Cryptography, trusted third parties and escrow

被引:17
|
作者
Phoenix, SJD
机构
来源
BT TECHNOLOGY JOURNAL | 1997年 / 15卷 / 02期
关键词
D O I
10.1023/A:1018680606917
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The promise of tomorrow's electronic business environment will not be fully realised unless government, business and consumers have a high level of confidence in the security of that environment. The use of cryptography can provide this confidence and facilitate the establishment of a global electronic market-place. Cryptographic techniques offer a range of services including confidentiality, authenticity, integrity and anonymity. We examine some of these techniques and explain why a trusted third party infrastructure is seen as a crucial component in the successful introduction of an electronic business arena. The widespread use of cryptography, however, also presents possible new opportunities for criminal activity. To mitigate against this many governments have proposed the provision of escrowed cryptographic services - We review a particular scheme favoured by the UK government.
引用
收藏
页码:45 / 62
页数:18
相关论文
共 50 条
  • [1] Cryptography, trusted third parties and escrow
    York University, Canada
    不详
    不详
    不详
    British Telecom technology journal, 1997, 15 (02): : 45 - 61
  • [2] Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third Parties
    Meng, Hongwei
    Bian, Evan
    Tang, Cong
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 266 - 271
  • [3] Hope or hype: On the viability of escrow services as trusted third parties in online auction environments
    Hu, XR
    Lin, ZX
    Whinston, AB
    Zhang, H
    INFORMATION SYSTEMS RESEARCH, 2004, 15 (03) : 236 - 249
  • [4] Toward fair international key escrow - An attempt by distributed trusted third agencies with threshold cryptography
    Miyazaki, S
    Kuroda, I
    Sakurai, K
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 171 - 187
  • [5] Trusted computing, trusted third parties, and verified communications
    Abadi, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
  • [6] Authentication, Identification and Trusted Third Parties
    Arnaud, Michel
    HERMES, 2009, (53): : 129 - +
  • [7] Trusted third parties and security infrastructures
    Cerny, D
    Pohl, H
    WIRTSCHAFTSINFORMATIK, 1997, 39 (06): : 616 - 622
  • [8] Trusted third parties in electronic commerce
    Skevington, PJ
    Hart, TP
    BT TECHNOLOGY JOURNAL, 1997, 15 (02): : 39 - 44
  • [9] Licensing of trusted third parties providing encryption services
    Database and Network Journal, 1998, 28 (04):
  • [10] Trusted third parties for secure electronic commerce - Are they needed?
    Piper, F
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 1 - 1