Technology of key escrow in electronic commerce

被引:0
|
作者
Pan, Y. [1 ]
Leng, Y. [1 ]
Wang, Z. [1 ]
Ren, X. [1 ]
机构
[1] Information Engineering Faculty, Fushun Petroleum Institute, Liaoning Fushun 113001, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of Internet electronic commerce has been noticed increasingly. However, the problem of its security makes people not dare into this advanced field. The subjects involving in electronic commerce activities need to prevent the other subjects from denying their activities. Some security organizations of government also need to get the encrypted key through legal means in order to track, intercept and capture criminal information. Thus the encrypted key escrow technology must be adopted and it must be of security. For the sake of security the key will be divided into several blocks which are stored in different reliable agents. The key can not be restored unless all agents work together. For designing an effective and safe key escrow, the discrete logarithm is applied for solving key escrow. The security of this algorithm completely depends on the difficulty to solve discrete logarithm, therefore, this algorithm is secure and simple when a big prime number is adopted. Moreover, adding this technology in SET will benefit the legal agency to monitor illegal activities.
引用
收藏
页码:49 / 52
相关论文
共 50 条
  • [41] Key success factors of electronic commerce web sites
    Kuljis, J
    Paul, RJ
    Singh, IB
    ITI 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2002, : 363 - 368
  • [42] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [43] A key escrow system with warrant bounds
    Lenstra, AK
    Winkler, P
    Yacobi, Y
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 197 - 207
  • [44] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 1998, 21 (03): : 72 - 75
  • [45] Key Technologies of the Dual-mode Electronic Commerce
    Shao Kang
    Wu Manyi
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 348 - 351
  • [46] A taxonomy for key escrow encryption systems
    Denning, DE
    Branstad, DK
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 34 - 39
  • [47] SOFTWARE-KEY ESCROW EMERGES
    WAYNER, P
    BYTE, 1994, 19 (10): : 40 - 40
  • [48] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [49] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448