scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity.
Abstract: As Hierarchical Identity Based Encryption (HIBE) system usually maps the true institutional structure of an organization or entity relationship between objects in real world, It is important that computation & communication complexity of private key, ciphertext, cryptographic computations and so on related to an entity in the hierarchy is independent to the hierarchy depth of the entity. Moreover, key escrow problem that any non-leaf entity in a hierarchical identity based cryptosystem can derive private keys for its descendants with use of its private key should be resolved, in order to prevent any entity from behaving on behalf of its descendants. In this paper, a new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity. That we call Identifier Discrimination. With the technique, A selective identity secure HIBE system is constructed under Decisional Bilinear Diffie-Hellman (DBDH) assumption without using random oracles, where the private key and the ciphertext consist of constant number of group elements, and decryption requires only three bilinear map computations, regardless of the identity hierarchy depth. Moreover, in contrast to previous HIBE constructions, where private key for an entity can be derived by its ancestors with direct use of their private keys, key escrow problem inherent in identity based cryptosystems is resolved in our HIBE construction. Privilege of deriving private keys for an entity can be delegated to any of its ancestors through authorization by distributing specifically crafted values to the ancestor in our HIBE system, that we call Authorized Delegation.

1 citations

01 Jan 2012
TL;DR: This paper proposes a new construction of certificateless signature which is strongly unforgeable in the standard model with the computational Diffie-Hellman assumption in bilinear groups.
Abstract: Certificateless signature scheme eliminates the need of certificates in the traditional signature scheme and solves the inherent key escrow problem in the identity based signature scheme. In this paper, we propose a new construction of certificateless signature which is strongly unforgeable in the standard model with the computational Diffie-Hellman assumption in bilinear groups. As far as we know, this is the first certificateless signature scheme, which possesses the property of strong unforgeability in the standard model.

1 citations

Book ChapterDOI
18 Sep 2014
TL;DR: This paper puts forward a secure and efficient CLBS scheme and illustrates that the new scheme is secure in the random oracle model, and theoretically validate that the proposed scheme is more efficient than those existing ones in terms of computational complexity.
Abstract: The blind signature schemes are useful in some applications where the anonymity is a thorny issue. The certificateless public key cryptography (CL-PKC) can eliminate the certificate management problem and solve the key escrow problem. In this paper, we put forward a secure and efficient CLBS scheme. We then illustrate that our new scheme is secure in the random oracle model. Also, we theoretically validate that our proposed scheme is more efficient than those existing ones in terms of computational complexity. We hope to transfer our scheme into applications.

1 citations

Journal Article
TL;DR: Escrow is an agreement to establish an impartial and trustworthy intermediary to collect, clarify and keep documents, commercial paper, valuable goods and/or money to be given to the party or parties in accordance with the conditions set forth in the escrow agreement as discussed by the authors.
Abstract: Escrow is an agreement to establish an impartial and trustworthy intermediary to collect, to clarify and to keep documents, commercial paper, valuable goods and/or money to be hand over to the party or parties in accordance with the conditions set forth in the escrow agreement. Escrow may take a substantial role to support the implementation of various transactions. Indonesian contract law is accommodative to the formation of an escrow-like agreement. The functions and purposes of escrow are substantially acceptable to Indonesian legal system.

1 citations

Proceedings ArticleDOI
01 Apr 2017
TL;DR: A safe information system with CP-ABE along with decentralized DTNs in which numerous main authorities can manipulate own secret keys individually and the results show the way to practice the recommended implement strongly and efficaciously to address the secret facts disseminated in the disturbance tolerant military system.
Abstract: Portable hubs in military situations, for case in point, combat zone or a unreceptive province are probably going towards understanding the recurrent network connectivity and numerous barriers. Disturbance tolerant networks (DTN) advancements are getting to be a distinctly effective arrangement that allows wireless devices passed by soldiers to interact between one other and access the secure data facility reliably by misusing outer data storing centres. Probably the supreme difficult disputes in that situation are the implementation of approval strategies and arrangements apprise for safe files recovery. Attribute Based Encryption using Cipher text is an auspicious by the cryptic opportunity to regulate the respective problems. Anyways, the problem is making use of CP-ABE in decentralized DTNs offers some safeties or protection demanding situations which admire for more satisfactory disavowal, key escrow, and management of properties on distributed from one-of-a-kind experts. In this paper, our proposed system suggests a safe information system with CP-ABE along with decentralized DTNs in which numerous main authorities can manipulate own secret keys individually. Our results show the way to practice the recommended implement strongly and efficaciously to address the secret facts disseminated in the disturbance tolerant military system. We also implemented the Text-To-Speech conversion and activity tab to show the activities between the soldiers and key Authorities. Data will be automatically converted into audio output.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958