First page Back Continue Last page Overview Graphics
Key Escrow
Encryption keys are escrowed to trustworthy agencies
Requirements for a key escrow protocol
- Encrypting source must be identified
- The key is not identified
- Key retrievable under k of n protocol