CRYPTOGRAPHY, TRUSTED 3RD-PARTIES AND ESCROW

Authors
Citation
Sjd. Phoenix, CRYPTOGRAPHY, TRUSTED 3RD-PARTIES AND ESCROW, British Telecom technology journal, 15(2), 1997, pp. 45-62
Citations number
20
Categorie Soggetti
Telecommunications,"Engineering, Eletrical & Electronic
ISSN journal
02650193
Volume
15
Issue
2
Year of publication
1997
Pages
45 - 62
Database
ISI
SICI code
0265-0193(1997)15:2<45:CT3AE>2.0.ZU;2-E
Abstract
The promise of tomorrow's electronic business environment will not be fully realised unless government, business and consumers have a high l evel of confidence in the security of that environment. The use of cry ptography can provide this confidence and facilitate the establishment of a global electronic market-place. Cryptographic techniques offer a range of services including confidentiality, authenticity, integrity and anonymity. We examine some of these techniques and explain why a t rusted third party infrastructure is seen as a crucial component in th e successful introduction of an electronic business arena. The widespr ead use of cryptography, however, also presents possible new opportuni ties for criminal activity. To mitigate against this many governments have proposed the provision of escrowed cryptographic services - We re view a particular scheme favoured by the UK government.