key escrow


Also found in: Acronyms, Encyclopedia, Wikipedia.

key escrow

n.
An arrangement in which data decryption keys are placed in escrow with a third party, so that encrypted communications can be decrypted and read by an authorized outsider under controlled circumstances.
References in periodicals archive ?
It offers secrecy and known-key security, and it does not suffer from the key escrow problem.
Based on this concept, we define the model of cloud-based file transmission service (see figure 3) that is free from the key escrow problem.
To overcome key escrow problem of IBBE, a natural way is to adopt the corresponding approaches of IBE.
Hence, the key escrow problem and certificate management problem are solved in CL-PKC.
Today it seems laughable that software would ever have been labeled as "munitions"; even Ashcroft's DOJ did not try to include a key escrow system in the PATRIOT Act.
encryption policy in the past seven years, specifically the relaxation of export regulations and key escrow advocacy, result from governmental and societal recognition and acceptance of how the world will be in the information age.
This Article proposes that commercial interest in key escrow has common ground with law enforcement and national interests.
23) Key Escrow involves distributing the key to a key escrow agent for storage.
Over a four-year period, key escrow begat key management infrastructure which begat the two twins of key recovery and trusted third parties.
The most recent development in cryptographic alternatives is the federal government's key escrow encryption initiative, more popularly known as the Clipper Chip and the Capstone chip.
The addition of Vormetric Data Security adds to the enhanced security measures in Virtustream clouds which include layered physical/virtual security, cloud-to-cloud encryption, core servers equipped with new Intel CPUs that support Advanced Encryption Standard New Instruction Set (AES-NI) for optimal encryption efficiency, hardware-level authentication (Intel TXT), encrypted VPN (IPSEC and SSL), Key Escrow using Data Security Modules (DSMs), encryption in archive, GRC tools, two-factor authentication, and various additional security and compliance measures and reporting.
But in the domestic software market, few accepted the push for key escrow standards (now relabeled "key recov ery").