Publication Details

This conference paper originally appeared as Burmester, M, Desmedt, YG and Seberry, J, Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically), in Ohta, K and Pei, D (eds), ASIACRYPT '98, Lecture Notes in Computer Science, 1514, 1998, 380-391. Copyright Springer-Verlag. Original journal available here.

Abstract

With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of temper-proof devices.

Share

COinS