scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
01 Jan 2016
TL;DR: This paper proposes a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently and demonstrates how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
Abstract: Mobile nodes in military environments such as a Battlefield or hostile regions are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of Authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP- ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. Keywords— Access control, attribute-based encryption (ABE), disruption-tolerant network (DTN),multiauthority, secure data retrieval.

2 citations

Journal ArticleDOI
TL;DR: This work states that the use of strong encryption will become even more critical as more communications and commercial transactions are transmitted over computer networks.

2 citations

Journal ArticleDOI
TL;DR: This paper proposes a certificateless signature whose security depends on two mathematical hard problems, discrete logarithm and factoring problems, and can be proved secure in the random oracle, and only both of the two mathematicalhard problems are solved, can the proposed signature be broken.
Abstract: Certificateless signature can effectively immue the key escrow problem in the identity-based signature scheme. But the security of the most certificateless signatures usually depends on only one mathematical hard problem, which makes the signature vulnerable when the underlying hard problem has been broken. In order to strengthen the security, in this paper, a certificateless signature whose security depends on two mathematical hard problems, discrete logarithm and factoring problems, is proposed. Then, the proposed certificateless signature can be proved secure in the random oracle, and only both of the two mathematical hard problems are solved, can the proposed signature be broken. As a consequence, the proposed certificateless signature is more secure than the previous signatures. On the other hand, with the pre-computation of the exponential modular computation, it will save more time in the signature signing phase. And compared with the other schemes of this kind, the proposed scheme is more efficient.

2 citations

01 Jan 2012
TL;DR: In this study, an in-depth study is carried out on the controversial key escrow technology, analyzing its composition and algorithm and pointing out possible attacks and preventive measures.
Abstract: Cryptographic technology is always a highly sensitive dual-use technology. All nations have to face a dilemma in terms of password usage: on the one hand, to fully guarantee the safety and confidentiality of personal communication, as well as personal privacy and communication freedom required by law; on the other hand, to make sure law-enforcing departments and security organs crack down and prevent crime. It might be a great help for crime and terrorist organizations that the wide application of cryptography is made public. Many people believe that plain text communicated through the public network is accessible to an appropriate government agency if law permits. Therefore, it has become a continuous hot issue of cryptographic technology that how to design a cryptographic system through which legal persons are able to protect the safety of their information, yet being monitored by government in the range permitted by law. In this study, an in-depth study is carried out on the controversial key escrow technology, analyzing its composition and algorithm and pointing out possible attacks and preventive measures.

2 citations

Proceedings ArticleDOI
01 Jan 2013
TL;DR: An efficient certificateless signature scheme is proposed that is proven secure against existential forgery of adaptively chosen message attack in random oracle model and public key replacement attack can hardly be implemented.
Abstract: Certificateless cryptography is introduced to eliminate certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. In this paper, an efficient certificateless signature scheme is proposed. It has the following advantages. First, pairing operations in signing phrase are eliminated and only two pairing operations are involved in verifying phrase, the signature length is also reduced to 160 bits. Second, user's public key is bound with his/her private key, so public key replacement attack can hardly be implemented. Last, the scheme is proven secure against existential forgery of adaptively chosen message attack in random oracle model.

2 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958