@inproceedings{966e66335e6b4dfaaad6c39a671947be,
title = "On the difficulty of key recovery systems",
abstract = "Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.",
author = "Seungjoo Kim and Insoo Lee and Masahiro Mambo and Sungjun Park",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1999.; 2nd International Information Security Workshop, ISW 1999 ; Conference date: 06-11-1999 Through 07-11-1999",
year = "1999",
doi = "10.1007/3-540-47790-x_18",
language = "English",
isbn = "3540666958",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "207--224",
editor = "Masahiro Mambo and Yuliang Zheng",
booktitle = "Information Security - 2nd International Workshop, ISW 1999, Proceedings",
}