Skip to main content
placeholder image

Equitable key escrow with limited time span (Or, how to enforce time expiration cryptographically)

Chapter


Abstract


  • With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to speci ed time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the rst the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.

Publication Date


  • 1998

Citation


  • Burmester, M., Desmedt, Y., & Seberry, J. (1998). Equitable key escrow with limited time span (Or, how to enforce time expiration cryptographically). In Unknown Book (Vol. 1514, pp. 380-391). doi:10.1007/3-540-49649-1_30

International Standard Book Number (isbn) 13


  • 9783540651093

Scopus Eid


  • 2-s2.0-84947796723

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 380

End Page


  • 391

Abstract


  • With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to speci ed time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the rst the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.

Publication Date


  • 1998

Citation


  • Burmester, M., Desmedt, Y., & Seberry, J. (1998). Equitable key escrow with limited time span (Or, how to enforce time expiration cryptographically). In Unknown Book (Vol. 1514, pp. 380-391). doi:10.1007/3-540-49649-1_30

International Standard Book Number (isbn) 13


  • 9783540651093

Scopus Eid


  • 2-s2.0-84947796723

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 380

End Page


  • 391