Burmester, M; Desmedt, Y; Seberry, J; (1998) Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract. In: Ohta, K and Pei, D, (eds.) ADVANCES IN CRYPTOLOGY - ASIACRYPT'98. (pp. 380 - 391). SPRINGER-VERLAG BERLIN
Full text not available from this repository.
With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.
|Title:||Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract|
|Event:||International Conference on the Theory and Application of Cryptology and Information Security|
|Location:||BEIJING, PEOPLES R CHINA|
|Dates:||1998-10-18 - 1998-10-22|
|Keywords:||key escrow, auctions with closed bids, time stamps, SHARING SCHEMES, CRYPTOSYSTEMS|
|UCL classification:||UCL > School of BEAMS > Faculty of Engineering Science > Computer Science|
Archive Staff Only: edit this record