Key Escrow Scheme with the Cooperation Mechanism of Multiple Escrow Agents

被引:0
|
作者
Fan, Qiang [1 ]
Zhang, Mingjian [1 ]
Zhang, Yue [1 ]
机构
[1] Hunan Police Acad, Dept Comp Sci & Technol, Changsha, Hunan, Peoples R China
来源
PRZEGLAD ELEKTROTECHNICZNY | 2012年 / 88卷 / 5B期
关键词
key escrow; multi-group escrow agent; cooperation mechanism; advanced threshold scheme; ALGORITHM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal privacy is a common problem. Assuming that there are two Escrow Agent groups (Escrow party), one is designated by the government, while the other is unofficial. The two groups can achieve mutual supervision and dependence, thus implementing monitoring for users by the cooperation rather than by only a single one. If the number of the mutual participation is less than the required threshold number, the monitoring cannot be achieved. Therefore, an equation set corresponding to the specific program can be constructed, for example, multiply i(th) equation and j(th) equation to get an (i+j)(th) equation. As long as this kind of equation set is established, various key escrow schemes involved by several Escrow Agent groups can be constructed. Nowadays, the increasing political, economic, and cultural exchanges all over the world will lead to more and more transnational crime and terrorist attacks, so this program can be adapted to the multinational (or multi-organization) key escrow cooperation.
引用
收藏
页码:116 / 118
页数:3
相关论文
共 50 条
  • [1] A key escrow scheme of the escrow agent with the denial right
    Fan, Qiang
    Liu, Xu-Chong
    Liu, Hai-Yun
    Zhang, Tianming
    Information Technology Journal, 2013, 12 (16) : 3825 - 3830
  • [2] Democratic key escrow scheme
    Man, CW
    Safavi-Naini, R
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 249 - 260
  • [3] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao, 3 (72-75):
  • [4] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 1998, 21 (03): : 72 - 75
  • [5] Key escrow
    Balch, T
    COMMUNICATIONS OF THE ACM, 1996, 39 (07) : 24 - 24
  • [6] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [7] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [9] Key Escrow woes
    Kientzle, T
    DR DOBBS JOURNAL, 1998, 23 (04): : 18 - 18
  • [10] New key escrow scheme based on digital certificate
    Xie, Dong-Qing
    Xiong, Zheng-Guang
    Li, Chao
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2001, 28 (06):