You have completed the deployment of PKI within your organization's network. Legally you are required to implement a way to provide decryption keys to a governmental third party on an as-needed basis. Which of the following should you implement?
A. Additional certificate authority
B. Key escrow
C. Recovery agent
D. Certificate registration
Answer: B. Key escrow