作者: Adam Lucas Young , Marcel Mordechay Yung
DOI:
关键词:
摘要: A method is provided for an escrow cryptosystem that overhead-free, does not require a cryptographic tamper-proof hardware implementation (i.e., can be done in software), publicly verifiable, and cannot used subliminally to enable shadow public key system. system unescrowed displayed covert fashion. The generated by the are auto-recoverable auto-certifiable (abbrev. ARC). ARC Cryptosystem based on generation mechanism outputs public/private pair, certificate of proof was according algorithm. Each pair verified efficiently escrowed properly anyone. verification procedure use private key. Hence, general has efficient way making sure any given individual's properly, trusted authorities will able access if needed. Since performed anyone, there no need special entity, known art as “trusted third party”. overhead free since additional protocol interaction between user who generates his or her own key, certification authority authorities, comparison what required submit itself regular certified systems. Furthermore, designed so its internals made scrutinizable (e.g., it distributed source code form). This differs from many schemes which escrowing device hardware.