[109637] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re:

daemon@ATHENA.MIT.EDU (dana@dtn.com)
Wed Mar 31 10:57:23 1999

From: dana@dtn.com
To: Mixmaster <mixmaster@remail.obscura.com>
cc: cypherpunks@toad.com
Date: Wed, 31 Mar 1999 09:24:49 -0600
Reply-To: dana@dtn.com



Maybe it's me, but this is a horrible idea.

It would be useless to both the users (Who would have a x% chance of being
decrypted) and to law enforcement (Who only have an x%chance to catch the
"Important" call.(I am expecting that even criminals usual phone call is not
about crime.)).

Dan Anderson




Mixmaster <mixmaster@remail.obscura.com> on 03/30/99 08:18:03 PM

To:   cypherpunks@toad.com
cc:    (bcc: Dan Anderson/ENG)

Subject:




Monday, March 29, 1999 - 17:51:54 MET

  http://link.springer.de/link/service/journals/00145/bibs/12n2p117.html

Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation
via Fractional Oblivious
        Transfer

        Mihir Bellare, Ronald L. Rivest

Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation
via Fractional Oblivious
        Transfer

        Mihir Bellare, Ronald L. Rivest


        Subscribers may view full text in PDF from web page


        Abstract

        We present an alternative to the controversial ``key-escrow'' techniques
for enabling law enforcement and national security access to encrypted
        communications. Our proposal allows such access with probability p for
each message, for a parameter p between 0 and 1 to be chosen (say, by
        Congress) to provide an appropriate balance between concerns for
individual privacy, on the one hand, and the need for such access by law
        enforcement and national security, on the other. (For example, with
p=0.4 , a law-enforcement agency conducting an authorized wiretap which
        records 100 encrypted conversations would expect to be able to decrypt
(approximately) 40 of these conversations; the agency would not be able to
        decrypt the remaining 60 conversations at all.) Our scheme is remarkably
simple to implement, as it requires no prior escrowing of keys.




Original Recipient: DANA.MHS @ DTN





home help back first fref pref prev next nref lref last post