scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Posted Content
TL;DR: In this article, a group signature scheme without trusted PKG (private key generator) from bilinear pairings is proposed, where the dishonest PKG impersonates an honest user to communicate with others, and the user can provide a proof of treachery of the PKG afterwards.
Abstract: We argue that traditional ID-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we propose new ID-based public key systems without trusted PKG (Private Key Generator) from bilinear pairings. In our new ID-based systems, if the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to CA-based systems. Therefore, our systems reach the Girault’s trusted level 3. Furthermore, we propose a group signature scheme under the new systems, the security and performance of which rely on the new systems. The size of the group public key and the length of the signature are independent on the numbers of the group.

2 citations

Posted Content
TL;DR: This paper proposes a new certificate-based AKA protocol and proves its security strictly in the random oracle model and shows that the proposed protocol outperforms all the previous certificate- based AKA protocols.
Abstract: Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptography while eliminating the key escrow problem in identity-based cryptography. So far, three authenticated key agreement (AKA) protocols in the setting of certificate-based cryptography have been proposed in the literature. Unfortunately, none of them are secure under the public key replacement (PKR) attack. In this paper, we first present a security model for certificate-based AKA protocols that covers the PKR attacks. We then explore the existing three certificate-based AKA protocols and show the concrete attacks against them respectively. To overcome the weaknesses in these protocols, we propose a new certificate-based AKA protocol and prove its security strictly in the random oracle model. Performance comparison shows that the proposed protocol outperforms all the previous certificate-based AKA protocols.

2 citations

Journal ArticleDOI
TL;DR: In certificateless encryption scheme, key generation process is divided in between the user and the cloud, and the data owner can send same data to multiple clients with minimum cost.
Abstract: Security is a serious issue in cloud computing. Encryption is the solution for the security in cloud. There are many encryption techniques. Each one has its own merits and demerits. In the case of identity based encryption it is free from security mediator, predefined keys are there, and have the problem of key escrow and certificate revocation. Then the arrival of mediated certificateless scheme eliminates the key escrow problem, and certificate revocation problem. In certificateless encryption scheme, key generation process is divided in between the user and the cloud. In our system data owner encrypt the data using its secret key. Then the data owner encrypt the secret key twice. Hence formed intermediate keys. Then send this encrypted data and intermediate keys to cloud. The cloud partially decrypt the intermediate key and send partially decrypted data and encrypted data to required user. The user decrypt the partialy decrypted data. Then the user will get the required key for decryption. so the user can decrypt it completly.The main advantage of our system is, the data owner can send same data to multiple clients with minimum cost.

2 citations

Book ChapterDOI
19 Jul 2021
TL;DR: Wang et al. as mentioned in this paper proposed a post-quantum certificateless ring signature algorithm over lattice, which can hide the signer identity information and resist quantum computing attacks and effectively avoid certificate management problem and third-party central key escrow problem.
Abstract: Classical cryptography is no longer secure under quantum computing background. In traditional sharing economy, the centralized management mode leads to data tampering and privacy leakage problems. Targeting at these problems, in our paper, a novel privacy protection scheme is designed for sharing economy based on blockchain. Firstly, we propose a post-quantum certificateless ring signature algorithm over lattice, which can hide the signer’s identity information and resist quantum computing attacks. Moreover, our proposed scheme can effectively avoid certificate management problem and third-party central key escrow problem. Secondly, we use the principle of bimodal Gaussian rejection sampling to generate signature. It can reduce the sampling times in signature phase and greatly improves the signature efficiency. Notably, the signature distribution is independent of signer’s private key, which can better avoid the disclosure of signer’s private key information. Thirdly, we construct a blockchain sharing economy transaction scheme based on the proposed signature algorithm that can protect the privacy of user. Finally, security and efficiency of our scheme are analyzed that have lower storage cost and time cost than other related schemes under the random oracle model.

2 citations

Proceedings ArticleDOI
01 Jan 2008
TL;DR: This paper proposes an efficient group key agreement and recovery mechanism based on key escrow systems for ad hoc networks and shows how nodes randomly change their operation and perform authentication services for specific groups.
Abstract: Ad hoc networks are dynamic peer-to-peer wireless networks composed of a collection of nodes which employ wireless transmission methods in a self-organized way without relying on fixed infrastructure or predetermined connectivity. Such networks pose great challenges in group communication. In this paper, we propose an efficient group key agreement and recovery mechanism based on key escrow systems for ad hoc networks. Nodes randomly change their operation and perform authentication services for specific groups.

2 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958