scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Dissertation
02 Jun 2014
TL;DR: Signcryption is the cryptographic primitives that provides signature as well as encryption at the same time on a single step.
Abstract: In cryptography for sending any information from sender to receiver, we have to ensure about the three types of security policies i.e. integrity, confidentiality and authentication. For confidentiality purpose, encryption-decryption technique is used and for authentication purpose digital signature is used, so to ensure this three properties, first sender encrypt the message and then sign the message. Same process done at the receiver end that means first message is decrypted then verified, so it's two step process that increases the communication as well as computation cost. But in many real life applications where more speed and less cost is required like e-commerce applications, we can't use signature then encryption technique, so signcryption is the cryptographic primitives that provides signature as well as encryption at the same time on a single step. First signcryption scheme is proposed by Yullian Zheng in 1997, Since then many signcryption scheme is proposed based on elliptic discrete logarithm problem (ECDLP) , Bilinear pairing, Identity Based and certificateless environment. Many of the Signcryption scheme used Random Oracle Model for their security proofs and few are based on standard model.

1 citations

Journal ArticleDOI
TL;DR: Li et al. as discussed by the authors proposed a lightweight and verifiable ciphertext-policy attribute-based encryption (CP-ABE)-based multiauthority access control scheme for edge computing-assisted Internet of Things (IoT), which adopts the method of outsourcing decryption to mitigate the computational cost of data users with limited resources.
Abstract: As an extension of cloud computing, edge computing has attracted the attention of academia and industry because of its characteristics of low latency, high bandwidth, and low energy consumption. However, due to limited terminal resources and insufficient security design, the edge computing environment still faces many challenges in terms of data security and privacy protection. Among them, how to effectively control access to outsourced data is one of the main issues. In this article, we propose a lightweight and verifiable ciphertext-policy attribute-based encryption (CP-ABE)-based multiauthority access control scheme for edge computing-assisted Internet of Things (IoT), which adopts the method of outsourcing decryption to mitigate the computational cost of data users with limited resources. In addition, our scheme realizes the feature of attribute revocation, and the design of the multiauthority mechanism enables our scheme to avoid the problem of key escrow. Therefore, our proposed scheme not only ensures data confidentiality but also can resist the collusion attack. Besides, our scheme is secure against the chosen plaintext attack in the random oracle model under the decision $q$ -BDHE assumption. Finally, we compared our scheme with some related work in performance, and the results demonstrate that our scheme is efficient in computation and communication. Because our scheme greatly mitigates the overhead of data users, it is very suitable for edge computing supported IoT applications with restricted computation resources.

1 citations

Journal Article
TL;DR: This scheme essentially reduced communication overhead of the asymmetric key management in mobile ad hoc networks by the private key generation (PKG) distributing a subset of master key for every node beforehand and a time-based key update approach.
Abstract: In order to reduce communication overhead of the asymmetric key management in mobile ad hoc networks,an identity-based pre-distribution asymmetric key management scheme(PAKMS) was presented based on combined public key(CPK) framework,ElGamal public key cryptosystem and key pre-distribution modeThis scheme essentially reduced communication overhead of the asymmetric key management in mobile ad hoc networks by the private key generation(PKG) distributing a subset of master key for every node beforehand and a time-based key update approachThe method that PKG pre-distributed a subset of master key also made the nodes obtain their keys and key update services,which did not need to rely on online PKGThus,the inherent key escrow problem existing in identity-based asymmetric key management was avoided to some degreeCompared with typical schemes,this scheme needed much less communication overhead to accomplish node key update serviceFurthermore,security proof of the scheme was described in detail

1 citations

Patent
07 Feb 2008
TL;DR: In this article, an escrow, title, insurance, banking, or loan-related company is required to provide a rekeying service for a property's security features, such as security enhancements.
Abstract: Improvement of a property's security features, such a rekeying, is offered by an escrow, title, insurance, banking, or loan-related companies as part of their services to the purchasers. Once ratified by the purchaser, the company coordinates with a provider of a particular security feature for the installation of or providing of the security related good or service in addition to the non-security related service provided.

1 citations

Journal Article
TL;DR: This paper uses advanced encryption standard (AES), hash algorithms, and accountable keypolicy attribute-based encryption without key escrow (WOKE-AKPABE) to build a security cloud storage scheme that can resist conspired attacks.
Abstract: With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable keypolicy attribute-based encryption without key escrow (WOKE-AKPABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks. Keywords—Cloud storage security, sharing storage, attributes, Hash algorithm.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958