期刊文献+

PKI中的可验证部分密钥托管 被引量:7

Verifiable Partial Key Escrow for PKI
下载PDF
导出
摘要 针对PKI系统特点提出的可验证部分密钥托管方案是一种权衡了托管机构和用户双方需求的密钥托管方案,其可验证的特点避免了用户托管时可能有的欺骗行为,而部分密钥托管则限制了托管机构滥用权力的可能.同时,分布式产生用户密钥的方法和不泄漏用户部分私钥信息的性质也避免了“阈下攻击”和“早期恢复”的危险. Verifiable partial key escrow scheme for PKI balances the needs of individuals with the needs of the trustees. It's verifiable therefore users can not cheat the trustees, and partial key escrow scheme limits the possibility of the trustees to abuse their power. At the same time, it implements a distributed algorithm to generate user's key and never leaks any information of user's partial key. So it can also avoid the danger of "subliminal attack" and "early recovery".
作者 庄湧
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1584-1589,共6页 Chinese Journal of Computers
关键词 部分密钥托管 PKI RSA 可验证 partial key escrow PKI RSA verifiable
  • 相关文献

参考文献13

  • 1Micali S.. Fair public-key cryptosystems. In: Advances in Cryptology-CRYPTO'92, Lecture Notes in Computer Science 740. Heidelberg: Springer-Veriag, 1993, 113~138
  • 2Lee B. , Chang K. , Kim T.. A secure and efficient key escrow protocol for mobile communications. In: Computational Science-ICCS 2001, Lecture Notes in Computer Science 2073.Heidelberg: Springer-Verlag, 2001, 433~443
  • 3Young A. , Yung M.. RSA-based auto-recoverable cryptosystems. In: Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Lecture Notes in Computer Science 1751.Heidelberg : Springer-Verlag, 2000, 326 ~ 341
  • 4Kilianl J. , Leighton T.. Fair cryptosystems, revisited: A rigorous approach to key-escrow. In: Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science 963. Heldelberg: Springer-Verlag, 1995, 208~221
  • 5Shamir A.. Partial key escrow: A new approach to software key escrow. In:Proceedings of the Key Escrow Conference,Washington, D. C. , 1995
  • 6Burmester M. , Desmedt Y. , Seberry J.. equitable key escrow with limited time span. In: Advances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science 1514. Heidelberg: Springer-Verlag, 1998, 380~391
  • 7Bellare M. , Goldwasser S.. Verifiable partial key escrow. In:Proceedings of the 4th ACM Conference on Computer and Communications Security, Zrich, Switzerland, 1997, 78~91
  • 8Bellare M. , Goldwasser S.. Encapsulated key escrow. MIT Laboratory for Computer Science: Technical Report 688, 1996
  • 9Mao W.. Verifiable partial escrow of integer factors. Designs,Codes and Cryptography, 2001, 24(3) :327-342
  • 10Shaoquan J., Yufeng Z.. Partial key escrow monitoring scheme. Cryptology ePrint Archive, 2002

二级参考文献10

  • 1[1]Shamir A.Partial key escrow: A new approach to software key escrow[R].Private Communication Made at Crypto 95,August 1995.
  • 2[2]Micali S,Shamir R.Guaranteed partial key escrow[R].MIT Laboratory for Computer Science Technical Memo 537,September 1995.
  • 3[3]Bellare M,Goldwasser S.Verifiable partial key escrow[A].Proceedings of Fourth Annal Conference on Computer and Communication Security[C].New York:ACM,1997.78-91.
  • 4[4]Bellare M,Goldwasser S.Encapsulated key escrow[R].MIT Laboratory for Computer Science Technical Memo 688,April 1996.
  • 5[5]Viswanathan K,Boyd C,Ed Dawson.Publicly verifiable key escrow with limited time span[A].Australasian Conferenc on Information Security and Privacy,ACISP'99[C].Springer-Verlag,Lecture Notes in Computer Science,LNCS 1438,1999.36-50.
  • 6[6]Jiang S Q,Zhang Y F.Partial key escrow Monitoring Scheme[A].Proceeding of 1999 International Workshoup on Cryptographic Techniques and E-Commerce[C].Hong Kong,July 1999.86-91.
  • 7[7]Camenisch J,Lysyanskaya A.An indentity escrow scheme with appointed verifiers[A].Advances in Cryptology-CRYPTO '2001[C].Volume 2139 of Lecture Notes in Computer Science.International Association for Cryptologic Research,Berlin Germany: Springer-Verlag,2001.388-407.
  • 8[8]Asokan N,Shoup V,Waider M.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in Communications,2000,18(4):593-610.
  • 9[9]Markus S.Publicly verifiable secret sharing[A].Advances in Cryptology-Eurocrypt'96[C].Lecture Notes in Computer Science,Vol 1070 ,Saragossa,Spain,1996,Berlin :Springer-Verlag Berlin Heidelbeng,1996.190-199.
  • 10[10]Bao F,Deng R H.An efficient fair exchange protocol with off-line semi-trusted third party[A].Proceedings of 1999 International Workshop on Cryptographic Techniques and E-Commerce[C].Hong Kong,1999,City University of Hong Kong Press,1999.37-47.

共引文献3

同被引文献49

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部