses the issues associated with the implementation of a classified encyption algorithm, such as the Skipjack algorithm embodied in the Clipper chip, in a widely used software product.
[1] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[2] S. Micali. Fair cryptosystems , 1994 .
[3] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.