The risks of key recovery, key escrow, and trusted third-party encryption

A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...

Full description

Bibliographic Details
Main Authors: Anderson, Ross (Author), Bellovin, Steven M. (Author), Benaloh, Josh (Author), Blaze, Matt (Author), Diffie, Whitfeld (Author), Gilmore, John (Author), Neumann, Peter G. (Author), Schneier, Bruce (Author), Abelson, Harold (Contributor), Rivest, Ronald L (Contributor), Schiller, Jeffrey I (Contributor)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Information Services and Technology (Contributor), Massachusetts Institute of Technology. Laboratory for Computer Science (Contributor), Abelson, Hal (Contributor)
Format: Article
Language:English
Published: O'Reilly & Associates, Inc, 2018-08-09T19:01:36Z.
Subjects:
Online Access:Get fulltext