Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography

被引:7
|
作者
Wang, Zhen [1 ]
Ma, Zhaofeng [1 ]
Luo, Shoushan [1 ]
Gao, Hongmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Instant messaging; authorized monitoring; key escrow; threshold cryptography; tripartite authenticated key agreement; SCHEME; SECURE;
D O I
10.1109/ACCESS.2019.2946874
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities. Therefore, determining how to balance the privacy protection requirements of user communication in the network with the authorized monitoring requirements of law enforcement agencies (LEAs) is a meaningful task. To solve this problem, a new tripartite authenticated key agreement (Tri-AKA) protocol and a session key escrow scheme based on threshold cryptography and the new Tri-AKA protocol were proposed. In the proposed scheme, the LEA participates as a normal user in the key agreement process of two users and uses (t, n) threshold cryptography to share its ephemeral private key with n key escrow agents (KEAs). When necessary, the LEA can combine t KEAs to recover the specified session key and decrypt the communications, thereby preventing malicious administrators in the LEA from arbitrarily monitoring user communications. Finally, we proved the security of the proposed Tri-AKA protocol under the Computational Diffie-Hellman (CDH) assumption with the Random Oracle Model and the security of the proposed key escrow scheme under the Elliptic Curve Discrete Logarithm (ECDL) assumption. Analysis of our session key escrow scheme and comparison with other schemes show that our scheme can avoid the "once monitor, monitor forever'' scenario and achieve fine-grained control in each session. Moreover, our scheme has low storage overhead for each KEA.
引用
收藏
页码:149080 / 149096
页数:17
相关论文
共 50 条
  • [41] Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 574 - 577
  • [42] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [44] Tripartite authenticated key exchange protocol for smart grid
    Wang S.
    Zhou X.
    Wen K.
    Weng B.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 210 - 218
  • [45] Comparative study of tripartite identity-based authenticated key agreement protocols
    Faculty of Electrical Engineering and Computer Science, University of Maribor, Smetanova ulica 17, 2000 Maribor, Slovenia
    Inf, 2009, 3 (347-355): : 347 - 355
  • [46] Revocable Key Identity Based Cryptography without Key Escrow Problem
    Gupta, Swati
    Gupta, Vipul
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 443 - 448
  • [47] An Enhanced Certificate-Based Authenticated Key Agreement Protocol
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 200 - 206
  • [48] A Simple Password-based Authenticated Key Agreement Protocol
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 510 - 513
  • [49] Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (03): : 347 - 355
  • [50] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +