Cryptographic scheme of keys in custody


The key cryptographic technique in custody, or key escrow, is that the keys that are needed to decrypt the encrypted data are deposited in a secure site so that, under certain circumstances , a third party authorized to have access to them to be able to decipher the data. This third party could be for example companies that want to access the communications of their employees, or governments, that want to see the content of the communications. > Examples

Examples of cryptographic systems using this technique are the Clipper chip and the fair cryptosystem proposed by Silvio Micali

wiki

Popular Posts