Oblivious key escrow

9Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a simple scheme, based on secret-sharing over large-scale networks, for assuring recoverability of sensitive archived data (e.g., cryptographic keys). In our model anyone can request a copy of the archived data but it is very difficult to keep the existence of a request secret or to subvert the access policy of the data "owner." We sketch an architecture for a distributed key escrow system that might be suitable for deployment over very large-scale networks such as the Internet. We also introduce a new cryptographic primitive, oblivious multicast, that can serve as the basis for such a system.

Cite

CITATION STYLE

APA

Blaze, M. (1996). Oblivious key escrow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1174, pp. 335–343). Springer Verlag. https://doi.org/10.1007/3-540-61996-8_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free