1997
DOI: 10.1007/3-540-69053-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals

Abstract: We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraudresistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it P t least dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

1998
1998
2011
2011

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 13 publications
0
26
0
Order By: Relevance
“…Finally, Section 6 contains several more applications of our PVSS schemes, including a generalization of Binding ElGamal [VT97] and other constructions related to software key escrow, such as [YY98]. We show how threshold variants for these schemes can be obtained easily.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, Section 6 contains several more applications of our PVSS schemes, including a generalization of Binding ElGamal [VT97] and other constructions related to software key escrow, such as [YY98]. We show how threshold variants for these schemes can be obtained easily.…”
Section: Overviewmentioning
confidence: 99%
“…In [VT97] Verheul and van Tilborg present a scheme called Binding ElGamal that may be used to enhance the strength of a public-key infrastructure depending on software key escrow. The basic scheme provides a mechanism to copy a session-key not only to the intended receiver but also to n trustees.…”
Section: Threshold Binding Elgamalmentioning
confidence: 99%
See 1 more Smart Citation
“…In [31] the concept of binding cryptography was introduced. In a binding publickey cryptosystem the sender encrypts a message under both the public key of the receiver and the public key of a third party and prove in (non-interactive) ZK that the two ciphertexts contain the same message.…”
Section: Introductionmentioning
confidence: 99%
“…In a binding publickey cryptosystem the sender encrypts a message under both the public key of the receiver and the public key of a third party and prove in (non-interactive) ZK that the two ciphertexts contain the same message. In [31] a scheme for binding E1Oamal was presented. We show that our RSA V~US scheme can be used to construct binding RSA public key encryptions.…”
Section: Introductionmentioning
confidence: 99%