Qiang Fan
Department of Computer Science, Hunan Police Academy, Changsha, China
Xu-chong Liu
Department of Computer Science, Hunan Police Academy, Changsha, China
Hai-yun Liu
School of Computation Management, Hunan University of Commerce, Changsha, China
Tianming Zhang
Hunan Changgao High Voltage Switchgear Group Co., Ltd, Changsha, China
ABSTRACT
The large-scale application of network heavily relies on the information security and the cryptography is the core of information security. The key escrow is one of the hot topics of encryption technology in recent years. As for the general key escrow scheme, the private key is divided into n parts and the private key can be reconstructed if k (k = n) escrow agents hand over their hosting parts. At the same time, one or several escrow parties can be also given several (fewer than k) key parts so as to have greater weight. But this is only the simplest weight consideration. The flexible set of the escrow parties (escrow agent) hasnt been considered in these schemes. In this paper, an important problem that is widely overlooked has been addressed, namely an escrow party is the most trusted or the most important who has the denial right. And the joint stratagem of all other agents is not workable over monitoring users without its participation. In this paper, the design of the key escrow scheme in which an escrow agent must participate has been described. The most important escrow party can be the notary public, the reliable department designated by the government or the authorities recognized by the government and the civil society. It should be cooperated with other escrow parties and the number of co-escrow parties should reach to the threshold value. Then the private key can be recovered.
PDF References
How to cite this article
Qiang Fan, Xu-chong Liu, Hai-yun Liu and Tianming Zhang, 2013. A Key Escrow Scheme of the Escrow Agent with the Denial Right. Information Technology Journal, 12: 3825-3830.
DOI: 10.3923/itj.2013.3825.3830
URL: https://scialert.net/abstract/?doi=itj.2013.3825.3830
DOI: 10.3923/itj.2013.3825.3830
URL: https://scialert.net/abstract/?doi=itj.2013.3825.3830
REFERENCES
- Duan, S.S., 2008. Certificateless undeniable signature scheme. Inform. Sci. Int. J., 178: 742-755.
CrossRefDirect Link - Esnaashari, M. and M.R. Meybodi, 2008. A cellular learning automata based clustering algorithm for wireless sensor networks. Sensors Lett., 6: 723-735.
CrossRefDirect Link - Fan, Q., M.J. Zhang and Y. Zhang, 2012. Key escrow scheme with the cooperation mechanism of multiple escrow agents. Przeglad Elektrotechniczny, 88: 116-118.
Direct Link - Fan, Q., M.J. Zhang and Y. Zhang, 2012. Key escrow attack risk and preventive measures. Res. J. Applied Sci. Eng. Technol., 4: 2818-2823.
Direct Link - Nechvatal, J., 1996. A public-key-based key escrow system. J. Syst. Software, 35: 73-83.
CrossRefDirect Link