Abstract
This paper focuses a key escrow system of the RSA cryptosystem that protects user privacy with the following properties; (1) neither investigation agency nor key escrow agent accesses private key of user directly, (2) investigation agency can decrypt user data of restricted time period and communication entities, and (3) split private keys of user are deposited correctly in multiple key escrow agents without any information leakage of the private key with help of a zero-knowledge interactive protocol. The security of the whole system is discussed as well as the performance of the zero-knowledge interactive protocol.
Preview
Unable to display preview. Download preview PDF.
References
C.Boyd, “Some Applications of Multiple Key Ciphers,” Advances in Cryptology: Proceedings of Crypto 88, Springer-Verlag, pp. 455–467 (1989)
W.Diffie and M.Hellman, “New Directions in Cryptography,” IEEE Transactions of Information Theory, 22 pp. 644–654 (1976)
R.ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, 31, pp.469–472 (1985)
A.Fiat and A.Shamir, “How To Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology: Proceedings of Crypto 86, Springer-Verlag, pp. 186–194 (1987)
A.K.Lenstra, P.Winkler and Y.Yacobi, “A Key Escrow System with Warrant Bounds,” Advances in Cryptology: Proceedings of CRYPTO'95, Springer-Verlag, pp. 197–207 (1995)
S.Micali, “Fair Public-Key Cryptosystems,” Advances in Cryptology: Proceedings of CRYPTO'92, Springer-Verlag, pp. 113–138 (1992)
OrganizationforEconomicCo-operationandDevelopment, “OECD Adopts Guidelines for Cryptography Policy,” (http://www.oecd.org/newsand-events/release/nw97-24a.htm) (March 1997)
R.L.Rivest, A.Shamir and L.Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of ACM, 21, pp. 120–126 (1978)
B.Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc. (1996)
I.Taylor (MBE MP Minister for Science & Technology), “Licensing of Trusted Third Parties for the Provision of Encryption Services,” Public Consultation Paper on Detailed Proposals for Legislation (http://dtiinfo1.dti.gov.uk/pubs/) (March 1997)
The White House, Office of the Press Secretary, “Statement by the Press Secretary,” (http://www.eff.org/pub/Privacy/Key-escrow/Clipper/Clipper-II/Clipper /Key-esc:row/CIipl>er_Capstone_EES-I'essera Skipjack/wh_c.ryl)to-original.attnouoce) (16th April 1993)
Y.Yamane and K.Sakurai, “How to restrict investigators' tapping in Key Escrow Systems,” (in Japanese) The 1996 Symposium on Cryptography and Information Security 7C, The Institute of Electronics, Information and Communication Engineers (January 1996)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sameshima, Y. (1998). A key escrow system of the RSA cryptosystem. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030416
Download citation
DOI: https://doi.org/10.1007/BFb0030416
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64382-1
Online ISBN: 978-3-540-69767-1
eBook Packages: Springer Book Archive