We initiate the study of a new class of secret-key cryptosystems, called master-key cryptosystems, in which an authorized third party possesses a "master key" that allows efficient recovery of the cleartext without knowledge of the session key. One motivation for this study is that master-key cryptosystems could provide a less cumbersome alternative to key escrow in situations in which third-party access is required. We demonstrate that designing a master-key cryptosystem with acceptable performance is roughly equivalent to designing a public-key cryptosystem in which encryption is much faster than is possible with current public-key techniques. These results were presented at the Crypto rump session, Santa Barbara CA, August 1995...
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more li...
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow pro...
With the advancement in Internet-based technologies, network applications are no longer just limited...
: A key establishment protocol has been proposed by Jefferies, Mitchell and Walker [1] with the prop...
Abstract. Abstract This paper introduces a cryptographic paradigm called self-escrowed encryption, a...
The determination of an individual's right to privacy is mainly a nontechnical matter, but the pragm...
We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a sess...
In this paper we describe the Royal Holloway key escrow scheme, which provides a solution to the pro...
textabstractThe notion of secret-key certificate schemes is introduced and formalized. As with publi...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, p...
In this paper we will build a public-key cryptosystem using the MDS code. The advantages of this cry...
A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-ke...
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying t...
Traditional encryption, which protects messages from prying eyes, has been used for many decades. Th...
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more li...
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow pro...
With the advancement in Internet-based technologies, network applications are no longer just limited...
: A key establishment protocol has been proposed by Jefferies, Mitchell and Walker [1] with the prop...
Abstract. Abstract This paper introduces a cryptographic paradigm called self-escrowed encryption, a...
The determination of an individual's right to privacy is mainly a nontechnical matter, but the pragm...
We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a sess...
In this paper we describe the Royal Holloway key escrow scheme, which provides a solution to the pro...
textabstractThe notion of secret-key certificate schemes is introduced and formalized. As with publi...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, p...
In this paper we will build a public-key cryptosystem using the MDS code. The advantages of this cry...
A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-ke...
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying t...
Traditional encryption, which protects messages from prying eyes, has been used for many decades. Th...
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more li...
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow pro...
With the advancement in Internet-based technologies, network applications are no longer just limited...