The risks of key recovery, key escrow, and trusted third-party encryption

A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...

Full description

Bibliographic Details
Main Authors: Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Diffie, Whitfeld, Gilmore, John, Neumann, Peter G., Schneier, Bruce, Abelson, Harold, Rivest, Ronald L, Schiller, Jeffrey I
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:en_US
Published: O'Reilly & Associates, Inc 2018
Online Access:http://hdl.handle.net/1721.1/117329
https://orcid.org/0000-0002-5328-7821
https://orcid.org/0000-0002-7105-3690