Yang Bo, Wang Yumin. A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM[J]. Journal of Electronics & Information Technology, 2000, 22(2): 194-197.
Citation:
Yang Bo, Wang Yumin. A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM[J]. Journal of Electronics & Information Technology, 2000, 22(2): 194-197.
Yang Bo, Wang Yumin. A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM[J]. Journal of Electronics & Information Technology, 2000, 22(2): 194-197.
Citation:
Yang Bo, Wang Yumin. A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM[J]. Journal of Electronics & Information Technology, 2000, 22(2): 194-197.
A key escrow cryptosystem can provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a key escrow system based on RSA algorithm for network environment is given. A trusted center in this system specifies n trustees for every user, and distributes the part recovery ability of the user 's secret key to n trustees by (t,n) threshold scheme. When the user broadcasts his encrypted key, only if at least t cooperated trustees can enforce the wiretapping to this user.
Denning D E, Smid M. Key escrowing today. IEEE Communications Magazine. 1994, 32(9):54-68.[2]Denning D E, Branstad D A. A taxonomy for key-escrow encryption systems. Commun. ACM 1996, 39(3): 34-40.[3]Desmedt Y.[J].Frakel Y. Shared generation of authentications and signatures. In J. feigenbaum ed.,Advances in Cryptology, Proc. of Crypto91 (Lecture Notes in Computer Science 576), SpringerVerlag.1991,:-[4]Liaw H T. A dynamic cryptographic key generation and information broadcasting scheme in information systems[J].Computer Security.1994, (13):601-610[5]杨波,马文平,王育民.一种新的密钥分割门限方案及密钥托管体制.电子学报,1998,26(10):1-3.