1995
DOI: 10.1007/3-540-49264-x_12
|View full text |Cite
|
Sign up to set email alerts
|

Securing Traceability of Ciphertexts — Towards a Secure Software Key Escrow System

Abstract: Abstract. The Law Enforcement Agency Field (LEAF), wliicli in Clipper is appended to the ciphertext, allows the Law Enforcement Agency to trace the sender and receiver. To prevent users of Clipper to delete t h e T,EAF, the Clipper decryption box will not decrypt if the correct LEAF is not present. Such a solution requires the implementation t o be tamperproof. In this paper we propose an alternative approach to achieve traceability. Our solution is based on the computational complexity of some well known prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

1997
1997
2015
2015

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…The new GenState0 and RndQR algorithms are shown in Figure 5. The admissibility of proposed RndQR construction is confirmed by [10] and [26, §B.5.1.3], in the random oracle model.…”
Section: Implementing Sskgsmentioning
confidence: 65%
“…The new GenState0 and RndQR algorithms are shown in Figure 5. The admissibility of proposed RndQR construction is confirmed by [10] and [26, §B.5.1.3], in the random oracle model.…”
Section: Implementing Sskgsmentioning
confidence: 65%
“…A common method (see [Des95,Sho05] and [NIS12, §B.5.1.3]) for sampling random elements x from Z n is to pick a seed r ← R {0, 1} and to output x = E(r). The resulting distribution is statistically close to uniform [Sho05].…”
Section: Discussionmentioning
confidence: 99%
“…One approach to anonymizing RSA, suggested by Desmedt [7], is to add random multiples of the modulus n to the ciphertext. This padding removes any information about the size of n and does not interfere with the reduction of the value modulo n. In the following, we assume that such a technique is adopted and that the adversary gains no information on the RSA modulus involved in some protocol (in a statistical sense) from the encoding used in the transcript.…”
Section: Ensuring That Handshakes Do Not Reveal the Groupmentioning
confidence: 99%