Filters








111 Hits in 3.6 sec

Escrow Encryption Systems Visited: Attacks, Analysis and Designs [chapter]

Yair Frankel, Moti Yung
1995 Lecture Notes in Computer Science  
We review requirements and concerns and suggest design approaches to systems with desired properties of key escrow.  ...  We identify and perform attacks on the actual Clipper and other recent designs (fair cryptosystems, TIS software escrow, etc.).  ...  strong privacy and society's need for protection against criminal behavior.  ... 
doi:10.1007/3-540-44750-4_18 fatcat:cncuhdmpvraapb2xuu6tsefj7m

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices [chapter]

Yan Zhu, Di Ma, Shanbiao Wang, Rongquan Feng
2013 Lecture Notes in Computer Science  
We propose a new construction of identity-based encryption without key escrow over the tradition cryptosystems.  ...  In our construction, we generate each user's partial private key in the form of an MIHNPwE instance.  ...  Conclusion We propose an efficient identity-based encryption scheme without key escrow whose security follows from the DDH assumption and the hardness of MIHN-PwE.  ... 
doi:10.1007/978-3-642-39701-1_4 fatcat:ul6yek2hh5b2xlabd4lqca437a

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks

Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, Liang Hu
2013 Journal of Communications  
Furthermore, there exits key escrow problem (inherent in identity-based cryptosystems), since PKG knows the private keys of all nodes.  ...  In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type.  ...  and threshold cryptosystem √ √ √ Require offline TA in initial stage, details of share transmission not given [31] linear hierarchical schemes and noninteractive identity-based key-agreement Not against  ... 
doi:10.12720/jcm.8.11.768-779 fatcat:frkaotni2bfi7lcldt27oun2a4

Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries

K. Kalaivani
2020 Zenodo  
In this paper, we present a revocable identity based encryption scheme with cloud aided ciphertext evolution.  ...  Additionally, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen ciphertext attacks based on the BDH problem.  ...  To overcome this drawback, Shamir set forth a new notion called "Identity based public key cryptography" in 1984. This public key cryptosystem employs every user's unique identity as its public key.  ... 
doi:10.5281/zenodo.3855069 fatcat:h3vhvx7exrgc5aimlexyls2mki

GBD Threshold Cryptography with an Application to RSA Key Recovery [chapter]

Chris Steketee, Jaimee Brown, Juan M. González Nieto, Paul Montague
2005 Lecture Notes in Computer Science  
The ability to use GBD to provide RSA key recovery is based on the idea of "self-escrowed" systems introduced by [PY99], in which the private key can be recovered by an authority using the public key plus  ...  We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the "honest-butcurious" setting.  ...  In what follows we apply the threshold GBD key generation and decryption of Sections 4 and 5 to the self-escrowed scheme of González et al . [GVBD02] for integer factorisation based cryptosystems.  ... 
doi:10.1007/11506157_33 fatcat:2ogxuiosvvacdoaph7gh7k6s4m

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick McDaniel
2007 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)  
In this paper, we propose novel ID assignment protocols based on identity-based cryptography.  ...  Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.  ...  IDs and protect structured peer-topeer networks against Sybil attacks.  ... 
doi:10.1109/ainaw.2007.221 dblp:conf/aina/RyuBTM07 fatcat:6zrr66fcj5gntllql7alqudvvm

Secure communication in a distributed system using identity based encryption

T. Stading
2003 CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.  
In large, dynamic, anonymous systems, this key sharing method is not viable. Scribe is a method for efficient key management inside a distributed system that uses identity based encryption (IBE).  ...  We evaluate key distribution schemes inside Scribe and provide recommendations for practical implementation to allow for secure, efficient, authenticated communication inside a distributed system.  ...  By designing the system to protect against this type of attack, Scribe is able to defend against master key theft and offer a reliable key escrow service.  ... 
doi:10.1109/ccgrid.2003.1199395 dblp:conf/ccgrid/Stading03 fatcat:ihx7h2i6x5errgesqbxaw36jvu

A Grid Authentication System with Revocation Guarantees [chapter]

Babu Sundaram, Barbara M. Chapman
2005 Lecture Notes in Computer Science  
It guarantees instantaneous revocation of both long-term digital identities of hosts/users and short-lived identities of user proxies.  ...  Credential revocation is a critical problem in grid environments and remains unaddressed in existing grid security solutions.  ...  However, there is currently no support in GSI to protect against compromised user proxies.  ... 
doi:10.1007/11602569_52 fatcat:di2n2q32u5gjtpa2yxjuwmkxxi

ID-based key-insulated signcryption with equality test in cloud computing

Seth Alornyo, Kingsford Kissi Mireku, Mustapha Adamu Mohammed, Daniel Adu-Gyamfi, Michael Asante
2021 SN Applied Sciences  
AbstractKey-insulated encryption reduces the problem of secret key exposure in hostile setting while signcryption cryptosystem attains the benefits of digitally signing a ciphertext and public key cryptosystem  ...  In this study, we merge the primitives of parallel key-insulation cryptosystem and signcryption with equality test to construct ID-based parallel key-insulated signcryption with a test for equality (ID-PKSET  ...  In this regard, a scheme to fulfill the primitive of identity based key-insulated cryptosystem with equality test in support for EUF-CMA property is yet to be unveiled.  ... 
doi:10.1007/s42452-021-04469-9 fatcat:lkjgivehzre5bfrmi35ytvbn34

A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks

Constantin Grumăzescu, Victor-Valeriu Patriciu
2018 Journal of Military Technology  
In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues.  ...  Throughout the paper we are discussing all of these aspects in relation to the specificity of WSN based network infrastructures and applications.  ...  A significant difference between Identity Based Cryptosystems and most of the traditional PKIs systems is that the latter doesn't keep user keys in escrow.  ... 
doi:10.32754/jmt.2018.1.10 fatcat:k22rsoaovrbltlkwbirjzvx7ri

Removing Escrow from Identity-Based Encryption [chapter]

Sherman S. M. Chow
2009 Lecture Notes in Computer Science  
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user's private key to decrypt a ciphertext.  ...  Our proposal can be viewed as mitigating the key escrow problem in a different dimension than distributed KGCs approach.  ...  We propose a new system architecture with an anonymous key issuing (AKI) protocol to protect the confidentiality of the users identities.  ... 
doi:10.1007/978-3-642-00468-1_15 fatcat:y3w6wwgdmrfbvhncy3rd3ecy7a

Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain

Xiaodong Yang, Xizhen Pei, Meiding Wang, Ting Li, Caifen Wang
2020 IEEE Access  
First of all, most of the existing schemes are based on the traditional or identity public key infrastructure. There is a problem of certificate management or key escrow.  ...  In our scheme, the dynamic hash table and modification record table are introduced to achieve dynamic update of group user data and identity tracking.  ...  . • We design a multi-replica and multi-cloud public audit scheme based on certificateless cryptosystem, which not only avoids the problem of certificate management in PKI, but also solves the key escrow  ... 
doi:10.1109/access.2020.3014510 fatcat:z2ggfuob6rapxpcaq7pkm4wq7q

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

K.R.B. Butler, S. Ryu, P. Traynor, P.D. McDaniel
2009 IEEE Transactions on Parallel and Distributed Systems  
In this paper, we propose novel ID assignment protocols based on identitybased cryptography.  ...  Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.  ...  Key Escrow One of the limitations of ID-based cryptography is an unavoidable presence of key escrow.  ... 
doi:10.1109/tpds.2008.249 fatcat:7zvzadzzhvfx7nmj5nxsynbazi

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller (+3 others)
2015 Journal of Cybersecurity  
In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data.  ...  In this article, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary  ...  Alan Davidson was instrumental in the early discussions that led to this paper while he was Vice President and Director of the Open Technology Institute at the New America Foundation.  ... 
doi:10.1093/cybsec/tyv009 dblp:journals/cybersecurity/AbelsonABBBDGG015 fatcat:s3c4maqnezg7jiuqtu2nw5cejm

Keys under doormats

Harold "Hal" Abelson, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie (+3 others)
2015 Communications of the ACM  
In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary  ...  In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data.  ...  And what is the effect on innovation if every new communications product must go through government-supervised evaluation against some new key escrow protection profile?  ... 
doi:10.1145/2814825 fatcat:scbxwuxcknd3dnkm3bb2nzpfxy
« Previous Showing results 1 — 15 out of 111 results