Key recovery for the commercial environment

被引:1
|
作者
J.M. Gonzáles Nieto
K. Viswanathan
C. Boyd
A. Clark
E. Dawson
机构
[1] Information Security Research Centre,
[2] Queensland University of Technology,undefined
[3] GPO Box 2434,undefined
[4] Brisbane Qld 400,undefined
[5] Australia; E-mail: {j.gonzaleznieto,undefined
[6] k.viswanathan,undefined
[7] c.boyd,undefined
[8] a.clark,undefined
[9] e.dawson}@qut.edu.au,undefined
[10] Fax: +61-7/3221-2384,undefined
关键词
Key words: Commercial key recovery – Key escrow – Key management – Software key recovery;
D O I
10.1007/s10207-002-0014-0
中图分类号
学科分类号
摘要
We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the claims by comparing the computation and communication requirements for our proposal with a key recovery solution implemented by IBM.
引用
收藏
页码:161 / 174
页数:13
相关论文
共 50 条
  • [21] Commercial Key Escrow: An Australian perspective
    Caelli, WJ
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 40 - 64
  • [22] Key Questions of our Commercial Politics
    Hoppe, Alfred
    ARCHIV FUR SOZIALWISSENSCHAFT UND SOZIALPOLITIK, 1913, 37 (01): : 303 - 303
  • [23] PUBLIC UNDERSTANDING AS A KEY TO COMMERCIAL SUCCESS
    ILES, A
    BIO-TECHNOLOGY, 1987, 5 (08): : 856 - 856
  • [24] COMMERCIAL GROWTH KEY TO SPACE SECTOR
    ASKER, JR
    AVIATION WEEK & SPACE TECHNOLOGY, 1995, 142 (11): : 95 - 97
  • [25] A flexible key recovery system integrated with key distribution
    Yu, J
    Oh, S
    Kim, J
    Chung, K
    Won, D
    ISE'2001: PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INFORMATION SYSTEMS AND ENGINEERING, 2001, : 444 - 450
  • [26] A key recovery mechanism for reliable group key management
    Cho, TN
    Lee, SH
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 372 - 386
  • [27] On the difficulty of key recovery systems
    Kim, S
    Lee, I
    Mambo, M
    Park, S
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 207 - 224
  • [28] Interpol calls for key recovery
    Hancock, B
    COMPUTERS & SECURITY, 1999, 18 (03) : 195 - 195
  • [29] ISAKMP key recovery extensions
    Balenson, D
    Markham, T
    COMPUTERS & SECURITY, 2000, 19 (01) : 91 - 99
  • [30] FED HAS KEY TO RECOVERY
    不详
    ENGINEERING NEWS-RECORD, 1983, 210 (13): : 56 - 56