University of Wollongong
Browse

Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)

Download (240.74 kB)
conference contribution
posted on 2024-11-18, 16:51 authored by M Burmester, Y Desmedt, Jennifer SeberryJennifer Seberry
With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of temper-proof devices.

History

Citation

This conference paper originally appeared as Burmester, M, Desmedt, YG and Seberry, J, Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically), in Ohta, K and Pei, D (eds), ASIACRYPT '98, Lecture Notes in Computer Science, 1514, 1998, 380-391. Copyright Springer-Verlag. Original journal available here.

Language

English

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC