Skip to main content

A proposed architecture for trusted third party services

  • Conference paper
  • First Online:
Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

Abstract

In this paper we propose a novel solution to the problem of providing trusted third party services, such as the management of cryptographic keys for end-to-end encryption, in a way that meets legal requirements for warranted interception. Also included is a discussion of what might be a reasonable set of requirements for international provision of such services, as well as some analysis of the cryptographic properties of the architecture and how it might operate in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mike Burmester. ‘On the Risk of Opening Distributed Keys'. In Advances in Cryptology—CRYPTO '94, Springer-Verlag, Berlin (1994), pp. 308–317.

    Google Scholar 

  2. Whitfield Diffie and Martin E. Hellman. ‘New Directions in Cryptography.’ IEEE Transactions in Information Theory IT-22 (1976) pages 644–655.

    Google Scholar 

  3. National Institute of Standards and Technology. FIPS Publication 185: Escrowed Encryption Standard, February 1994.

    Google Scholar 

  4. US Patent 4956863. Cryptographic Method and Apparatus for Public Key Exchange with Authentication. Granted 11 September 1990.

    Google Scholar 

  5. ISO/IEC 9979:1991. Data Cryptographic Techniques — Procedures for the Registration of Cryptographic Algorithms. December 1991.

    Google Scholar 

  6. Silvio Micali. Fair Cryptosystems. MIT Technical Report MIT/LCS/TR-579.b, November 1993.

    Google Scholar 

  7. Yacov Yacobi. ‘A key distribution paradox.’ In Advances in Cryptology — CRYPTO '90, Springer-Verlag, Berlin (1991), pp. 268–273.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jefferies, N., Mitchell, C., Walker, M. (1996). A proposed architecture for trusted third party services. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032349

Download citation

  • DOI: https://doi.org/10.1007/BFb0032349

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics