scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal Article
TL;DR: Proposed system immediately enhances backward/forward secrecy, escrows-free key issuing protocol and monotone access structure for security and efficient management in confidential data.
Abstract: A military environment such as a battlefield or a hostile region is likely to suffer from temporary disconnections like jamming, environmental factors, and mobility. Disruption tolerant network [1] are the successful solution that allow wireless devices carried by soldiers to communicate with each other and access the confidential information by exploration storage nodes includes authorization policy or by updating policy .The policies include cipher- text policy attribute based encryption enables encryptors to choose an access policy on attributes and to encrypt confidential data under the access structure via encrypting with the corresponding public keys or attributes . The problem of applying Cp-Abe [2] in DTN includes attribute revocation, key escrow, and coordination of attribute. In proposed system, immediately enhances backward/forward secrecy, escrows-free key issuing protocol and monotone access structure for security and efficient management in confidential data.

1 citations

Journal ArticleDOI
TL;DR: A new certificateless Chameleon signature scheme based on bilinear pairings is proposed, which is more efficient than AL-Riyami and Pateson [10] schemes and un-forgeable under the hardness assumption of the q-strong Diffie-Hellman problem and Computational Diffie, Hellman problem.
Abstract: Certificateless public key cryptography (CL-PKC), does not require the use of the certificate to guarantee the authenticity of public keys. It does rely upon the use of a trusted third party (TTP), who is in possession of a master key. CL-PKC does not suffer from the key escrow property. Thus, CL-PKC can be seen as a model for the use in public key cryptography. In this paper, we proposed a new certificateless Chameleon signature scheme based on bilinear pairings. The proposed scheme is more efficient than AL-Riyami and Pateson [10] schemes. And our scheme is un-forgeable under the hardness assumption of the q-strong Diffie-Hellman problem and Computational Diffie-Hellman problem.

1 citations

Proceedings ArticleDOI
16 Jul 2010
TL;DR: A certificateless-signature-based authenticated key agreement protocol is designed, which aims at circumventing the key escrow issues inherited in the identity-based schemes and the certifcate management burden in PKI-based cryptosystems in grid.
Abstract: The traditional authentication for grid is based on PKI framework, using standard X.509 certificates. But with the growing scale of the grid, certificate management would become an encumbrance. However, certificateless-based signature scheme can overcome these problems for its certificate-free feature, and make authentication more efficient. In this paper, a certificateless-signature-based authenticated key agreement protocol is designed, which aims at circumventing the key escrow issues inherited in the identity-based schemes and the certifcate management burden in PKI-based cryptosystems in grid. Then its security and performance analysis are made, which shows that the new protocol is secure and efficient.

1 citations

Journal ArticleDOI
01 Nov 2014
TL;DR: An improved version of Zhang et al.'s certificateless signature scheme based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.
Abstract: Certificateless-based signature can eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. In 2012 Zhang et al. [J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme, Journal of Systems and Software, vol. 85, pp. 638-642, 2012] proposed the first certificateless signature scheme based on RSA operations and showed that their scheme is provably secure in the random oracle model. However, He et al. [D. He, M.Khan, and S. Wu, On the security of a RSA-based certificateless signature scheme, International Journal of Network Security, vol.16, no.1, pp.78-80, 2014] recently showed that Zhang et al.'s scheme is insecure against a type I adversary who can replace users' public keys. In this paper, we propose an improved version based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958