key escrow


Also found in: Dictionary, Acronyms, Wikipedia.

key escrow

(security)
A controversial arrangement where the keys needed to decrypt encrypted data must be held in escrow by a third party so that government agencies can obtain them to decrypt messages which they suspect to be relevant to national security.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

key escrow

In cryptography, placing a secret key into the hands of a trusted third party. See key management.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Therefore, both the key escrow and key exposure problems can be solved by our coordinated mechanism.
(4) Key escrow resilience: it is desirable that the adversary is unable to obtain the full private key of any mobile sensor even if CC has been compromised [27].
IBE has the key escrow problem that the PKG could see any message because all private keys used in decryption are generated by it.
In this paper, we propose a practical approach to solving key escrow problem of P2MIBBE.
Today it seems laughable that software would ever have been labeled as "munitions"; even Ashcroft's DOJ did not try to include a key escrow system in the PATRIOT Act.
By including CESA in the announcement, the government made clear that it had not abandoned its advocacy of recoverable (key escrow) encryption technology.
In January 1999, the Interministerial Committee on the Information Society released its decision on encryption.(246) The decision outlines legislation to be presented to Parliament by the Prime Minister.(247) The proposed legislation will allow domestic use of encryption without a mandatory key escrow provision and will allow export of encryption methods that do not exceed fifty-six bits.(248)
This Article proposes that commercial interest in key escrow has common ground with law enforcement and national interests.
The key escrow encryption initiative is enshrouded in controversy.
However, IBC inevitably suffers from the key escrow problem as all users' private keys are known to the PKG.
By 1996, the administration had abandoned the Clipper Chip as such, but it continued to lobby both at home and abroad for software-based "key escrow" encryption standards.
Bob Goodlatte (R-VA) and Zoe Lofgren (D-CA), would permit unlimited domestic use of any encryption product and prohibit the federal government from imposing a key escrow system (designed to allow government access to encrypted material).