A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

Cited 14 time in webofscience Cited 0 time in scopus
  • Hit : 605
  • Download : 0
Key escrowing is one of the core technologies for the lawful interception (LI) of secure communications in the wired and wireless networks. Although many previous studies on the key escrowing have been done before, they are insufficient to be deployed in practical networks due to conflicts with the LI requirements. Moreover, there is lack of consideration on the LI of ID-based cryptosystem (IDBC)-based secure communication because the interest of the LI was moved to the industries and IDBC has the inherent key escrowing property. However, the inherent property of IDBC cannot prevent 'illegal' eavesdropping of all the communications in the networks from the law enforcement agency with the 'legally' obtained key. Thus, we propose a new key escrow model that satisfies the requirements of LI and overcomes the potential threats of IDBC. Our contributions enable the scalable and efficient key escrowing for the LI of secure one-way and two-pass communication in the mobile networks. Copyright (C) 2010 John Wiley & Sons, Ltd.
Publisher
WILEY-BLACKWELL
Issue Date
2011-04
Language
English
Article Type
Article
Keywords

ENCRYPTION

Citation

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.24, no.4, pp.461 - 472

ISSN
1074-5351
URI
http://hdl.handle.net/10203/101060
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 14 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0