A threshold key escrow scheme based on public key cryptosystem

被引:0
|
作者
Zhenfu Cao
机构
[1] Harbin Institute of Technology,Department of Mathematics
来源
Science in China Series E: Technological Sciences | 2001年 / 44卷
关键词
key escrow scheme; threshold cryptography; public key cryptosystem; improved RSA cryptosystem; LEAF;
D O I
暂无
中图分类号
学科分类号
摘要
In key escrow field it is important to solve the problem that user's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.
引用
收藏
页码:441 / 448
页数:7
相关论文
共 50 条
  • [1] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [3] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [4] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [5] A new key escrow cryptosystem
    He, JM
    Dawson, E
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 105 - 114
  • [6] A dynamic threshold commercial key escrow scheme based on conic
    Long, Y
    Cao, ZF
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 972 - 982
  • [7] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [8] Protecting against key escrow and key exposure in identity-based cryptosystem
    Wang, Jin
    Bai, Xi
    Yu, Jia
    Li, Daxing
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +
  • [9] Key Management Scheme Based on (t, n) Threshold Cryptosystem
    Zhou, Xuanwu
    Wei, Ping
    2008 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2008, : 1288 - 1293
  • [10] A public-key-based key escrow system
    Nechvatal, J
    JOURNAL OF SYSTEMS AND SOFTWARE, 1996, 35 (01) : 73 - 83