A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem

被引:0
|
作者
Zhang, Wenjuan [1 ]
Yu, Meisheng [1 ]
机构
[1] Yanshan Univ, Dept Comp Applicat, Qinhuangdao 066004, Hebei Province, Peoples R China
关键词
reshold scheme; elliptic curve cryptosystem; key escrow; KMC; status-tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, the key escrow scheme balances the needs between individuals and the ones of trustees. Firstly, in order to ensure the secret of communication information, the security of this scheme is based on the difficulty of solving discrete logarithm in finite filed. At the same time, since this threshold is a status-tree based (t, n) secret sharing scheme, it holds the characteristic with more efficiency and smaller computing. Secondly, user's private key is the product of the user and KMC, and the pieces of the user's private key can be verified, so the scheme can avoid user's cheating and "subliminal attack". Thirdly, escrow agents can not get all the information of user's private key and they must be verified. Therefore this scheme effectively resists escrow agents' cheating and "early recovery". Also, it can avert the cheating of KMC (Key Management Center) as well. Finally, it solves effectively the problem of "once monitor, monitor for ever". In the same breath, it prevents too much power of government supervision agency.
引用
收藏
页码:1177 / 1180
页数:4
相关论文
共 50 条
  • [1] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [2] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    [J]. Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [3] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [4] A threshold key escrow scheme based on public key cryptosystem
    曹珍富
    [J]. Science China Technological Sciences, 2001, (04) : 441 - 448
  • [5] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [6] Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem
    夏祥胜
    洪帆
    耿永军
    崔国华
    [J]. Railway Engineering Science, 2008, (01) : 18 - 23
  • [7] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [8] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [9] A NEW EFFICIENT KEY AGREEMENT SCHEME FOR VSAT SATELLITE COMMUNICATIONS BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hong, Jeong-Woo
    Yoon, Sang-Yoon
    Park, Dong-In
    Choi, Myung-Jin
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 252 - 259
  • [10] An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    Jeng, Fuh-Gwo
    Wang, Chung-Ming
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1161 - 1167