Toward fair international key escrow - An attempt by distributed trusted third agencies with threshold cryptography

被引:0
|
作者
Miyazaki, S
Kuroda, I
Sakurai, K
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Higashi Ku, Fukuoka 8128581, Japan
[2] NTT, Human Interface Labs, Project Team 4, Yokosuka, Kanagawa 2390847, Japan
[3] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
来源
PUBLIC KEY CRYPTOGRAPHY | 1999年 / 1560卷
关键词
key escrow/recovery system; Diffie-Hellman key distribution; Trusted Third Party; distributed cryptography; security policy;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider key escrow system far international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal. We solve this problem by incorporating a mechanism that allows message interception by law enforcement parties subject to the consent of both governments involved in the communication. That mechanism involves the establishment of an independent International Trusted Third Party (ITTP) that has the ultimate authority to check of the security policies of each country and permit or deny the interception of international messages. We present a scheme with multiple Diffie-Hellman type key distribution protocoland the ITTP copes with only the secret-key corresponding to its own public-key. We can also make the ITTP "multiple", and we apply recent developed techniques on distributed (threshold) cryptography to our multiple ITTPs. Thus, the establishment and control of an international trusted third party can done with incorporating by each governments.
引用
收藏
页码:171 / 187
页数:17
相关论文
共 7 条
  • [1] Cryptography, trusted third parties and escrow
    York University, Canada
    不详
    不详
    不详
    British Telecom technology journal, 1997, 15 (02): : 45 - 61
  • [2] Cryptography, trusted third parties and escrow
    Phoenix, SJD
    BT TECHNOLOGY JOURNAL, 1997, 15 (02): : 45 - 62
  • [3] DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
    Fournaris, Apostolos P.
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 400 - 404
  • [4] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
    Wang, Zhen
    Ma, Zhaofeng
    Luo, Shoushan
    Gao, Hongmin
    IEEE ACCESS, 2019, 7 : 149080 - 149096
  • [5] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [6] A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
    Hanka, Oliver
    Eichhorn, Michael
    Pfannenstein, Martin
    Eberspaecher, Joerg
    Steinbach, Eckehard
    FUTURE INTERNET, 2011, 3 (01): : 14 - 30
  • [7] Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
    Ahn, Jongmin
    Kwon, Hee-Yong
    Ahn, Bohyun
    Park, Kyuchan
    Kim, Taesic
    Lee, Mun-Kyu
    Kim, Jinsan
    Chung, Jaehak
    ENERGIES, 2022, 15 (03)