Topic
Key escrow
About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A hybrid anonymous authentication and key agreement scheme using the physiological signal to overcome the shortcomings in Li et al.
72 citations
••
10 Apr 2016TL;DR: In this work, Hierarchical Identity Based Encryption is used to build (content) name-based security mechanisms used for securely distributing content and each user maintains his own Private Key Generator used for generating the master secret key and the public system parameters required by the HIBE algorithm.
Abstract: User, content, and device names as a security primitive have been an attractive approach especially in the context of Information-Centric Networking (ICN) architectures. We leverage Hierarchical Identity Based Encryption (HIBE) to build (content) name-based security mechanisms used for securely distributing content. In contrast to similar approaches, in our system each user maintains his own Private Key Generator used for generating the master secret key and the public system parameters required by the HIBE algorithm. This way our system does not suffer from the key escrow problem, which is inherent in many similar solutions. In order to disseminate the system parameters of a content owner in a fully distributed way, we use blockchains, a distributed, community managed, global list of transactions.
71 citations
•
IBM1
TL;DR: In this article, an inspection service stands as an independent party at the onset of the transfer of goods between the buyer and the seller, in an attempt to reduce fraudulent behavior by the buyer or the seller.
Abstract: A method, apparatus, system, or computer program product facilitates trustworthy electronic commerce by providing an inspection-service-based release of an escrowed payment for a transaction involving physical goods. An inspection service stands as an independent party at the onset of the transfer of goods between the buyer and the seller. In an attempt to reduce fraudulent behavior by the buyer or the seller, an inspection service inspects the goods, preferably at the point of shipment. A description of the goods has been previously stored in a transaction record that has been previously created within an escrow service. The inspection service may electronically retrieve the description of the goods from the escrow service. The inspection service then determines whether the description of the goods is acceptably similar to the actual condition or type of the goods and generates a certification if they are acceptable similar. The inspection service may then electronically notify the escrow service of the certification, and the escrow service may release the escrowed payment if the goods are accepted by the other party.
71 citations
••
TL;DR: Certifcateless Public Key Cryptography (CLPKC) is introduced into PEKS, and a general model of CertifCateless PEKS (CLPEKS) is formalized and a practical CLPEKS scheme is constructed with security and efficiency analyses.
Abstract: Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in-trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certifcateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certifcateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.
70 citations
••
13 Sep 2010TL;DR: This paper designs distributed PKG setup and private key extraction protocols for three important IBE schemes; namely, Boneh and Franklin's BF-IBE, Sakai and Kasahara's SK- IBE, and Boneh & Boyen's BB1-IBe and proves their IND-ID-CCA security in the random oracle model against a Byzantine adversary.
Abstract: An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested as a way to mitigate this key escrow problem for Boneh and Franklin's IBE scheme, the security of this distributed protocol has not been proven. Further, a distributed PKG has not been considered for any other IBE scheme.
In this paper, we design distributed PKG setup and private key extraction protocols for three important IBE schemes; namely, Boneh and Franklin's BF-IBE, Sakai and Kasahara's SK-IBE, and Boneh and Boyen's BB1-IBE. We give special attention to the applicability of our protocols to all possible types of bilinear pairings and prove their IND-ID-CCA security in the random oracle model against a Byzantine adversary. Finally, we also perform a comparative analysis of these protocols and present recommendations for their use.
70 citations