The risks of key recovery, key escrow, and trusted third-party encryption
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...
Main Authors: | Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Diffie, Whitfeld, Gilmore, John, Neumann, Peter G., Schneier, Bruce, Abelson, Harold, Rivest, Ronald L, Schiller, Jeffrey I |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | en_US |
Published: |
O'Reilly & Associates, Inc
2018
|
Online Access: | http://hdl.handle.net/1721.1/117329 https://orcid.org/0000-0002-5328-7821 https://orcid.org/0000-0002-7105-3690 |
Similar Items
-
Keys under doormats
by: Neumann, Peter G., et al.
Published: (2016) -
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
by: Abelson, Harold, et al.
Published: (2015) -
Keys under doormats: mandating insecurity by requiring government access to all data and communications
by: Abelson, Harold, et al.
Published: (2020) -
Encapsulated Key Escrow
by: Bellare, Mihir, et al.
Published: (2023) -
Failsafe Key Escrow
by: Kilian, Joseph, et al.
Published: (2023)