scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper , a certificateless aggregate signcryption with online/offline encryption (CLOASC) based on edge computing (EDC) is proposed to solve the key escrow problem, shorten the encryption time and realize the quick verification of multiple users.
Abstract: The emergence of the vehicular ad-hoc network (VANETs) could meet the need for an efficient and safe transportation. Vehicles wirelessly interact with nearby road-side units (RSUs) and send the data to the cloud servers (CS), but this approach has limitations (i.e., network congestion and privacy leakage). Edge computing can effectively solve problems of network congestion, feedback delay and privacy leakage during transmission caused by CS. Thus, this paper proposes a certificateless aggregate signcryption with online/offline encryption (CLOASC) based on edge computing (EDC). Correspondingly, certificateless signcryption (CLSC), online/offline encryption (OOE) and aggregate signcryption technology solve the key escrow problem, shorten the encryption time and realize the quick verification of multiple users, respectively. Furthermore, it is worth mentioning that the scheme we propose does not have any bilinear pairings or scalar multiplications in the online encryption stage, which greatly reduces the computational cost in the online stage. In the random oracle model, our scheme was proved to be existential unforgeability under adaptive chosen message attacks (EUF-ACM) and adaptive indistinguishability under chosen-ciphertext attack (IND-CCA2) security. Simulation results show that our scheme is computationally and communication based lightweight as compared to the related.

1 citations

Journal Article
TL;DR: A new identity-based(t,n) threshold signature encryption scheme is proposed from bilinear pairings that can resist the private key generator to entrap through the introduction of secret information of the signcryptioner.
Abstract: Against the shortage of low efficiency of the existing threshold signcryption scheme and the key escrow in the id-based cryptosystem,a new identity-based(t,n) threshold signature encryption scheme is proposed from bilinear pairings.Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner.Our scheme is more efficient and practical than the existing scheme.

1 citations

Journal Article
TL;DR: The features of Payment System Participants and applying of secure encryption techniques of SET and a resolution--Key escrow to the incontestability of SET are presented.
Abstract: This paper states the features of Payment System Participants and applying of secure encryption techniques of SET. It analyses the deficiencies of secure mechanism in SET. This paper finally presents a resolution--Key escrow to the incontestability of SET.

1 citations

Journal Article
TL;DR: It’s time to get used to the idea of “novelty”.
Abstract: Certificateless public key cryptography is not only secure but also efficient because it does not suffer the cost of the certificate management in traditional public key cryptography and the key escrow problem inherited in ID-based public key cryptography.The study of proxy blind signature's consturction and applicatioan shows that present certificateless proxy blind signature schemes are very few and proxy blind signature schemes in certificateless public key systems can fulfill the safety and high efficiency required in electronic voting and e-banking and other fields better.Based on the bilinear pairing and discrete logarithm problem,a new certificateless proxy blind signature scheme which fulfils the properties of blindness,non-forgeability,identifiability,nonrepudiation and so on was given.

1 citations

Journal Article
TL;DR: Based on the special nature of bilinear pairings on elliptic curves, a new threshold key management scheme is proposed that solution the problem of Key escrow.
Abstract: Based on the special nature of bilinear pairings on elliptic curves,this paper proposed a new threshold key management schemeSome dishonest private key generators can calculate the user's private key in the reality threshold schemesTo solution this problem,we have a trusted authority in our scheme,and user can generate part private key,so this scheme solution the problem of Key escrow

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958