Key escrow system for network environment based on RSA algorithm

被引:0
|
作者
Yang, Bo
Wang, Yumin
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:194 / 197
相关论文
共 50 条
  • [31] Mitigating key escrow in attribute-based encryption
    Wang, Yongtao
    Liu, Xiaonan
    Liang, Lulu
    Feng, Weiduan
    Yang, Guang
    [J]. International Journal of Network Security, 2015, 17 (01) : 94 - 102
  • [32] Key Generation Algorithm Design Combination of RSA and ElGamal Algorithm
    Iswari, Ni Made Satvika
    [J]. PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2016,
  • [33] Overcome Key Escrow Problem with Attribute-Based Data Access Policy & Efficient Cloud Environment
    Pashte, Sourabha Vijaykumar
    Awati, Chetan J.
    Kharade, Sonam S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [34] Key escrow with tree-based access structure
    Schaffer, M
    Schartner, P
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 454 - 459
  • [35] New key escrow scheme based on digital certificate
    Xie, Dong-Qing
    Xiong, Zheng-Guang
    Li, Chao
    [J]. Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2001, 28 (06):
  • [36] Loop-based RSA Key Generation Algorithm using String Identity
    Muhammad, Norhidayah
    Zain, Jasni Mohamad
    Saman, Md Yazid Mohd
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2013), 2013, : 255 - 258
  • [37] Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
    Kong, Fanyu
    Yu, Jia
    Wu, Lei
    [J]. INFORMATION SECURITY, 2011, 7001 : 95 - +
  • [38] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
    Wang, Zhen
    Ma, Zhaofeng
    Luo, Shoushan
    Gao, Hongmin
    [J]. IEEE ACCESS, 2019, 7 : 149080 - 149096
  • [39] Protecting against key escrow and key exposure in identity-based cryptosystem
    Wang, Jin
    Bai, Xi
    Yu, Jia
    Li, Daxing
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +
  • [40] ALGORITHM-121 - RSA KEY CALCULATION IN ADA
    HUNTER, DGN
    [J]. COMPUTER JOURNAL, 1985, 28 (03): : 343 - 348