Denning D E, Smid M. Key escrowing today. IEEE Communication Magazine, 32(9): 55-68.[2]Denning D E. Cryptography and Data Security. Addision-Wesley Publishing Company, 1982, 211-218.[3]Micali S. Fair pubic-key cryptosystem[J].Proceeding of Crypto92, Santa Barbara: Aug.1992, Berlin:-[4]Denning D E. Descriptions of Key Escrow System. Internet Document, Version of May 1, 1996. [5] Balenson D M, Elison C, Lipner S, Walker S. A New Approach to Software Key Escrow En-[5]cryption. Trusted Information System, 3060, Washington RD, Glenwood, Draft of August 15, 1994.[6]Walker S, Lipner S, Elison C, Balen D. Commercial key recovery. Communication of the ACM, 39(3): 41-47.[7]Dawson Ed, Jingming He. Another approach to software key escrow encryption[J].Information security and privacy: First Australasian Conference, ACISP96, Woltongong, June.1996, Berlin:-[8]Yacobi Y. Exponentially faster with addition chains[J].Proceeding of Eurocrypt90, Aarhas, May.1990, Berlin:-[9]Pederson T P. Distributed provens with application undeniable signature. Proceeding Euro-[10]crypto91, Berlin: Springer-Verlag, 1992: 221-242.[11]Beller M J, Yacobi Y. Batch Diffie-Hellman key agreement systems and their application to[12]portable communication. Proceeding of Eurocrypt92, Balatonfired: May 1992, Berlin: Springer- Verlag 1993: 208-220.
|