UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract

Burmester, M; Desmedt, Y; Seberry, J; (1998) Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract. In: Ohta, K and Pei, D, (eds.) ADVANCES IN CRYPTOLOGY - ASIACRYPT'98. (pp. 380 - 391). SPRINGER-VERLAG BERLIN

Full text not available from this repository.

Abstract

With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.

Type:Proceedings paper
Title:Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract
Event:International Conference on the Theory and Application of Cryptology and Information Security
Location:BEIJING, PEOPLES R CHINA
Dates:1998-10-18 - 1998-10-22
ISBN:3-540-65109-8
Keywords:key escrow, auctions with closed bids, time stamps, SHARING SCHEMES, CRYPTOSYSTEMS
UCL classification:UCL > School of BEAMS > Faculty of Engineering Science > Computer Science

Archive Staff Only: edit this record