On anonymity with identity escrow

A Mukhamedov, MD Ryan - International Workshop on Formal Aspects in …, 2005 - Springer
… Our improved protocol guarantees anonymity even if all but one of the escrow holders are …
the escrowed certificate is valid and that the identity is recoverable (with a help of escrow agent…

Identity escrow

J Kilian, E Petrank - Annual International Cryptology Conference, 1998 - Springer
… signatures has an escrow-like feature in which the anonymity of a … of key escrow ideas:
authentication and identity schemes. … of an escrowed identity scheme based on the E1Gamal …

Identity escrow protocol and anonymity analysis in the applied pi-calculus

A Mukhamedov, MD Ryan - … Transactions on Information and System …, 2010 - dl.acm.org
… , while providing the possibility that the service owner can break the anonymity in exceptional
… an identity escrow protocol that distributes user identity among several escrow agents. The …

Anonymity and privacy in bitcoin escrow trades

F Sabry, W Labda, A Erbad, H Al Jawaheri… - … 18th ACM Workshop on …, 2019 - dl.acm.org
… of their users trades and identities. It also shows how tracking down criminals activities …
The privacy and anonymity research of trading over escrow done in this paper, relied only on

New identity escrow scheme for anonymity authentication

YH Lee, IY Lee, HW Lee - International Conference on Cryptology in India, 2002 - Springer
… scheme, the issuer who has accurate user identity safely transmits anonymous … while keeping
anonymity. In this thesis, requirements for security and trusty of the identity escrow scheme …

Anonymity for bitcoin from secure escrow address

Q Wang, X Li, Y Yu - IEEE Access, 2017 - ieeexplore.ieee.org
… ’s identity, all past and future transactions related to the linked address can be traced,
compromising the user’s anonymity. … We focus on the most prevalent approach to strengthen …

Removing escrow from identity-based encryption: New security notions and key management techniques

SSM Chow - International workshop on public key cryptography, 2009 - Springer
… protocol, which is based on the standard argument in anonymous credential literature [5,16].
The first step of our AKI protocol is to get a certificate on an identity from the ICA, which just …

An identity escrow scheme with appointed verifiers

J Camenisch, A Lysyanskaya - Annual International Cryptology …, 2001 - Springer
… They allow a member of some group to sign anonymously on the … of identity escrow [32]
schemes. They can be seen as group-member identification schemes with revocable anonymity. …

DECIDE: a scheme for decentralized identity escrow

N Taniguchi, K Chida, O Shionoiri, A Kanai - … workshop on Digital identity …, 2005 - dl.acm.org
identity escrow scheme called DECIDE. It has three identity tiers: anonymity, pseudonymity,
and identity, and it … We also present an analysis on three service models - online discussion …

How to solve key escrow and identity revocation in identity-based encryption schemes

JH Oh, KK Lee, SJ Moon - … Conference on Information Systems Security, 2005 - Springer
… In this paper, to solve both key escrow and identity revocation, we propose a mediated
identity-based encryption scheme that does not suffer from inherent key escrow. Our proposed …