Cryptography, trusted third parties and escrow

被引:17
作者
Phoenix, SJD
机构
来源
BT TECHNOLOGY JOURNAL | 1997年 / 15卷 / 02期
关键词
D O I
10.1023/A:1018680606917
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The promise of tomorrow's electronic business environment will not be fully realised unless government, business and consumers have a high level of confidence in the security of that environment. The use of cryptography can provide this confidence and facilitate the establishment of a global electronic market-place. Cryptographic techniques offer a range of services including confidentiality, authenticity, integrity and anonymity. We examine some of these techniques and explain why a trusted third party infrastructure is seen as a crucial component in the successful introduction of an electronic business arena. The widespread use of cryptography, however, also presents possible new opportunities for criminal activity. To mitigate against this many governments have proposed the provision of escrowed cryptographic services - We review a particular scheme favoured by the UK government.
引用
收藏
页码:45 / 62
页数:18
相关论文
共 20 条
[1]  
*AM BANK ASS, 1985, ANSI X9 17 REV AM NA
[2]  
[Anonymous], 1977, NBS FIPS PUB, V46
[3]  
[Anonymous], 1995, OFFICIAL PGP USERS G
[4]  
BEKER H, 1982, CIPHER SYSTEMS
[5]  
BIHAM E, 1991, J CRYPTOLOGY, V4
[6]  
CAMPBELL KW, 1992, P CRYPTO 92, P512
[7]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
JEFFRIES N, 1995, P PUBL KEY INFR WORK
[10]  
Koblitz N., 1994, A Course in Number Theory and Cryptography