A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

被引:15
作者
Han, Kyusuk [1 ]
Yeun, Chan Yeob [2 ]
Shon, Taeshik [3 ]
Park, Jonghyuk [4 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Taejon 305732, South Korea
[2] Khalifa Univ Sci Technol & Res, Sharjah, U Arab Emirates
[3] Samsung Elect, Convergence SW Lab, DMC R&D Ctr, Suwon 442600, South Korea
[4] Seoul Natl Univ Technol, Dept Comp Sci & Engn, Seoul, South Korea
关键词
lawful interception; ID-based cryptosystem; key escrow; mobile network; ENCRYPTION;
D O I
10.1002/dac.1165
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Key escrowing is one of the core technologies for the lawful interception (LI) of secure communications in the wired and wireless networks. Although many previous studies on the key escrowing have been done before, they are insufficient to be deployed in practical networks due to conflicts with the LI requirements. Moreover, there is lack of consideration on the LI of ID-based cryptosystem (IDBC)-based secure communication because the interest of the LI was moved to the industries and IDBC has the inherent key escrowing property. However, the inherent property of IDBC cannot prevent 'illegal' eavesdropping of all the communications in the networks from the law enforcement agency with the 'legally' obtained key. Thus, we propose a new key escrow model that satisfies the requirements of LI and overcomes the potential threats of IDBC. Our contributions enable the scalable and efficient key escrowing for the LI of secure one-way and two-pass communication in the mobile networks. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:461 / 472
页数:12
相关论文
共 18 条
[1]  
*3 GEN PARTN PROJ, 2008, 33106 3 GEN PARTN PR
[2]  
*3 GEN PARTN PROJ, 2009, 33108 3 GEN PARTN PR
[3]  
*3 GEN PARTN PROJ, 2009, 33107 3 GEN PARTN PR
[4]  
*3 GEN PARTN PROJ, 2009, 33102 3 GEN PARTN PR
[5]   A key escrow scheme with time-limited monitoring for one-way communication [J].
Abe, M ;
Kanda, M .
COMPUTER JOURNAL, 2002, 45 (06) :661-671
[6]  
[Anonymous], LNCS
[7]  
BAKER F, 2004, RFC, V3924
[8]  
BLAKE I, 1999, LONDON MATH SOC, V265
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Frankel Y, 1995, LECT NOTES COMPUT SC, V963, P222