Design and analyses of two basic protocols for use in TTP-based key escrow

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we study two basic protocols which are important in realizing TTP-based key escrow systems. A TTP-based key escrow system was studied in [3] under the scenario of multiple domains (e.g., countries), where a protocol based on verifiable secret sharing scheme was proposed to transfer a shared secret from one set of TTPs to another set of TTPs. However, the protocol only allows one step transfer, i.e., transfer a shared secret from set A to set B, but the same shared secret can not be further transferred from B to any other set. Our first protocol improves the protocol in [3] to allow multiple step transfers. The problem of subliminal channel in key escrow was studied in [10] and [3], where they listed five properties a protocol should satisfy in order to avoid subliminal channel and proposed a protocol which fulfills the five properties. We argue that the first property is unnecessarily strong and propose a weaker property as a replacement. We also present a new protocol which satisfies the modified first and the other four properties. Finally, we discuss the two protocols in the presence of dishonest TTPs.

Cite

CITATION STYLE

APA

Bao, F., Deng, R., Han, Y., & Jeng, A. (1997). Design and analyses of two basic protocols for use in TTP-based key escrow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1270, pp. 261–270). Springer Verlag. https://doi.org/10.1007/BFb0027933

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free