Remove key escrow from the identity-based encryption system.
Comley, Richard A., Vasiu, Luminita and Cheng, Zhaohui (2004) Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings., 3 (3). pp. 37-50. ISSN 1-4020-8140-5
Full text is not in this repository.
Official URL: http://dblp.uni-trier.de/rec/bibtex/conf/ifipTCS/C...
Identity-based encryption systems inherently exhibit the key escrow property. This can be an undesirable feature for certain applications and this paper presents some variants of existing systems (Boneh-Franklin's scheme) that successfully removes the key escrow property. The paper also shows one method by which the new scheme may be integrated into a hierarchical identity-based public key encryption system and a key-insulated system.
|Research Areas:||Science & Technology > Software Process, Practice & Design|
|Citations on ISI Web of Science:||0|
|Deposited On:||13 Oct 2008 12:12|
|Last Modified:||06 Feb 2013 11:40|
Repository Staff Only: item control page
Downloads per month over past year