Topic
Key escrow
About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.
Papers published on a yearly basis
Papers
More filters
•
TL;DR: The theoretical and experimental analyses indicate that the safety problems of E-government system is better solved and this safety solution based on hierarchical IBE has promising application prospect.
Abstract: The mechanism of public key infrastructure(PKI) and identity-based encryption(IBE) is analyzed to solve the safety problems of E-government system,and a safety solution based on hierarchical IBE(HIBE) is proposed for E-government system.With HIBE as its core,this solution utilizes such methods as: any string of the user identity as public key;strict verification of user identity;elliptic curve encryption;and setting up hierarchical key server,etc.to ensure the confidentiality,integrity,serviceability,and non-repudiation during data transmission and storage.This effectively deals with such problems as high deployment cost,complicated identity verification,key escrow and low efficiency of PKI and IBE mechanism.The theoretical and experimental analyses indicate that the safety problems of E-government system is better solved and this mothod has promising application prospect.
1 citations
••
16 Dec 2002TL;DR: Requirements for security and trusty of the identity escrow scheme are suggested and new mechanism is proposed to satisfy them and improved mechanism able to support key escrow in encryption communication using the key generated by key agreement among users in the same domain are proposed.
Abstract: When a user and a service provider carry out the authentication process, a user's identity may be exposed and this issue has become a serious social problem. To solve this problem, identity escrow scheme is suggested. In the identity escrow scheme, the issuer who has accurate user identity safely transmits anonymous authentication information to the user and by utilizing this information, the user proceeds authentication steps with the service provider while keeping anonymity. In this thesis, requirements for security and trusty of the identity escrow scheme are suggested and new mechanism is proposed to satisfy them. Also, methods for a service provider to safely transmit the contents to the user and improved mechanism able to support key escrow in encryption communication using the key generated by key agreement among users in the same domain are proposed.
1 citations
••
18 Nov 2008TL;DR: The weakness of Feng Cao et al's improved scheme is shown, and an improvement is proposed which reaches the goal of avoiding key escrow problem and enhances efficiency.
Abstract: In 2005, Sui et al. proposed two separable and anonymous identity-based key issuing schemes, but the impersonation attack is proposed to show that Sui et al. 's second protocol is not free from the key-escrow problem. In order to solve such problem, Feng Cao et al. proposed an improved scheme in 2006. However, in the paper, we find that Feng Cao et al. 's scheme is still vulnerable to the impersonation attack. According, the current paper first shows the weakness of Feng Cao et al's improved scheme, and then proposes our improvement which reaches the goal of avoiding key escrow problem and enhances efficiency.
1 citations
••
TL;DR: A new paradigm for the design of key recovery systems called hybrid key escrow will be presented and it will be shown that such a design can guard the privacy of system users and at the same time enable authorized key recovery.
1 citations