Research on key escrow technology Based on software

被引:0
|
作者
Yu, Zhengli [1 ]
机构
[1] Univ Liverpool, Dept Comp Sci, Liverpool L69 3BX, Merseyside, England
关键词
D O I
10.1088/1742-6596/1168/3/032131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of e-commerce, security issues have attracted more and more attention. In this paper, PKI-based electronic commerce security key escrow technology and protocol are studied, the role of PKI in e-commerce security and the application characteristics of PKI are explained, and the design scheme of a digital authentication system based on PKI is described.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] On the difficulty of software key escrow
    Knudsen, LR
    Pedersen, TP
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 237 - 244
  • [2] SOFTWARE-KEY ESCROW EMERGES
    WAYNER, P
    [J]. BYTE, 1994, 19 (10): : 40 - 40
  • [3] Technology of key escrow in electronic commerce
    Pan, Y.
    Leng, Y.
    Wang, Z.
    Ren, X.
    [J]. Fushun Shiyou Xueyuan Xuebao/Journal of Fushun Petroleum Institute, 2001, 21 (02): : 49 - 52
  • [4] Another approach to software key escrow encryption
    Dawson, E
    He, JM
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 87 - 95
  • [5] Component Based Software Reuse Key Technology Research and Design
    Meng Youxin
    Meng Xianghai
    Yang Weimin
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 89 - +
  • [6] THE UNITED-STATES KEY ESCROW ENCRYPTION TECHNOLOGY
    DENNING, DE
    [J]. COMPUTER COMMUNICATIONS, 1994, 17 (07) : 453 - 457
  • [7] Key escrow
    Balch, T
    [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (07) : 24 - 24
  • [8] A public-key-based key escrow system
    Nechvatal, J
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1996, 35 (01) : 73 - 83
  • [9] The Key Technology Research of Feature-Based Component-Based Software Design
    Tang Zhaohui
    Liu Heng
    Chen Qing
    Liu Jinping
    Gui Weihua
    [J]. 2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6464 - 6468
  • [10] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448