scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Proceedings ArticleDOI
16 Nov 2015
TL;DR: This paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme, and proves that the scheme is IND-ID-CCA secure under standard model.
Abstract: The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model

5 citations

Book ChapterDOI
03 Jun 1997
TL;DR: The 'Royal Holloway' (RH) key escrow scheme is described in a way which is intended to clarify and motivate its design, and the properties of this scheme and some related schemes are considered.
Abstract: The first part of this paper is devoted to explaining what key escrow is and why it exists, and attempts to put it into a historical context. The subsequent focus is primarily on key escrow schemes which will work in an international environment. The possibility of using conventional key distribution techniques to provide key escrow services in an international context is first considered, and the associated problems are explored. The 'Royal Holloway' (RH) key escrow scheme is then described in a way which is intended to clarify and motivate its design, and the properties of this scheme and some related schemes are considered.

5 citations

Patent
18 Mar 2002
TL;DR: In this article, a method for access to data or documents receives the document or data in encrypted format, receives access policy data relating to the data or document, reads the access policies data and verifies individual conditions specified in the access policy, and allows decryption of the data and document if the conditions are successfully verified.
Abstract: A method for access to data or documents receives the document or data in encrypted format, receives access policy data relating to the data or document, reads the access policy data and verifies individual conditions specified in the access policy data, and allows decryption of the data or document if the conditions are successfully verified. The method uses a secure control apparatus which includes a key escrow component to safeguard private keys. There may also be a policy enforcement and key management device in a separate tamper-proof casing, the device preferably including a communications port, a policy enforcement component, an identification component and a tamper detection component.

5 citations

Proceedings ArticleDOI
25 Mar 2013
TL;DR: The relationship between the two important primitives of proxy signatures and certificate less signatures is revealed and a generic conversion from the latter to the former is presented and an efficient proxy signature scheme with a recent certificate less signature scheme is proposed.
Abstract: The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where delegation of signing rights is common. Certificate less public key cryptography eliminates the complicated certificates in traditional public key cryptosystems without suffering from the key escrow problem in identity-based public key cryptography. In this paper, we reveal the relationship between the two important primitives of proxy signatures and certificate less signatures and present a generic conversion from the latter to the former. Following the generic transformation, we propose an efficient proxy signature scheme with a recent certificate less signature scheme.

5 citations

Journal ArticleDOI
TL;DR: F2P-ABS is presented, an escrow-free and pairing-free attribute-based signature supporting perfect signer privacy for mobile anonymous authentication and proven to guarantee existential unforgeability under corrupted and adaptive chosen predicate and message attack, which is securer than existing schemes.
Abstract: Attribute-based signature (ABS) is a promising cryptographic primitive. It allows the signer to generate a signature with attributes satisfying the predicate without leaking more information, so as to provide message authenticity in an anonymous manner. However, drawbacks concerning security and efficiency hinder its applications for authentication in mobile platforms. Here, we present F2P-ABS, an escrow-free and pairing-free attribute-based signature supporting perfect signer privacy for mobile anonymous authentication. To enhance its adaptiveness to mobile platforms, a novel key extraction is proposed so that the key escrow problem is mitigated over the single authority setting. It also helps to remarkably reduce the size of the signing key. Different from existing schemes, F2P-ABS is free from pairing operations. It performs no pairing operation for verification. Without the loss of security, we prove that F2P-ABS achieves signer privacy in perfect sense. It is also proven to guarantee existential unforgeability under corrupted and adaptive chosen predicate and message attack, which is securer than existing schemes.

5 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958