Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253)
DOI: 10.1109/itcom.1999.781406 View full text |Buy / Rent full text
|
|

Abstract: In recent years, key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. The widespread opinion of the research community, expressed in a technical report [13], w r i t t e n b y well known experts, is that large-scale deployment of a key recovery system is essentially impossible. Despite this fact, key recovery might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have … Show more

Help me understand this report

Search citation statements

Order By: Relevance
0
0
0
0
0
0
2
0

Publication Types

Select...

Relationship

0
0

Authors

Journals