Abstract
It may be required that the power to execute some operations is to be shared among members of a group. The recognition of such needs came when NIST tried to introduce the controversial Clipper Chip [368] with key escrowing to achieve legal wiretapping. The proposed escrowed encryption algorithm used two parties (called Key Escrow Agencies) to deposit the valid cryptographic key. Only if the two parties pooled their partial keys together, could ciphertext be decrypted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pieprzyk, J., Hardjono, T., Seberry, J. (2003). Group-Oriented Cryptography. In: Fundamentals of Computer Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-07324-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-662-07324-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07713-5
Online ISBN: 978-3-662-07324-7
eBook Packages: Springer Book Archive