scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Patent
03 Aug 2001
TL;DR: In this paper, a key deposit agent is provided for a group cipher communication system which conducts a cipher communication by using a group session key when a dummy user is registered as a member of the communication group.
Abstract: PROBLEM TO BE SOLVED: To constitute a cipher key deposit system at low cost and to shorten the time up to the start of an interception by an investigation agency SOLUTION: A key deposit agent is provided for a group cipher communication system which conduct a cipher communication by using a group session key When the key deposit agency generates and distributes the group session key to form a communication group, a dummy user is registered as a member of the communication group For investigation, a dummy user of a communication group as an object of interception is assigned to the investigation agency and a cipher communication is intercepted and deciphered The cipher communication of the communication group can speedily be intercepted when necessary in investigation and even if the group member constitution changes, the investigation agency is included as a group member only in the communication group including an object person to be investigated, so that the cipher communication can securely be intercepted

3 citations

Patent
23 Nov 2018
TL;DR: Wang et al. as discussed by the authors proposed an identity-based dual authentication protection batch verification signature method suitable for Internet of vehicles, and the method may be classified into a key generation and pre-distribution phase, virtual identity generation and message signature phase, message verification phase, a message batch verification phase and a signature key extraction phase after twice signatures of a vehicle user.
Abstract: The invention relates to a condition privacy protection method of Internet of vehicles for batch verification signature, which is an identity-based dual authentication protection signature method. Wewill construct an identity-based dual authentication protection batch verification signature method suitable for Internet of vehicles, and the method may be classified into a key generation and pre-distribution phase, a virtual identity generation and message signature phase, a message verification phase, a message batch verification phase, and a signature key extraction phase after twice signatures of a vehicle user. Through the identity-based condition privacy protection method of Internet of vehicles for dual authentication protection batch verification signature, the conditional privacy protection scheme of Internet of vehicles is realized, which not only avoids the key escrow problem and the re-signature problem, but also improves the calculation efficiency of Internet of vehicles when signature verification. The invention realizes the conditional privacy protection of the networking users and may be safely used in the open Internet of vehicles.

3 citations

Journal Article
TL;DR: A sequence number is introduced for every update message, and a digital self-certified signature scheme with message recovery is fuse to prevent the sequence number from being tampered without introducing extra burden of computation.
Abstract: Most of current existing schemes for securing inter-domain routing whose security is popularly accepted,eg.S-BGP,can not distinguish whether an update message is a regular update message for announcing route(s) or malicious replay for route(s) which have been withdrawn before.This security hole can pose serious threat to the Internet security about the inter-domain routing.In this paper,we analyse this hole in detail,and present a method for remedying it.In this presented method,we introduce a sequence number for every update message,and fuse a digital self-certified signature scheme with message recovery.This presented method can prevent the sequence number from being tampered without introducing extra burden of computation.When the speaker router of an autonomous system receives an update message for announcing or withdrawing route(s),it can prevent this kind of replay attack by its mechanisms about caching,comparing and judging these sequence numbers,so as to achieve a scheme for securing the announcements and withdrawals of inter-domain routes at the same time the heavy tasks of certificate storage and management are eliminated without introducing key escrow.

3 citations

Journal ArticleDOI
TL;DR: This paper provides a pairing-free CLI scheme, provable secure against passive and active/concurrent attacks for both Type-1 and Type-2 adversaries, and shows that the scheme is computationally efficient because no bilinear pairings are involved.
Abstract: Certificateless identification CLI schemes offer an alternative solution to the certificate management problem of traditional identification schemes, as well as remove the key escrow from key generation, an inherent property of identity-based identification In this paper, we provide a pairing-free CLI scheme, provable secure against passive and active/concurrent attacks for both Type-1 and Type-2 adversaries This shows that our scheme is computationally efficient because no bilinear pairings are involved

3 citations

Book ChapterDOI
01 Jan 2015
TL;DR: This work is proposing a security scheme that would benefit from both hierarchical and distributed approaches, with special attention to key escrow and key issuing, and envisioning some applications that will benefit from such a security schemes.
Abstract: There is a major concern in the field of Wireless Sensor Networks regarding information security in very large infrastructures, where classical security models cannot be applied due to the very strict resource constraints of network nodes. For this, identity based cryptographic schemes, distributed key generators and hierarchical security infrastructures have been intensively discussed but, from our knowledge, no proposals have been made that would also cover two very important issues regarding this type of security systems – secure key issuing and key escrow. We are proposing such a security scheme that would benefit from both hierarchical and distributed approaches, with special attention to key escrow and key issuing. Also, we are envisioning some applications that would benefit from such a security scheme.

3 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958