Presentation 1998/9/17
RSA-based Distributed Trusted Third Agencies and their Application to an International Key Escrow System
Shingo MIYAZAKI, Ikuko KURODA, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In the key recovery system, the user deposits the copy of his own key to the distributed key recovery agencies as a back-up of the original key. The entity preserving the data encrypted with the key of a user implores either the concerned user or a set of key recovery agencies for decrypting the data. In the latter case, the entity can obtain the decrypted data by incorporating partial results, which each of distributed agencies can copmpute with a partial secret key deposited. In this paper, we propose a key recovery system based on RSA by applying the concept of such distributed proxy descryption and techniques of blind decoding. In the previous work, we proposed an international key escrow system[Miyazaki et al., ISEC98-16, 1998], that more than one ITTPs could escrow user's partial key by using(t, n)-threshold secret sharing scheme, which is based on the discrete logarithm problem. To present the scheme based RSA, we apply an algorithm proposed by Boneh and Franklin to our international key escrow system.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) key recovery / data recovery / trusted third party / distributed proxy decryption / RSA / international key escrow
Paper # ISEC98-34
Date of Issue

Conference Information
Committee ISEC
Conference Date 1998/9/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) RSA-based Distributed Trusted Third Agencies and their Application to an International Key Escrow System
Sub Title (in English)
Keyword(1) key recovery
Keyword(2) data recovery
Keyword(3) trusted third party
Keyword(4) distributed proxy decryption
Keyword(5) RSA
Keyword(6) international key escrow
1st Author's Name Shingo MIYAZAKI
1st Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University()
2nd Author's Name Ikuko KURODA
2nd Author's Affiliation Project TEAM-4, NTT Human Interface Laboratories
3rd Author's Name Kouichi SAKURAI
3rd Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University:(Present address)Currently visiting in Columbia Univ.Computer Science Dept.
Date 1998/9/17
Paper # ISEC98-34
Volume (vol) vol.98
Number (no) 268
Page pp.pp.-
#Pages 8
Date of Issue