Key recovery for the commercial environment

被引:1
|
作者
J.M. Gonzáles Nieto
K. Viswanathan
C. Boyd
A. Clark
E. Dawson
机构
[1] Information Security Research Centre,
[2] Queensland University of Technology,undefined
[3] GPO Box 2434,undefined
[4] Brisbane Qld 400,undefined
[5] Australia; E-mail: {j.gonzaleznieto,undefined
[6] k.viswanathan,undefined
[7] c.boyd,undefined
[8] a.clark,undefined
[9] e.dawson}@qut.edu.au,undefined
[10] Fax: +61-7/3221-2384,undefined
关键词
Key words: Commercial key recovery – Key escrow – Key management – Software key recovery;
D O I
10.1007/s10207-002-0014-0
中图分类号
学科分类号
摘要
We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the claims by comparing the computation and communication requirements for our proposal with a key recovery solution implemented by IBM.
引用
收藏
页码:161 / 174
页数:13
相关论文
共 50 条
  • [31] A KEY REACTION IN THE RECOVERY OF CHEMICALS
    LINDBERG, H
    ULMGREN, P
    KEMISK TIDSKRIFT, 1983, 95 (02): : A38 - A38
  • [32] Key recovery functional model
    Kennedy, J
    Matyas, SM
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (01) : 31 - 36
  • [33] Key Recovery: Inert and Public
    Boyd, Colin
    Boyen, Xavier
    Carr, Christopher
    Haines, Thomas
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 111 - 126
  • [34] Key Recovery Attack for ZHFE
    Cabarcas, Daniel
    Smith-Tone, Daniel
    Verbel, Javier A.
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 289 - 308
  • [35] Practical key recovery schemes
    Yen, SM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 104 - 114
  • [36] Additional key recovery functions
    Matyas, SM
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (01) : 37 - 40
  • [37] Key recovery header for IPSEC
    Markham, T
    Williams, C
    COMPUTERS & SECURITY, 2000, 19 (01) : 86 - 90
  • [38] Global interoperability for key recovery
    Williams, C
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (01) : 48 - 55
  • [39] DESIGN FOR PRODUCTION - KEY TO RECOVERY
    SODERHOLM, LG
    DESIGN NEWS, 1983, 39 (13) : 7 - 7
  • [40] Key recovery und vertrauen?
    Helmut Reimer
    Christoph Wegener
    Datenschutz und Datensicherheit - DuD, 2013, 37 (8) : 542 - 542