Research on key escrow technology Based on software

被引:0
|
作者
Yu, Zhengli [1 ]
机构
[1] Univ Liverpool, Dept Comp Sci, Liverpool L69 3BX, Merseyside, England
关键词
D O I
10.1088/1742-6596/1168/3/032131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of e-commerce, security issues have attracted more and more attention. In this paper, PKI-based electronic commerce security key escrow technology and protocol are studied, the role of PKI in e-commerce security and the application characteristics of PKI are explained, and the design scheme of a digital authentication system based on PKI is described.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Mitigating key escrow in attribute-based encryption
    Wang, Yongtao
    Liu, Xiaonan
    Liang, Lulu
    Feng, Weiduan
    Yang, Guang
    International Journal of Network Security, 2015, 17 (01) : 94 - 102
  • [22] New key escrow scheme based on digital certificate
    Xie, Dong-Qing
    Xiong, Zheng-Guang
    Li, Chao
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2001, 28 (06):
  • [23] Key escrow with tree-based access structure
    Schaffer, M
    Schartner, P
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 454 - 459
  • [24] Key Escrow Scheme with the Cooperation Mechanism of Multiple Escrow Agents
    Fan, Qiang
    Zhang, Mingjian
    Zhang, Yue
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (5B): : 116 - 118
  • [25] A new key escrow cryptosystem
    He, JM
    Dawson, E
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 105 - 114
  • [26] Crypto backup and key escrow
    Maher, DP
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 48 - 53
  • [27] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
    Wang, Zhen
    Ma, Zhaofeng
    Luo, Shoushan
    Gao, Hongmin
    IEEE ACCESS, 2019, 7 : 149080 - 149096
  • [28] Protecting against key escrow and key exposure in identity-based cryptosystem
    Wang, Jin
    Bai, Xi
    Yu, Jia
    Li, Daxing
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +
  • [29] On the key escrow system without key exchange
    Lee, Yung-Cheng
    Laih, Chi-Sung
    Computers and Electrical Engineering, 1999, 25 (04): : 279 - 290
  • [30] On solutions to the key escrow problem
    Hoyle, MP
    Mitchell, CJ
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 277 - 306