The Implementation and the Discussion on "A Key Escrow Encryption System on the Individual and the Machine Bounds"
碩士 === 國立中興大學 === 應用數學系 === 86 === As the development of cryptosystems, We summary three main cryptosystems. The first one is "cryptosystem of symmetric key", the second one is "crypto -system of asymmetric key"( cyr...
Main Authors: | Hsieh, Jiann Horng, 謝建宏 |
---|---|
Other Authors: | Jan Jin Kan |
Format: | Others |
Language: | zh-TW |
Published: |
1998
|
Online Access: | http://ndltd.ncl.edu.tw/handle/17086756802071139201 |
Similar Items
-
The Implementation and the Discussion on ""A Key Escrow Encryption System on the Individual and the Machine Bounds""
by: Xie, Jian-Hong, et al.
Published: (1998) -
The risks of key recovery, key escrow, and trusted third-party encryption
by: Anderson, Ross, et al.
Published: (2018) -
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow
by: Yang Chen, et al.
Published: (2018-01-01) -
Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem
by: Maitri Patel, et al.
Published: (2021-02-01) -
A Key Escrow System with Authentication
by: Yang, Janq-Shiun, et al.
Published: (1997)