scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal Article
TL;DR: The proposed scheme is ID-based, but without any assumption of pre-fixed trusted relationship between users and PKG, which effectively solves the problem that exists in some existing ID- based public key cryptosystems in which a trusted PKG and key escrow are needed.
Abstract: Xiaofeng Wang and Shangping WangSchool of Science, Xi’an university of technology, Xi’an 710048, P.R.ChinaE-mail: xfwang66@sina.com.cnKeywords: ID-based signature, ID-based mediated signature, without trusted PKG, immediate revocation, GDH groupReceived: July 14, 2008Mediated Signature Scheme provides an efficient method for fast revocation of a user’s identity in identity(ID)-based cryptosystems. The only ID-based mediated signature scheme was proposed by Cheng et al.from bilinear pairing in [8]. Unfortunately, their scheme has an inherent flaw that the PKG is fully capableto generate a valid mediated signature of some message on behalf of its signers by only utilizing thepublic information of the system. In this paper, an efficient ID-based mediated signature scheme withouttrusted PKG is proposed. Compared with the scheme [8], the proposed scheme has other property besidesachieving immediate revocation of a signer’s ID. That is, proposed scheme is ID-based, but without anyassumption of pre-fixed trusted relationship between users and PKG, which effectively solves the problemthat exists in some existing ID-based public key cryptosystems in which a trusted PKG and key escrow areneeded.Povzetek: Predstavljena je metoda elektronskega podpisovanja.

2 citations

Journal ArticleDOI
TL;DR: This paper shows that this proposed class of Boolean permutations can be easily inverted without the knowledge of the secret key parameters, which allows the cryptanlyst to efficiently recover the session key using the known public key parameters.

2 citations

Journal Article
TL;DR: An escrow scheme based on discrete logarithm was presented and the operation process of sending and receiving message of the user was described, and how the government can obtain the plain text from the ciphertext with the help of escrow agent.
Abstract: Certificate authority and key escrow agent are the two key components of PKI (public key infrastructure) To prevent the user from evading key escrow and protect the escrowed private key, an escrow scheme of Electronic Commerce was researched based on PKI This paper first discussed the concept of key escrow and key escrow agent, then made some researches on key escrow system, including its components and structure It analyzed the relationship between the digital certificate and the escrowed key On the basis of it, an escrow scheme based on discrete logarithm was presented It also described the operation process of sending and receiving message of the user, and how the government can obtain the plain text from the ciphertext with the help of escrow agent

2 citations

01 Jan 2015
TL;DR: This paper proposes a secure scheme for retrieval of data using CP-ABE for de-centralized DTNs where the authorities of multiple key look after their attribute independently, distributed in the Disruption-tolerant military networks.
Abstract: Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are emerging to become most successful solutions which allows the wireless devices to be carried by the soldier in-order to make communication with each other and access the information that are confidential or commands are made reliable by exploiting the external storage nodes. There are some of the most challenging issues present in this scenario, they are enforcement of authorization policy and policies that are updated for processing the data retrieval in a secure manner. Cipher text policy attribute-based encryption (CP- ABE) is a significant solution for cryptography in-order to access the control issues. The problem of implementing the CP-ABE is a de-centralized DTNs origins many security and privacy challenges regarding to attribute revocation key escrow, and co-ordinates of attributes given from different authorities. In this paper, we propose a secure scheme for retrieval of data using CP-ABE for de-centralized DTNs where the authorities of multiple key look after their attribute independently. We illustrate how to apply the proposed system to manage the confidential data with security and efficiency, distributed in the Disruption-tolerant military networks.

2 citations

Book ChapterDOI
21 Jun 2021
TL;DR: In this article, the authors proposed an efficient certificate-based signature over bilinear groups in the standard model, which is superior in both communication cost and computational overhead compared with the state-of-the-art constructions in the traditional model.
Abstract: Certificate-based cryptography optimizes certificate management of the traditional public key infrastructure (PKI) and overcomes the problems of the key escrow and the key distribution in identity-based cryptography (IBC). Currently, many certificate-based signature (CBS) schemes have been proposed in the random oracle model or standard model. However, all existing schemes in the standard model are quietly inefficient. In this paper, we propose an efficient certificate-based signature over bilinear groups in the standard model. Compared with the state-of-the-art constructions in the standard model, the proposed scheme is superior in both communication cost and computational overhead.

2 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958