期刊文献+

公开可验证的部分密钥托管方案 被引量:4

Publicly verifiable partial key escrow scheme
下载PDF
导出
摘要 我们在已经存在的部分密钥托管方案的基础上提出一种新的称为公开可验证的部分密钥托管方案。该方案可以使得任何人对分配给托管人的秘密进行验证,并且验证是非交互的、脱线的。在恢复阶段监听机构不依赖托管人的可信性,仍然能够恢复出用户正确的私钥。 Based on existing partial key escrow scheme and verifiable encryption, we present a new publicly verifiable partial key escrow scheme ,in the scheme everyone can non-interactively and off-line verify share of the trustee. Legal enforcement agency (LEA)can recovery the user抯 private key without relying on the honestness of trustees.
出处 《通信学报》 EI CSCD 北大核心 2002年第5期154-158,共5页 Journal on Communications
基金 国家教育部高校骨干教师资助项目
关键词 密钥托管方案 公开可验证加密 保密通信 partial key escrow key verifiable encryption
  • 相关文献

参考文献10

  • 1[1]Shamir A.Partial key escrow: A new approach to software key escrow[R].Private Communication Made at Crypto 95,August 1995.
  • 2[2]Micali S,Shamir R.Guaranteed partial key escrow[R].MIT Laboratory for Computer Science Technical Memo 537,September 1995.
  • 3[3]Bellare M,Goldwasser S.Verifiable partial key escrow[A].Proceedings of Fourth Annal Conference on Computer and Communication Security[C].New York:ACM,1997.78-91.
  • 4[4]Bellare M,Goldwasser S.Encapsulated key escrow[R].MIT Laboratory for Computer Science Technical Memo 688,April 1996.
  • 5[5]Viswanathan K,Boyd C,Ed Dawson.Publicly verifiable key escrow with limited time span[A].Australasian Conferenc on Information Security and Privacy,ACISP'99[C].Springer-Verlag,Lecture Notes in Computer Science,LNCS 1438,1999.36-50.
  • 6[6]Jiang S Q,Zhang Y F.Partial key escrow Monitoring Scheme[A].Proceeding of 1999 International Workshoup on Cryptographic Techniques and E-Commerce[C].Hong Kong,July 1999.86-91.
  • 7[7]Camenisch J,Lysyanskaya A.An indentity escrow scheme with appointed verifiers[A].Advances in Cryptology-CRYPTO '2001[C].Volume 2139 of Lecture Notes in Computer Science.International Association for Cryptologic Research,Berlin Germany: Springer-Verlag,2001.388-407.
  • 8[8]Asokan N,Shoup V,Waider M.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in Communications,2000,18(4):593-610.
  • 9[9]Markus S.Publicly verifiable secret sharing[A].Advances in Cryptology-Eurocrypt'96[C].Lecture Notes in Computer Science,Vol 1070 ,Saragossa,Spain,1996,Berlin :Springer-Verlag Berlin Heidelbeng,1996.190-199.
  • 10[10]Bao F,Deng R H.An efficient fair exchange protocol with off-line semi-trusted third party[A].Proceedings of 1999 International Workshop on Cryptographic Techniques and E-Commerce[C].Hong Kong,1999,City University of Hong Kong Press,1999.37-47.

同被引文献38

  • 1William Stallings 杨明等(译).密码编码学与网络安全:原理与实践[M].电子工业出版社,2001,4..
  • 2[9]Steve Burnett, Stephen Paine.密码工程实践指南[M].清华大学出版社,2001,101-107.
  • 3[11]冯登国,裴定一.密码学导引[M].科学出版社,2001.166-167.
  • 4[1]Dening D E, Smid M. Key Escrowing Today[J]. IEEE Communication Magazine, 1994,(7):54-68.
  • 5WilliamStallings著 杨明 胥光辉译.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社,2001..
  • 6冯登国 裴定一.密码学导引[M].北京:科学出版社,2001.230-231.
  • 7Steve Burnett & Stephen Paine.密码工程实践指南冯登国[M].清华大学出版社,2001.101-107.
  • 8White House Press Release, The Clipper Chip Initiative[ J ]. IEEE Infonnation Society Newsletter, 1993, 43 (2) : 21 - 23.
  • 9DENNING D, BRANSTAD D, A Taxonomy For Key Escrow System[ J ]. Communication of The ACM, 1996, 39(3) : 34 - 40.
  • 10曹珍寓.公铡密码学[M].哈尔滨:黑龙江教育出版社,1993.158—185.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部