Advanced Search
Volume 21 Issue 4
Jul.  1999
Turn off MathJax
Article Contents
Sun Xiaorong, Wang Yumin. DESIGN OF SOFTWARE KEY ESCROW SYSTEM[J]. Journal of Electronics & Information Technology, 1999, 21(4): 511-515.
Citation: Sun Xiaorong, Wang Yumin. DESIGN OF SOFTWARE KEY ESCROW SYSTEM[J]. Journal of Electronics & Information Technology, 1999, 21(4): 511-515.

DESIGN OF SOFTWARE KEY ESCROW SYSTEM

  • Received Date: 1997-11-11
  • Rev Recd Date: 1998-09-10
  • Publish Date: 1999-07-19
  • Key escrow systems have gained much attention in recent years. A key escrow system can provide cryptographic protection to sensitive data ,while at the same time, allows for the decryption of encrypted message under lawful authorization. Since the public were not satisfied with the classified encryption method used in key escrow system in hardware, such as Clipper and Capstone, NIST of US announced a cooperative program with industry to explore the possibilities of performing key escrow cryptography using software-only techniques. This paper proposes a scheme for supporting the implementation of key escrow systems in software, which employs symmetric encryption algorithm for securing communication, and one-way hash function and asymmetric cryptography for identifying the users and verifying session key.
  • loading
  • Denning D E, Smid M. Key escrowing today. IEEE Communication Magazine, 32(9): 55-68.[2]Denning D E. Cryptography and Data Security. Addision-Wesley Publishing Company, 1982, 211-218.[3]Micali S. Fair pubic-key cryptosystem[J].Proceeding of Crypto92, Santa Barbara: Aug.1992, Berlin:-[4]Denning D E. Descriptions of Key Escrow System. Internet Document, Version of May 1, 1996. [5] Balenson D M, Elison C, Lipner S, Walker S. A New Approach to Software Key Escrow En-[5]cryption. Trusted Information System, 3060, Washington RD, Glenwood, Draft of August 15, 1994.[6]Walker S, Lipner S, Elison C, Balen D. Commercial key recovery. Communication of the ACM, 39(3): 41-47.[7]Dawson Ed, Jingming He. Another approach to software key escrow encryption[J].Information security and privacy: First Australasian Conference, ACISP96, Woltongong, June.1996, Berlin:-[8]Yacobi Y. Exponentially faster with addition chains[J].Proceeding of Eurocrypt90, Aarhas, May.1990, Berlin:-[9]Pederson T P. Distributed provens with application undeniable signature. Proceeding Euro-[10]crypto91, Berlin: Springer-Verlag, 1992: 221-242.[11]Beller M J, Yacobi Y. Batch Diffie-Hellman key agreement systems and their application to[12]portable communication. Proceeding of Eurocrypt92, Balatonfired: May 1992, Berlin: Springer- Verlag 1993: 208-220.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2498) PDF downloads(477) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return