Topic
Key escrow
About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.
Papers published on a yearly basis
Papers
More filters
••
1 citations
•
TL;DR: Proposed system immediately enhances backward/forward secrecy, escrows-free key issuing protocol and monotone access structure for security and efficient management in confidential data.
Abstract: A military environment such as a battlefield or a hostile region is likely to suffer from temporary disconnections like jamming, environmental factors, and mobility. Disruption tolerant network [1] are the successful solution that allow wireless devices carried by soldiers to communicate with each other and access the confidential information by exploration storage nodes includes authorization policy or by updating policy .The policies include cipher- text policy attribute based encryption enables encryptors to choose an access policy on attributes and to encrypt confidential data under the access structure via encrypting with the corresponding public keys or attributes . The problem of applying Cp-Abe [2] in DTN includes attribute revocation, key escrow, and coordination of attribute. In proposed system, immediately enhances backward/forward secrecy, escrows-free key issuing protocol and monotone access structure for security and efficient management in confidential data.
1 citations
••
TL;DR: A new certificateless Chameleon signature scheme based on bilinear pairings is proposed, which is more efficient than AL-Riyami and Pateson [10] schemes and un-forgeable under the hardness assumption of the q-strong Diffie-Hellman problem and Computational Diffie, Hellman problem.
Abstract: Certificateless public key cryptography (CL-PKC), does not require the use of the certificate to guarantee the authenticity of public keys. It does rely upon the use of a trusted third party (TTP), who is in possession of a master key. CL-PKC does not suffer from the key escrow property. Thus, CL-PKC can be seen as a model for the use in public key cryptography. In this paper, we proposed a new certificateless Chameleon signature scheme based on bilinear pairings. The proposed scheme is more efficient than AL-Riyami and Pateson [10] schemes. And our scheme is un-forgeable under the hardness assumption of the q-strong Diffie-Hellman problem and Computational Diffie-Hellman problem.
1 citations
••
16 Jul 2010TL;DR: A certificateless-signature-based authenticated key agreement protocol is designed, which aims at circumventing the key escrow issues inherited in the identity-based schemes and the certifcate management burden in PKI-based cryptosystems in grid.
Abstract: The traditional authentication for grid is based on PKI framework, using standard X.509 certificates. But with the growing scale of the grid, certificate management would become an encumbrance. However, certificateless-based signature scheme can overcome these problems for its certificate-free feature, and make authentication more efficient. In this paper, a certificateless-signature-based authenticated key agreement protocol is designed, which aims at circumventing the key escrow issues inherited in the identity-based schemes and the certifcate management burden in PKI-based cryptosystems in grid. Then its security and performance analysis are made, which shows that the new protocol is secure and efficient.
1 citations
••
01 Nov 2014TL;DR: An improved version of Zhang et al.'s certificateless signature scheme based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.
Abstract: Certificateless-based signature can eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. In 2012 Zhang et al. [J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme, Journal of Systems and Software, vol. 85, pp. 638-642, 2012] proposed the first certificateless signature scheme based on RSA operations and showed that their scheme is provably secure in the random oracle model. However, He et al. [D. He, M.Khan, and S. Wu, On the security of a RSA-based certificateless signature scheme, International Journal of Network Security, vol.16, no.1, pp.78-80, 2014] recently showed that Zhang et al.'s scheme is insecure against a type I adversary who can replace users' public keys. In this paper, we propose an improved version based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.
1 citations