Font Size: a A A

Research On Safe Key-Escrow Scheme

Posted on:2007-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:X H ShiFull Text:PDF
GTID:2178360212995477Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In private communication, there are two contradictory requirements. On the one hand, users want to communicate securely with other users. on the other hand, governments have requirements to intercept suspected user traffic. It is the main research objection to key escrow proposals how to meet the needs of both users and governments.A key escrow encryption system is an encryption system with backup decryption capability that allows authorized persons, under certain prescribed conditions, to decrypt cipher-text with help of information supplied be one or more trusted parties who hold special data recovery keys. Key escrow can be divided logically into three main components: User's Talk-key Security Components, Key Escrow Components, Data Recovery Components.Based on analyzing and researching the escrow schemes of interior and overseas, the security problems of the safe Key Escrow System are presented. The author presents three schemes for several problems.Firstly, based on the highly security of McCurley's encryption scheme, a Verifiable Partial Key Escrow scheme is presented. Secondly, based on the discrete logarithm problem of ElGamal, the safe key escrow scheme based on key matrix is presented. In the end, the computation in MATLAB is given. On the basis of introduction to the K-G-H secret sharing scheme, an independent key escrow scheme is presented.The computation in MATLAB is also given. After thar, capabilities and securities of the three schemes are analyzed.Finally, in order to prove the foreast of key escrow schemes be presented, the schemes of application in PKI and E-mail are presented.
Keywords/Search Tags:Key escrow, Secret share, K-G-H, McCurley, Verifiable partial
PDF Full Text Request
Related items