scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal Article
TL;DR: The result shows that the new certificateless proxy signature scheme solves all the problems of certificate management and key escrow, and also satisfies all the required characteristics of proxy signature.
Abstract: The existing proxy signature schemes are based on certificate public key cryptography and identity-based cryptography,which have the problems of certificate management or key escrow.Based on the merit of certificateless public key cryptography,a new certificateless proxy signature was proposed.The result shows that the new proxy signature scheme solves all the problems of certificate management and key escrow,and also satisfies all the required characteristics of proxy signature.It is more efficient than the existed ID-based proxy signatures.

1 citations

Proceedings ArticleDOI
14 Mar 2011
TL;DR: Unlike other approaches that require complex private or public keys, an efficient CLE protocol is presented in this paper, which uses very small private and public keys and is appropriate for communication in low-bandwidth channels.
Abstract: The notion of certificate less public key encryption (CL-PKE or CLE) was initiated by Al Riyami and Paterson and grew out of the need for a public key mechanism to eliminate the built-in key escrow of identity based encryption (IBE) without introducing digital certificates and the management overhead that this entails. Unlike other approaches that require complex private or public keys, an efficient CLE protocol is presented in this paper, which uses very small private and public keys and is appropriate for communication in low-bandwidth channels. To support our comparative claims, implementation issues and complexity results are discussed in detail.

1 citations

Journal Article
TL;DR: The scheme is based on certificateless cryptos system, so it can overcome the key escrow of ID-based cryptosystem, and avoid the public key management and storage of certificate-basedcryptosystem.
Abstract: This paper proposes a certificateless verifiable ring signature schemeIt is based on the concepts of certificateless cryptosystem and verifiable ring signature schemeThe scheme has the properties of ring signature scheme,if necessary,the actual signer can prove to the verifier that he(she) actually signed the signatureThe scheme is based on certificateless cryptosystem,so it can overcome the key escrow of ID-based cryptosystem,and avoid the public key management and storage of certificate-based cryptosystem

1 citations

Book ChapterDOI
13 May 2018
TL;DR: This paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner and is proven to be unforgeable against the message attacks.
Abstract: Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminating the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic schemes, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it is noticed that the proposed scheme requires minimum encryption time and decryption time than the existing schemes.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958