References
- David Paul Maher, Crypto Backup and Key Escrow, Communications of the ACM, Vol.39, No.3, pp. 48 53, 1996
- Ravi Ganesan, The Yaksha Seurity System, Communications of the ACM, Vol.39. No.3. pp.55 60. 1996
- Stephen T. Walker, Steven B. Lipner, Carl M. Ellison and David M. Balenson. Commercial Key Recovery, Communications of the ACM, Vol.39, No.3, pp.41 47, 1996
- 이임영, 채승철, Key recovery 시스템에 관한 고찰, 한국통신정보보호 학회지, 제7권 제4호, pp.45-58, 1997
- 채승철, 이임영, Key recovery 시스템에 관한 고찰 II, 한국통신정보보호 학회지, 제8권 4호. pp.97-112, 1998
- Dorothy E. Denning, The U.S. Key Escrow Encryption Technology, Building in Big Brother: The Cryptographic Policy Debate(Edited by Lance J.Hoffman), Springer Verlag, pp.111-118, 1997
- Dorothy E. Denning, A Taxonomy for key Recovery Encryption System, Communications of the ACM, Vol.39, No.3, pp34-40. 1996 https://doi.org/10.1145/227234.227239
- Torben Pryds Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, Advances in Cryptology CRYPTO '91 Procecdings, pp.129 140, 1991
- Silvio Micali, Fair Cryptosystems, Advances in Cryptology-CRYPTO '92, pp.113-138, 1992
- Yoshiki Sameshima, A Key Escrow System of the RSA Cryptosystem, SCIS'98, pp.75-85, 1998
- Shaoquan Jiang and Yufeng Zhang, Partial Key Escrow Monitoring Scheme, CrypTEC'99, pp.86-91, 1999
- Joe Kilian and Tom Leighton, Fair Crypto-systems, Revisited, CRYPTO 95, pp,208-221, 1995
- Kouichi Sakurai and Yoshinori Yamane, Key Escrow System of Protecting User's Privacy by Blind Decoding, ISW'97, Springer-Verlag, pp.147 157, 1998
- Lenstra A, Winkler P and Yacobi Y, A Key Escrow System with Warrant Bounds, Advances in Cryptology: Proceedings of CRYPTO'95, Springer-Verlag, pp.197- 207, 1995
- Yamane.Y and Sakurai.K, How to restrict investigators' tapping in Key Escrow Systems, The 1996 Symposium on Cryptography and Information Security 7C, 1996