Cryptography, trusted third parties and escrow

被引:17
|
作者
Phoenix, SJD
机构
来源
BT TECHNOLOGY JOURNAL | 1997年 / 15卷 / 02期
关键词
D O I
10.1023/A:1018680606917
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The promise of tomorrow's electronic business environment will not be fully realised unless government, business and consumers have a high level of confidence in the security of that environment. The use of cryptography can provide this confidence and facilitate the establishment of a global electronic market-place. Cryptographic techniques offer a range of services including confidentiality, authenticity, integrity and anonymity. We examine some of these techniques and explain why a trusted third party infrastructure is seen as a crucial component in the successful introduction of an electronic business arena. The widespread use of cryptography, however, also presents possible new opportunities for criminal activity. To mitigate against this many governments have proposed the provision of escrowed cryptographic services - We review a particular scheme favoured by the UK government.
引用
收藏
页码:45 / 62
页数:18
相关论文
共 50 条
  • [41] DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
    Fournaris, Apostolos P.
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 400 - 404
  • [42] Authentication of Parties in Piggy Bank Cryptography
    Prashanth, Busireddygari
    Subhash, Kak
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1389 - 1393
  • [43] A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties
    Hao, Liming
    Lu, Songnian
    Tang, Junhua
    Zhang, Aixin
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [44] A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
    Dinh, Trung
    Steinfeld, Ron
    Bhattacharjee, Nandita
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 297 - 319
  • [45] Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain
    Goharshady, Amir Kafshdar
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 73 - 81
  • [46] Reputation Scoring System Using an Economic Trust Model A distributed approach to evaluate trusted third parties on the Internet
    Vyshegorodtsev, Marat
    Miyamoto, Daisuke
    Wakahara, Yasushi
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 730 - 737
  • [47] Reinforcement Learning Toward Decision-Making for Multiple Trusted-Third-Parties in PUF-Cash
    Fragkos, Georgios
    Minwalla, Cyrus
    Plusquellic, Jim
    Tsiropoulou, Eirini Eleni
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [48] A Secure Exam Protocol Without Trusted Parties
    Bella, Giampaolo
    Giustolisi, Rosario
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 495 - 509
  • [49] Archiving with a trusted third party
    Fenton, EG
    CHARLESTON CONFERENCE PROCEEDINGS 2003, 2004, : 81 - 82
  • [50] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
    Wang, Zhen
    Ma, Zhaofeng
    Luo, Shoushan
    Gao, Hongmin
    IEEE ACCESS, 2019, 7 : 149080 - 149096