scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Proceedings ArticleDOI
21 Jul 2017
TL;DR: The first leakage-resilient certificateless signature (LR-CLS) scheme is proposed and is demonstrated to possess existential unforgeability against adaptive chosen-message attacks under the continual leakage model for both Type I and Type II adversaries.
Abstract: Recently, numerous leakage-resilient cryptographic schemes have been proposed to resist side-channel attacks which adopt several properties resulting from practical implementations of cryptographic protocols/schemes to leak partial information of secret (or private) keys. Certificateless public key cryptography solves both certificate management problem in conventional public key cryptography and the key escrow problem in ID-based public key cryptography. However, there is little work on studying the design of certificateless cryptographic schemes resisting to side-channel attacks. In the article, the first leakage-resilient certificateless signature (LR-CLS) scheme is proposed. In the generic bilinear group model, the proposed scheme is demonstrated to possess existential unforgeability against adaptive chosen-message attacks under the continual leakage model for both Type I and Type II adversaries.

4 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: A new certificateless-based two party authenticated key agreement protocol based on bilinear pairings in elliptic curves between users belonging to different PKGs that do not share identical system parameters is proposed.
Abstract: To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment However, it is not realistic to assume that all schemes use a single PKG and each PKG shares identical system parameters but possesses a distinct master key Recently, Lee et al proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters However, Lee et al protocol has a flaw that allows attackers to impersonate others without knowing their private keys and the key escrow issues inherited in the identity-based schemes In this paper, we propose a new certificateless-based two party authenticated key agreement protocol based on bilinear pairings in elliptic curves between users belonging to different PKGs that do not share identical system parameters Compared with other two-party key agreement protocols for a multiple PKG environment, the proposed key agreement protocols satisfy every security requirements of key agreement protocols

4 citations

Journal ArticleDOI
TL;DR: An anonymous pairing-free certificateless authenticated key exchange (CL-AKE) protocol for DRM system which provides a mechanism for distributing licenses in a exible and secure manner and the analyses demonstrate that the scheme is efficient and secure.
Abstract: Mostly, current security architectures for Digital rights management (DRM) systems use either Public Key Cryptography (PKC) or Identity-based Public Key Cryptography (ID-PKC). However, PKC has a complex certificate management and ID-PKC has a key escrow problem. Certificateless Public Key Cryptography (CL-PKC) has some attractive properties which seem compatible with the requirements of DRM systems. In this paper, we present anonymous pairing-free certificateless authenticated key exchange (CL-AKE) protocol for DRM system which provides a mechanism for distributing licenses in a exible and secure manner. Furthermore, the analyses demonstrate that our scheme is efficient and secure.

4 citations

Proceedings ArticleDOI
18 Feb 2013
TL;DR: In this paper, a mediated certificateless encryption scheme without pairing operations was proposed, which solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography.
Abstract: We propose a mediated certificateless encryption scheme without pairing operations Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks In order to address the performance and security issues, in this poster, we propose a novel mCL-PKE scheme We implement our mCL-PKE scheme and a recent scheme, and evaluate the security and performance Our results show that our algorithms are efficient and practical

4 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958