1993-11-13 - Re: Key Sharing Protocols

Header Data

From: an7822@anon.penet.fi (Archimboldo)
To: cypherpunks@toad.com
Message Hash: d83999375a2396206a9907e3f77daf2ea4d9a8786cddb0d250e1ae763bc6f354
Message ID: <9311130732.AA07592@anon.penet.fi>
Reply To: N/A
UTC Datetime: 1993-11-13 07:33:45 UTC
Raw Date: Fri, 12 Nov 93 23:33:45 PST

Raw message

From: an7822@anon.penet.fi (Archimboldo)
Date: Fri, 12 Nov 93 23:33:45 PST
To: cypherpunks@toad.com
Subject: Re: Key Sharing Protocols
Message-ID: <9311130732.AA07592@anon.penet.fi>
MIME-Version: 1.0
Content-Type: text/plain


> 
> I'm working on an internal protocol for securing company records
> and I'd like to solicit some net.wisdom.
> (...)
> 
> To allow for loss of a passphrase, for whatever reason, use a
> secret sharing protocol to split the secret key of the user into
> several pieces, held by designated security officers.
> Reconstruction of the key will require cooperation by "n"
> security officers. I have some problems with this.
> 

Sorry, I should have done some more reading before I posted. What I'm
after is a "Fair Cryptosystem". I'm not happy with the whole idea of
escrowed keys, but in this case, it's the best solution which will be
accepted by this organization.

Micali describes how the user can generate their own key and create
verifiable pieces for the escrow agents. Does anyone know of code which
implements this scheme?


-------------------------------------------------------------------------
To find out more about the anon service, send mail to help@anon.penet.fi.
Due to the double-blind, any mail replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to admin@anon.penet.fi.





Thread