Remove key escrow from the identity-based encryption system.
Comley, Richard A. and Vasiu, Luminita and Cheng, Zhaohui (2004) Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings., 3 (3). pp. 37-50. ISSN 1-4020-8140-5
Full text is not in this repository.
Official URL: http://dblp.uni-trier.de/rec/bibtex/conf/ifipTCS/C...
Identity-based encryption systems inherently exhibit the key escrow property. This can be an undesirable feature for certain applications and this paper presents some variants of existing systems (Boneh-Franklin's scheme) that successfully removes the key escrow property. The paper also shows one method by which the new scheme may be integrated into a hierarchical identity-based public key encryption system and a key-insulated system.
|Research Areas:||A. > School of Science and Technology > Computer and Communications Engineering|
|Citations on ISI Web of Science:||0|
|Deposited On:||13 Oct 2008 12:12|
|Last Modified:||10 Mar 2015 15:11|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year