Advanced Search
Volume 21 Issue 5
Sep.  1999
Turn off MathJax
Article Contents
Yang Bo, Wang Yumin. KEY ESCROW BASED ON ASMUTH-BLOOM THRESHOLD SYSTEM[J]. Journal of Electronics & Information Technology, 1999, 21(5): 718-720.
Citation: Yang Bo, Wang Yumin. KEY ESCROW BASED ON ASMUTH-BLOOM THRESHOLD SYSTEM[J]. Journal of Electronics & Information Technology, 1999, 21(5): 718-720.

KEY ESCROW BASED ON ASMUTH-BLOOM THRESHOLD SYSTEM

  • Received Date: 1997-10-24
  • Rev Recd Date: 1999-01-09
  • Publish Date: 1999-09-19
  • A key escrow cryptosystem can not only provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a secret key escrow system based on Asmuth-Bloom threshold scheme is given and its security is analysed.
  • loading
  • Denning D E, Smid M. Key escrowing today. IEEE Communications Magazine, 1994, 32(9) 54-68.[2]Denning D E, Branstad D A. A taxonomy for key-escrow encryption systems. Commun. ACM 1996, 39(3): 34-40.[3]Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. on Information Theory, 1983, IT-29: 208-210.[4]Desmedt Y, Frakel Y. Threshold Cryptosystems. In G. Brassard, editor, Advances in Cryptology, Proc.of Crypto'89 (Lecture Notes in Computer Science 435), Heidelberg: Springer-Verlag, 1990, 307-315.[5]Pedersen T. Non-interactive and Information Theoretic Secure Verifiable Secret Sharing. Ad-[6]vances in Cryptology-Crypto'91 (Lecture Notes in Computer Science 576), Berlin: Springer-[7]Verlag, 1991, 129-140.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2303) PDF downloads(469) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return