메뉴 건너뛰기




Volumn 4, Issue 16, 2012, Pages 2818-2823

Key escrow attack risk and preventive measures

Author keywords

Attacks and preventions; Key escrow; Main algorithm

Indexed keywords

ATTACKS AND PREVENTIONS; CRYPTOGRAPHIC SYSTEMS; DUAL USE TECHNOLOGY; GOVERNMENT AGENCIES; IN-DEPTH STUDY; KEY ESCROW; PERSONAL PRIVACY; PLAIN TEXT; PREVENTIVE MEASURES; PUBLIC NETWORKS; TERRORIST ORGANIZATION;

EID: 84866754231     PISSN: 20407459     EISSN: 20407467     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (14)
  • 1
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • New York,
    • Blakley, G.R., 1979. Safeguarding cryptographic keys. Proc. AFIPS Note. Comput. Conf., New York, 48:313-317.
    • (1979) Proc. AFIPS Note. Comput. Conf. , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 2
    • 38049125096 scopus 로고    scopus 로고
    • Reducing trust in the PKG in identitybased Cryptosystems
    • Goyal, V., 2007. Reducing trust in the PKG in identitybased Cryptosystems. Adv. Cryptol. Crypto. LNCS, 4622: 430-477.
    • (2007) Adv. Cryptol. Crypto. LNCS , vol.4622 , pp. 430-477
    • Goyal, V.1
  • 3
    • 84957640277 scopus 로고
    • Fair Cryptosystems, revied
    • Copperrmoth, D. August, Springer Verlag (LNCS 963), Berlin.
    • Killian, J. and T. Leighton, 1995. Fair Cryptosystems, revied. In: Copperrmoth, D. (Ed.), Advances in Cryptology-CRYPTO 195, USA, August, pp: 208-221. Springer Verlag (LNCS 963), Berlin.
    • (1995) Advances in Cryptology-CRYPTO 195, USA , pp. 208-221
    • Killian, J.1    Leighton, T.2
  • 4
    • 62849086420 scopus 로고    scopus 로고
    • Design of DLbased certificateless digital signatures
    • Lein, H., R. Jian and L. Changlu, 2009. Design of DLbased certificateless digital signatures. J. Syst. Software, 82(5): 789-793.
    • (2009) J. Syst. Software , vol.82 , Issue.5 , pp. 789-793
    • Lein, H.1    Jian, R.2    Changlu, L.3
  • 5
    • 78651593639 scopus 로고    scopus 로고
    • Forward-secure certificatebased encryption and its generic construction
    • Lu, Y. and L. Jiguo, 2010. Forward-secure certificatebased encryption and its generic construction. J. Network., 5(5): 527-534.
    • (2010) J. Network , vol.5 , Issue.5 , pp. 527-534
    • Lu, Y.1    Jiguo, L.2
  • 6
    • 78651591128 scopus 로고    scopus 로고
    • Threshold certificate-based encryption
    • Lu, Y., L. Jiguo and X. Junmo, 2009. Threshold certificate-based encryption. J. Software, 4(3): 210-217.
    • (2009) J. Software , vol.4 , Issue.3 , pp. 210-217
    • Lu, Y.1    Jiguo, L.2    Junmo, X.3
  • 8
    • 0030270929 scopus 로고    scopus 로고
    • A public-key-based key escrow system
    • Nechvatal, J., 1996. A public-key-based key escrow system. J. Syst. Software, 35(1): 73-83.
    • (1996) J. Syst. Software , vol.35 , Issue.1 , pp. 73-83
    • Nechvatal, J.1
  • 10
    • 84860673839 scopus 로고    scopus 로고
    • Key escrow scheme for flexible placing of escrow agent
    • Qiang, F. and X. Dongqing, 2005. Key escrow scheme for flexible placing of escrow agent. Comput. Eng. Appli., 41(10): 122-123.
    • (2005) Comput. Eng. Appli , vol.41 , Issue.10 , pp. 122-123
    • Qiang, F.1    Dongqing, X.2
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A., 1979. How to share a secret. Comm. ACM, 22: 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 12
    • 35748976265 scopus 로고    scopus 로고
    • Certificateless undeniable signature scheme
    • Shan-shan, D., 2008. Certificateless undeniable signature scheme. Inform. Sci. Int. J., 178(3): 742-755.
    • (2008) Inform. Sci. Int. J , vol.178 , Issue.3 , pp. 742-755
    • Shan-shan, D.1
  • 13
    • 0035242307 scopus 로고    scopus 로고
    • A key escrow sche me for escrow agency of arbitrary number
    • Xie, D. and Z. Dafang, 2001. A key escrow sche me for escrow agency of arbitrary number. Chin. J. Electr., 29(2): 172-174.
    • (2001) Chin. J. Electr , vol.29 , Issue.2 , pp. 172-174
    • Xie, D.1    Dafang, Z.2
  • 14
    • 78651566090 scopus 로고    scopus 로고
    • Security mediated certificateless signatures without pairing
    • Zhongmei, W., W. Jian and L. Jiguo, 2010. Security mediated certificateless signatures without pairing. J. Comput., 5(12): 1862-1869.
    • (2010) J. Comput , vol.5 , Issue.12 , pp. 1862-1869
    • Zhongmei, W.1    Jian, W.2    Jiguo, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.