Accessing Digital Evidence and RIPA Part III

van Someren, Nicko
April 2007
Credit Control;2007, Vol. 28 Issue 4/5, p66
Trade Publication
The article explores the Regulation of Investigatory Powers Act 2000 (RIPA) Part III and discusses its impact on the business community. A critical element of the new RIPA is the framework for ensuring that law enforcement officers can gain access to evidence held in computer files even if it is encrypted. Although these new rulings are clearly aimed at helping battle organized crime and fraud, they open up new problems for the business sector.


Related Articles

  • Is PKI finally securing its future? Braue, David // Australian Personal Computer;Jul2001, Vol. 22 Issue 7, p121 

    Focuses on the adoption of public key infrastructure (PKI) technology. Facilitation of encryption and decryption of information for the purpose of sending it securely across the Internet; Combination of the public key with a unique digital signature issued by a certification authority; Single...

  • Improvement on a Fuzzy Identity-based Encryption Scheme. Guoyan Zhang; Feng Wang // Journal of Computers;Nov2014, Vol. 9 Issue 11, p2727 

    Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID' , if and only if the identity ID and ID'...

  • Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds. Yang Lu // KSII Transactions on Internet & Information Systems;Jul2015, Vol. 9 Issue 7, p2703 

    Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is...

  • Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. PEREIRA, MAYANA; DOWSLEY, RAFAEL; NASCIMENTO, ANDERSON C. A.; HANAOKA, GOICHIRO // Computer Journal;Oct2015, Vol. 58 Issue 10, p2738 

    In Cramer et al. (2007, Bounded CCA2-Secure Encryption. In Kurosawa, K. (ed.), Advances in Cryptology - ASIACRYPT 2007, Kuching, Malaysia, December 2-6, Lecture Notes in Computer Science, Vol. 4833, pp. 502-518. Springer, Berlin, Germany) proposed a public-key encryption scheme secure against...

  • Research and Improvement of Information Security Asymmetrical Encryption Algorithm. Li Liantian // Journal of Convergence Information Technology;Apr2013, Vol. 8 Issue 7, p249 

    The importance of Information security in network and information technology is increasing, and information encryption technology is the core part of the information security. Beginning with the information encryption technology, this paper introduces a classification of information encryption...

  • Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. SHI-FENG SUN; DAWU GU; ZHENGAN HUANG // Computer Journal;Oct2015, Vol. 58 Issue 10, p2520 

    With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption...

  • Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. WEI GAO; GUILIN WANG; XUELI WANG; KEFEI CHEN // Computer Journal;Oct2015, Vol. 58 Issue 10, p2748 

    Certificateless public key encryption (CLE) and certificate-based encryption (CBE) are motivated to simultaneously solve the heavy certificate management problem inherent in the traditional public key encryption (PKE) and the key escrow problem inherent in the identity-based encryption (IBE)....

  • Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. DEBIAO HE; MINGWU ZHANG; BAOWEN XU // Computer Journal;Oct2015, Vol. 58 Issue 10, p2507 

    Recently, Gu et al. proposed an efficient identity-based proxy signature scheme and demonstrated their scheme was provably secure in the standard model. In this paper, we show their scheme is not secure against the malicious user through proposing three concrete attacks.

  • Improvement on threshold proxy signcryption scheme. Tan Zuo-Wen // Journal of Communication & Computer;May2007, Vol. 4 Issue 5, p40 

    Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics