Technology of key escrow in electronic commerce

被引:0
|
作者
Pan, Y. [1 ]
Leng, Y. [1 ]
Wang, Z. [1 ]
Ren, X. [1 ]
机构
[1] Information Engineering Faculty, Fushun Petroleum Institute, Liaoning Fushun 113001, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of Internet electronic commerce has been noticed increasingly. However, the problem of its security makes people not dare into this advanced field. The subjects involving in electronic commerce activities need to prevent the other subjects from denying their activities. Some security organizations of government also need to get the encrypted key through legal means in order to track, intercept and capture criminal information. Thus the encrypted key escrow technology must be adopted and it must be of security. For the sake of security the key will be divided into several blocks which are stored in different reliable agents. The key can not be restored unless all agents work together. For designing an effective and safe key escrow, the discrete logarithm is applied for solving key escrow. The security of this algorithm completely depends on the difficulty to solve discrete logarithm, therefore, this algorithm is secure and simple when a big prime number is adopted. Moreover, adding this technology in SET will benefit the legal agency to monitor illegal activities.
引用
收藏
页码:49 / 52
相关论文
共 50 条
  • [31] Distributed systems technology for electronic commerce applications
    Lamersdorf, W
    Merz, M
    Tu, T
    SOFSEM'98: THEORY AND PRACTICE OF INFORMATICS, 1998, 1521 : 135 - 148
  • [32] Research of The Electronic Commerce Information Security Technology
    Chen, Xing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 124 - 126
  • [33] Application of Streaming Media Technology in Electronic Commerce
    Hou, Delin
    Xia, Huosong
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 850 - 853
  • [34] The Application of EDI Technology in Electronic Commerce System
    Li, Tao
    Wang, Yilei
    Lu, Lan
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 837 - +
  • [35] Verifiable partial key escrow for PKI
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Xuebao, 2006, 9 (1584-1589):
  • [36] Hybrid key escrow: A new paradigm
    Viswanathan, K
    Boyd, C
    Dawson, E
    COMPUTERS & SECURITY, 2002, 21 (01) : 77 - 92
  • [37] A Survey of Warehousing Technology in Electronic Commerce Supermarket
    Li Fangmin
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 59 - 62
  • [38] Application of Computer Technology in Agricultural Electronic Commerce
    Jiang, Pengtao
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 332 - 336
  • [39] The application of information security technology in electronic commerce
    Chen, Xinyi
    2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017), 2017, : 380 - 383
  • [40] Windows 2000 public key infrastructure and electronic commerce
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (07): : 1 - 2