A key escrow cryptosystem can not only provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a secret key escrow system based on Asmuth-Bloom threshold scheme is given and its security is analysed.
Denning D E, Smid M. Key escrowing today. IEEE Communications Magazine, 1994, 32(9) 54-68.[2]Denning D E, Branstad D A. A taxonomy for key-escrow encryption systems. Commun. ACM 1996, 39(3): 34-40.[3]Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. on Information Theory, 1983, IT-29: 208-210.[4]Desmedt Y, Frakel Y. Threshold Cryptosystems. In G. Brassard, editor, Advances in Cryptology, Proc.of Crypto'89 (Lecture Notes in Computer Science 435), Heidelberg: Springer-Verlag, 1990, 307-315.[5]Pedersen T. Non-interactive and Information Theoretic Secure Verifiable Secret Sharing. Ad-[6]vances in Cryptology-Crypto'91 (Lecture Notes in Computer Science 576), Berlin: Springer-[7]Verlag, 1991, 129-140.