Identity escrow

J Kilian, E Petrank - Annual International Cryptology Conference, 1998 - Springer
We introduce the concept of escrowed identity, an application of key-escrow ideas to the
problem of authentication. In escrowed identity, one party A does not give his identity to another …

The escrow transactional method

PE O'Neil - ACM Transactions on Database Systems (TODS), 1986 - dl.acm.org
Escrow Method, applied to aggregate field quantities. In Section 3 we look at several areas
where the benefits of the EscrowEscrow items from the field Fl set aside by earlier ESCROW

Ivory tower in escrow

M Miyoshi - boundary 2, 2000 - muse.jhu.edu
I have presented this essay in various stages at the following institutions and conferences:
the conference on Critical Theories: China and West, at the Chinese Academy of Social …

Hope or hype: On the viability of escrow services as trusted third parties in online auction environments

X Hu, Z Lin, AB Whinston… - Information Systems …, 2004 - pubsonline.informs.org
… ’ decision making, escrow service fee rates, and adoption rates. We reveal the demand
for escrow services and establish the optimal pricing rule for the escrow service provider. A …

An identity escrow scheme with appointed verifiers

J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 19 …, 2001 - Springer
… To extend such a scheme to an identity escrow system with appointed verifiers, we … escrow
schemes along the lines of an ideal world specification, is given. These new identity escrow/…

Verifiable partial key escrow

M Bellare, S Goldwasser - Proceedings of the 4th ACM Conference on …, 1997 - dl.acm.org
One of the main objections to existing proposals for key escrow is that the individual’s privacy
relies on too high a level of trust in the law enforcement agencies. In particular, even if the …

A taxonomy for key escrow encryption systems

DE Denning, DK Branstad - Communications of the ACM, 1996 - dl.acm.org
… held by the sender’s escrow agents, the DRC must obtain key escrow data for all parties …
escrow agents. Likewise, if access is possible only through keys held by the receiver’s escrow

Quantum bit escrow

D Aharonov, A Ta-Shma, UV Vazirani… - Proceedings of the thirty …, 2000 - dl.acm.org
Unconditionally secure bit commitment and coin flipping are known to be impossible in the
classical world. Bit commitment is known to be impossible also in the quantum world. We …

Escrow services and incentives in peer-to-peer networks

B Horne, B Pinkas, T Sander - Proceedings of the 3rd ACM Conference …, 2001 - dl.acm.org
… The key technical contribution we make is to integrate a P2P file sharing service with an
escrow … To implement the escrow service securely we use cryptographic techniques, such as …

Escrow techniques for mobile sales and inventory applications

N Krishnakumar, R Jain - Wireless Networks, 1997 - Springer
… In section 4.3 we present a formal model of sitetransaction escrow, focusing on the non-…
-transaction escrow. We describe three possible implementations of the site-transaction escrow