參考文獻 |
[1] M. Burmester, Y. Desmedt, and J. SE. Berry,
'Equitable key escrow with limited time span (or, How to
enforce time expiration cryptographically),' In Advanced
in Cryptology - Asiacrypt'98, Springer-Verlag,
Lecture Notes in Computer Science, LNCS 1514, pp.380--391,
1998.
[2] C. Boyd, 'Enforcing traceability in software,'
In Conference on Computer and Communication Security
- First International Conference, ICICS'97,
pp. 398--408, Springer-Verlag, 1997
[3] D. Boneh and R.J. Lipton, 'A Revocable Backup System,' 6th
USENIX Security Symposium, San Jose, CA, pp. 91--96, 22--25
July, 1996.
[4] M. Bellare and S. Goldwasser, 'Verifiable partial key
escrow,' In Proceedings of the Fourth Annual Conference on
Computer and Communications Security, ACM, 1996.
[5] M. Blaze, 'Protocol failure in the escrowed encryption
standard,' Proc. of 2nd ACM Conference on Computer and
Communications Security, ACM Press, New York, pp.59--67,
1994.
[6] T. Beth, H. Knobloch, M. Otten, G.J. Simmons, and P.
Wichmann, 'Towards acceptable key escrow system,' Proc.
of 2nd ACM Conference on Computer and Communications
Security, ACM Press, New York, pp.51--58, 1994.
[7] D.M. Balenson, C.M. Ellison, S.B. Lipner, and S.T. Walker,
'A new approach to software key escrow,' TISR #520,
Trusted Information Systems, 1994.
[8] Chien-Yuan Chen, Wei-Bin Lee, and Chin-Chen Chang,
'A software key escrow system suitable for
broadcasting,' In T.L. Hwang and A.K. Lenstra (eds), Proc
of the 1998 International Computer Symposium -- Workshop on
Cryptology and Information Security, Tainan, pp. 155--158,
17--19 December, 1998.
[9] R. Cramer, I. Damgard and B. Schoenmakers, 'Proofs of
partial knowledge and simplified design of witness hiding
protocols,' Advances in Cryptology - Crypto94 Proceedings,
Lecture Notes in Computer Science Vol. 839, Y. Desmedt
ed., Springer-Verlag, 1994.
[10] D.E. Denning and D.K. Branstad, 'A taxonomy for key
recovery encryption systems,' available at
http://www.cosc.georgetown.edu/~denning/crypto/taxonomy.html
[11] D.E. Denning and D.K. Branstad, 'A taxonomy for key
escrow encryption systems,'
Commun. ACM, vol.39, no.3, pp.34--40, 1996.
[12] D.E. Denning, 'Key Escrow Encryption -- the third
paradigm,' Computer Security Journal, vol.11, no.1, pp.43-
-52, 1995.
[13] Yvo Desmedt, 'Securing traceability of
ciphertexts: Towards a secure software key escrow
system,' In L.C. Guillou and J.-J. Quisquater (eds.),
Advances in Cryptology -- EUROCRYPT,'95, vol 921 of
Lecture Notes in Computer Science, pp. 147--157, Springer-
Verlag, 1995.
[14] D.E. Denning and M. Smid, 'Key escrowing today,' IEEE
Communication Magazine, pp.58--68, September 1994.
[15] D.E. Denning, 'The US key escrow encryption technology,'
Computer Communication Magazine, vol.17, no.7, pp.453--
457, July 1994.
[16] W. Diffie and M.E. Hellman, "New directions in
cryptography,' IEEE Trans. on Inform. Theory, vol.IT-22,
pp.644--654, 1976.
[17] T. ElGamal, 'A public key cryptosystem and a signature
scheme based on discrete logarithms,' IEEE Trans. on
Inform. Theory, vol.31, no.4, pp.469--472, July 1985.
[18] Yair Frankel and Moti Yung, 'Escrow encryption
systems visited: Attacks, analysis and designs,' In
D. Coppersmith (ed.), Advances in
Cryptology -- CRYPTO,'95, vol 963 of Lecture Notes in
Computer Science, pp. 222--235, Springer-Verlag, 1995.
[19] R. Gennaro, P. Karger, S.Matyas, M. Peyravian, A.
Roginsky, D. Safford, M. Willet, and N. Zunic, 'Two-phase
cryptographic key recovery system,'
Computers and Security, no.16, pp. 681--506, 1997
[20] R. Ganesan, 'The Yaksha security system,' Commun. ACM,
vol.39, no.3, pp.55--60, 1996.
[21] P. Horster, M. Michels, and H. Petersen, 'A new key
escrow system with active investigator,' Proc. of
Securicom '95, April 1995. Also available from
University of Technology Chemnitz茂wickau, Department of
Computer Science, Theoretical Computer Science and
Information Security Technical Report: TR-95-4,
April 1995.
[22] M. Joye and S.M. Yen, 'Generation and Release of Secrets
Using One-way Cross-trees,' Proc. of the 1998
International Computer Symposium, Workshop and
Cryptography and Information Security, Tainan,
Taiwan, R.O.C., pp.23--28, 17--19 December, 1998.
[23] S.J. Kim, J.Y. Kim, B.C. Kim and D.H. Won,
'Base conversion attack on strong binded key escrow of
IWSEC'99,' Submitted for publications, 28 February, 2001
[24] Lars R. Knudsen and Torben P. Pedersen, 'On the
difficulty of software key escrow,' In U. Maurer (ed.),
Advances in Cryptology -- EUROCRYPT,'96, vol. 1070 of
Lecture Notes in Computer Science, pp. 237--244, Springer-
Verlag, 1996.
[25] W. Mao, 'Publicly verifiable partial key escrow,' In T.
Han, T. Okamoto, and S. Qing, editors, Information and
Communications Security, Springer-Verlag, Lecture Notes in
Computer Science, pp.409--413, 1997.
[26] M. Mambo and E. Okamoto,
'Proxy cryptosystems : Delegation of the power to decrypt
ciphertexts,' In IEICE Trans. Fundamentals, volume E80-A,
January 1997.
[27] M. Mambo K. Usuda and E. Okamoto,
'Proxy cryptosystems : Delegation of the power to sign
message,' In IEICE Trans. Fundamentals, volume E79-A,
September 1996.
[28] D.P. Maher, 'Crypto backup and key escrow,' Commun. ACM,
vol.39, no.3, pp.48--53, 1996.
[29] S. Micali, 'Fair public-key cryptosystems,'
Advanced in Cryptology - Crypto'92, Spring-Verlag,
Lecture Notes in Computer Science, LNCS 740, pp.113--138,
1992.
[30] J. Nieto, K. Viswanathan, C. Boyd, and E. Dawson,
'Key recovery system for the commercial environment,'
In Australasian Conference for Information Security and
Privacy, ACISP'2000, pp. 149--162. Lecture Notes in
Computer Science, Springer-Verlag, 2000.
[31] NIST, Govt. of U.S.A.,
'Requirements for key recovery products,'
Report of the Technical Advisory Committee to develop a
federal information processing standard for federal key
management infrastructure, November 1998,
available at http://csrc.nist.gov/keyrecovey/.
[32] NIST, 'SKIPJECK and KEA algorithm specifications,'
Version 2.0, 29 May, 1998.
[33] J. Nechvatel, 'A public-key-based key escrow system,'
Journal of Systems Software, vol.35, pp.73--83, 1996.
[34] FIPS 180-1, 'Secure Hash Standard,' NIST, US Department
of Commerce, Washington D.C., April 1995.
[35] NIST, 'Escrowed Encryption Standard,' FIPS PUB 185, 1994.
[36] T. Pedersen, 'Non-interactive and information theoretic
secure verifiable secret sharing,' Advances in
Cryptology - Crypto91 Proceedings, Lecture Notes in
Computer Science Vol. 576, J. Feigenbaum ed., Springer-
Verlag, 1991.
[37] R.L. Rivest, 'The MD5 message digest algorithm,' RFC
1321, April 1992.
[38] R.L. Rivest, A. Shamir, and L. Adleman, 'A method for
obtaining digital signatures and public-key
cryptosystem,' Commun. of ACM, vol.21, no.2,
pp.120--126, 1978.
[39] A. de Solages and J. Traore,
'An efficient fair off-line electronic cash system with
extensions to checks and wallets with observers,'
In Financial Cryptography'98, pp.1--15, 1998
[40] M. Stadler, 'Publicly verifiable secret sharing,' In U.
Maurer, editor, Advances in Cryptology - EUROCRYPT'96,
Spring-Verlag, Lecture Notes in Computer Science,
pp.190--199, 1996.
[41] A. Shamir, 'Partial key escrow : a new approach
to software key escrow,' Private communication
made at Crypto 95, August 1995, also presented at
Key escrow conference, Washington, D.C., 15 September, 1995
[42] K. Viswanathan, C. Boyd, E. Dawson,
'Publicly verifiable key escrow with limited time span,'
In Information Security and Privacy, ACISP'99,
Lecture Notes in Computer Science, Springer-Verlag, 1999.
[43] K. Viswanathan, C. Boyd, E. Dawson,
'Strong binding for software key escrow,'
In International Workshop on Security, IWSEC'99. IEEE
Press, 1999.
[44] S.T. Walker, S.B. Lipner, C.M. Ellison, and D.M. Balenson,
'Commercial key recovery,' Commun. ACM, vol.39, no.3,
pp.41--47, 1996.
[45] S.T. Walker, S.B. Lipner, C.M. Ellison, D.K. Branstad, and
D.M. Balenson, 'Commercial key escrow: Something for
everyone, now and for the future,' TISR #541, Trusted
Information Systems, 16 April, 1995. |