On the difficulty of key recovery systems

Seung-Joo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages207-224
Number of pages18
Volume1729
ISBN (Print)3540666958, 9783540666950
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia
Duration: 1999 Nov 61999 Nov 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1729
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Information Security Workshop, ISW 1999
CountryMalaysia
CityKuala Lumpur
Period99/11/699/11/7

Fingerprint

Key Recovery
Cryptography
Recovery
Privacy
Review

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Kim, S-J., Lee, I., Mambo, M., & Park, S. (1999). On the difficulty of key recovery systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 207-224). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729). Springer Verlag.

On the difficulty of key recovery systems. / Kim, Seung-Joo; Lee, Insoo; Mambo, Masahiro; Park, Sungjun.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729 Springer Verlag, 1999. p. 207-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S-J, Lee, I, Mambo, M & Park, S 1999, On the difficulty of key recovery systems. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 1729, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1729, Springer Verlag, pp. 207-224, 2nd International Information Security Workshop, ISW 1999, Kuala Lumpur, Malaysia, 99/11/6.
Kim S-J, Lee I, Mambo M, Park S. On the difficulty of key recovery systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729. Springer Verlag. 1999. p. 207-224. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Kim, Seung-Joo ; Lee, Insoo ; Mambo, Masahiro ; Park, Sungjun. / On the difficulty of key recovery systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729 Springer Verlag, 1999. pp. 207-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{966e66335e6b4dfaaad6c39a671947be,
title = "On the difficulty of key recovery systems",
abstract = "Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.",
author = "Seung-Joo Kim and Insoo Lee and Masahiro Mambo and Sungjun Park",
year = "1999",
language = "English",
isbn = "3540666958",
volume = "1729",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "207--224",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - On the difficulty of key recovery systems

AU - Kim, Seung-Joo

AU - Lee, Insoo

AU - Mambo, Masahiro

AU - Park, Sungjun

PY - 1999

Y1 - 1999

N2 - Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.

AB - Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.

UR - http://www.scopus.com/inward/record.url?scp=84948167479&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84948167479&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540666958

SN - 9783540666950

VL - 1729

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 207

EP - 224

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -