A threshold key escrow scheme based on public key cryptosystem

被引:0
|
作者
曹珍富
机构
基金
中国国家自然科学基金;
关键词
key escrow scheme; threshold cryptography; public key cryptosystem; improved RSA cryptosys-tem; LEAF;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In key escrow field it is important to solve the problem that user’s secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.
引用
收藏
页码:441 / 448
页数:8
相关论文
共 50 条
  • [1] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    [J]. Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [2] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [3] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [4] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [5] A new key escrow cryptosystem
    He, JM
    Dawson, E
    [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 105 - 114
  • [6] A dynamic threshold commercial key escrow scheme based on conic
    Long, Y
    Cao, ZF
    Chen, KF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 972 - 982
  • [7] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    [J]. INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [8] Protecting against key escrow and key exposure in identity-based cryptosystem
    Wang, Jin
    Bai, Xi
    Yu, Jia
    Li, Daxing
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +
  • [9] Key Management Scheme Based on (t, n) Threshold Cryptosystem
    Zhou, Xuanwu
    Wei, Ping
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2008, : 1288 - 1293
  • [10] A public-key-based key escrow system
    Nechvatal, J
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1996, 35 (01) : 73 - 83