Technology of key escrow in electronic commerce

被引:0
|
作者
Pan, Y. [1 ]
Leng, Y. [1 ]
Wang, Z. [1 ]
Ren, X. [1 ]
机构
[1] Information Engineering Faculty, Fushun Petroleum Institute, Liaoning Fushun 113001, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of Internet electronic commerce has been noticed increasingly. However, the problem of its security makes people not dare into this advanced field. The subjects involving in electronic commerce activities need to prevent the other subjects from denying their activities. Some security organizations of government also need to get the encrypted key through legal means in order to track, intercept and capture criminal information. Thus the encrypted key escrow technology must be adopted and it must be of security. For the sake of security the key will be divided into several blocks which are stored in different reliable agents. The key can not be restored unless all agents work together. For designing an effective and safe key escrow, the discrete logarithm is applied for solving key escrow. The security of this algorithm completely depends on the difficulty to solve discrete logarithm, therefore, this algorithm is secure and simple when a big prime number is adopted. Moreover, adding this technology in SET will benefit the legal agency to monitor illegal activities.
引用
收藏
页码:49 / 52
相关论文
共 50 条
  • [1] UK Electronic Commerce Bill may require escrow
    不详
    COMPUTERS & SECURITY, 1999, 18 (05) : 380 - 381
  • [2] Research on key escrow technology Based on software
    Yu, Zhengli
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [3] THE UNITED-STATES KEY ESCROW ENCRYPTION TECHNOLOGY
    DENNING, DE
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 453 - 457
  • [4] Key escrow
    Balch, T
    COMMUNICATIONS OF THE ACM, 1996, 39 (07) : 24 - 24
  • [5] Electronic commerce - Security is the key to net commerce
    不详
    COMMUNICATIONS NEWS, 1996, 33 (12): : 8 - 8
  • [6] Design of key recovery system using multiple agent technology for electronic commerce
    Lim, SY
    Ham, HS
    Kim, MJ
    Kim, TY
    ISIE 2001: IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS PROCEEDINGS, VOLS I-III, 2001, : 1351 - 1356
  • [7] Key Escrow woes
    Kientzle, T
    DR DOBBS JOURNAL, 1998, 23 (04): : 18 - 18
  • [8] On the key recovery of the Key Escrow System
    Lee, YC
    Laih, CS
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 216 - 220
  • [9] INTERNET TECHNOLOGY IN ELECTRONIC COMMERCE
    Zhanys, A. B.
    Tursinbaeva, A. F.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [10] A key escrow scheme of the escrow agent with the denial right
    Fan, Qiang
    Liu, Xu-Chong
    Liu, Hai-Yun
    Zhang, Tianming
    Information Technology Journal, 2013, 12 (16) : 3825 - 3830