Topic
Key escrow
About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.
Papers published on a yearly basis
Papers
More filters
••
09 Apr 2016TL;DR: A secure framework is introduced, which enables the public auditor to verify EHR's without revealing patient identity and solves the key escrow issue by using two-authority key generation scheme.
Abstract: In this paper, a secured framework for storing the Electronic Health Records (EHR's) on the cloud platform without losing integrity. With the help of cloud computing, healthcare industries outsourcing their services like storing and processing of EHR's from local servers to the cloud servers. Unfortunately, Cloud Computing poses a security risk, that is EHR's integrity in the cloud server which is subjected to suspicious because of the presence of hardware/software crashes or human mistakes. Various schemes were proposed to audit cloud data integrity. However, at the time of auditing, the public auditors undoubtedly reveal the patient information. Therefore, this is a primary issue in EHR's security. To solve this problem, we introduced a secure framework, which enables the public auditor to verify EHR's without revealing patient identity. Our framework allows the auditors to audit EHR's without retrieving complete EHR files. Additionally, our framework solves the key escrow issue by using two-authority key generation scheme. Here, Key Generation Authority (KGA) and cloud server play a significant role to assign each part of the file to auditors for auditing by using Ciphertext Policy Attribute Based Encryption (CP-ABE). It allows independent auditing assignments instead of one by one.
9 citations
••
TL;DR: The proposed key agreement protocol is analyzed with respect to impersonation attacks under the difficulty in discrete logarithm problem and eavesdropping under the Decisional Difie-Hellman Problem to show the applicability of partial backward confidentiality property.
9 citations
••
01 Nov 2013
TL;DR: This article compares the two threshold scheme, and eventually proposes a key escrow program based on the Shamir threshold, which makes key management more secure and flexible.
Abstract: The Internet of Things in this article is formed of security center, key escrow centers, readers and tags. Authentication use asymmetric encryption algorithm, there is a private key in the reader / tag. When the reader / tag in some special cases, it may be lost or damaged their own private key and can't be authenticated, then the key recovery is very important. This article compares the two threshold scheme, eventually propose a key escrow program based on the Shamir threshold. Using a the shamir threshold algorithm, the private key of the reader / tag is divided into n parts and sent to key escrow centers. if you want to restore the private key, you need at least t parts. This scheme makes key management more secure and flexible.
9 citations
••
TL;DR: The proposed certificateless signature scheme is provably secure in the standard model and satisfies Girault's level-3 security, and is based on the hardness of generalized computational Diffie-Hellman and many Diffie -Hellman problems.
Abstract: In order to overcome the key escrow problem, Al- Riyami and Paterson introduced the concept of certificateless public key cryptography (CL-PKC) in 2003. CL-PKC requires neither public key certification nor the key escrow problem. After that, CL-PKC has been widely applied. In 1991, Girault defined three security levels of the key generation center (KGC), where the higher level of KGC means the stronger security of the system. Recently, lots of certificateless signature schemes and their security models have been presented. However, there is no certificateless signature scheme proposed in the literature that achieves the property of Girault's level-3 security without random oracles. In view of aforementioned issues, we propose a new construction of certificateless signature scheme. The proposed certificateless signature scheme is provably secure in the standard model and satisfies Girault's level-3 security. The security of the proposed scheme is based on the hardness of generalized computational Diffie-Hellman and many Diffie-Hellman problems.
9 citations
••
10 Jul 2000
TL;DR: Focusing on the type of communication typified by e-mail, a novel and simple scheme is constructed that provides “warrant bounds”, “admissibility’,” “surveillance switching“, ” non-directive monitoring” and many other useful properties all at the same time.
Abstract: This paper studies several of the properties necessary for public key based escrow schemes, and observes that previous schemes lack some important properties. Focusing on the type of communication typified by e-mail, we construct a novel and simple scheme that provides “warrant bounds”, “admissibility”, “surveillance switching”, “non-directive monitoring”, “off-line agency”, “target hiding” and many other useful properties all at the same time.
9 citations