Abstract
Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.
Original language | English |
---|---|
Title of host publication | Information Security - 2nd International Workshop, ISW 1999, Proceedings |
Editors | Masahiro Mambo, Yuliang Zheng |
Publisher | Springer Verlag |
Pages | 207-224 |
Number of pages | 18 |
ISBN (Print) | 3540666958, 9783540666950 |
DOIs | |
Publication status | Published - 1999 |
Externally published | Yes |
Event | 2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia Duration: 1999 Nov 6 → 1999 Nov 7 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1729 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 2nd International Information Security Workshop, ISW 1999 |
---|---|
Country/Territory | Malaysia |
City | Kuala Lumpur |
Period | 99/11/6 → 99/11/7 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 1999.
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science