scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: To build a more secure identity-based scheme for MANET, this paper recommends some techniques to improve security and availability of its key management and introduces several schemes for each type.
Abstract: In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some techniques to improve security and availability of its key management. Finally, we point out some problems of identity-based schemes in MANETs, which are not addressed and we will explore in the

8 citations

Journal ArticleDOI
TL;DR: Two certificateless identity-based identification schemes devoid of the aforementioned shortcomings are represented and the second scheme introduced has the batch verification quality and the security analysis will come at the end.
Abstract: To transmit information through very limited secure channels, we can use public key cryptosystems. A new kind of public key system, called identity-based public key system, sets the users' public identity, for example, their email addresses, as their public key. This characteristic of identity-based public key systems decreases expense and increases speed in executing many important protocols in data security such as cryptography, identification, key agreement, and digital signatures. But, the major shortcoming of these systems is Key Escrow legal key retrieval and also the key generation center's ability to impersonate users. In this paper, two certificateless identity-based identification schemes devoid of the aforementioned shortcomings are represented. These are Challenge-response Identification protocols. Also, the second scheme introduced in this paper has the batch verification quality. The security analysis of the introduced schemes will come at the end. Copyright © 2013 John Wiley & Sons, Ltd.

8 citations

Patent
01 Aug 2000
TL;DR: In this paper, the authors proposed a key escrow system that an investigation agency utilizing a mobile terminal can intercept communication in real-time even without a key storage agency adopting the key-escrow system.
Abstract: PROBLEM TO BE SOLVED: To provide a key escrow system that an investigation agency utilizing a mobile terminal can intercept communication in real time even without a key storage agency adopting the key escrow system. SOLUTION: The key escrow system introduces a proxy server(P) to which a key delivery server(KDS) always distributes a session key for encryption communication between users at the same time. The proxy server(P) stores the encrypted key distributed from the key delivery server(KDS). When the investigation agency (I) commands delivery of a session key with a license or search warrant of a court, the proxy server(P) requests the key delivery server(KDS) to authenticate an investigation agency terminal making the command and to authenticate whether or not a target person is correct. The proxy server (P) delivers the session key encrypted by a public key of the investigation agency (I) to the investigation agency (I). COPYRIGHT: (C)2002,JPO

8 citations

Journal ArticleDOI
TL;DR: An authenticated access control protocol is presented, which maintains user’s right with authorized content distribution for the digital right management system and has been proved in the random oracle model.
Abstract: With the growing development in digital content distribution, researchers focus on the construction of an access right enabled digital content distribution framework for the legal user. Digital rights management (DRM) is the system which tries to ensure authorized content distribution. Current, DRM systems either provide authentication or constrain access right, but access control with legal authentication in the digital content distribution has remained a challenging issue for public-key cryptography (PKC) or identity-based public-key cryptography (ID-PKC). PKC associates certificate management, which includes revocation, storage, distribution and verification of certificates. As a result, certificate authority becomes the bottleneck in a large network. On the other hand, ID-PKC has the drawback of key escrow. For secure and authorized content distribution, evacuation from these problems is needed. In this paper, we present an authenticated access control protocol, which maintains user’s right with authorized content distribution for the digital right management system. Its security has been proved in the random oracle model. An analysis of performance shows enhancement in efficiency, which indicates that the proposed scheme presents a secure and authorized access control mechanisms for resource-constrained devices.

8 citations

01 Jan 2007
TL;DR: This work constructs a Certificateless Public Key Signature scheme - CL-PKS, i.e., a crypto- graphic signature scheme which does not require any Digital Certificate to verify a signature generated by a private key, based on asymmetric bilinear pairing functions.
Abstract: We construct a Certificateless Public Key Signature scheme - CL-PKS, i.e., a crypto- graphic signature scheme which does not require any Digital Certificate to verify a signature generated by a private key, based on asymmetric bilinear pairing functions. Our scheme does not allow the so-called key escrow. We analyze both its efficiency and security: it is more efficient than previously published CL-PKS schemes, with shorter signatures and public keys; we prove it is strong against adap- tively chosen message attacks, based on the computational difficulty of the Diffie-Hellman Problems.

8 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958