網(wǎng)絡(luò)環(huán)境中基于RSA算法的密鑰托管
A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM
-
摘要: 密鑰托管密碼體制不僅能保護(hù)用戶的隱私權(quán),同時(shí)允許法律授權(quán)下的監(jiān)聽。本文提出了在網(wǎng)絡(luò)環(huán)境中基于RSA算法的一種密鑰托管體制。系統(tǒng)中有一可信中心,為每一用戶指定n個(gè)委托人,每一委托人為網(wǎng)絡(luò)中一服務(wù)器??尚胖行陌?t,n)門限方案為n個(gè)委托人分配恢復(fù)用戶密鑰的部分能力。用戶在系統(tǒng)中廣播自己經(jīng)過(guò)加密的密鑰時(shí),僅當(dāng)至少有t個(gè)委托人聯(lián)合起來(lái)才能實(shí)施對(duì)用戶的監(jiān)聽。Abstract: A key escrow cryptosystem can provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a key escrow system based on RSA algorithm for network environment is given. A trusted center in this system specifies n trustees for every user, and distributes the part recovery ability of the user 's secret key to n trustees by (t,n) threshold scheme. When the user broadcasts his encrypted key, only if at least t cooperated trustees can enforce the wiretapping to this user.
-
Denning D E, Smid M. Key escrowing today. IEEE Communications Magazine. 1994, 32(9):54-68.[2]Denning D E, Branstad D A. A taxonomy for key-escrow encryption systems. Commun. ACM 1996, 39(3): 34-40.[3]Desmedt Y.[J].Frakel Y. Shared generation of authentications and signatures. In J. feigenbaum ed.,Advances in Cryptology, Proc. of Crypto91 (Lecture Notes in Computer Science 576), SpringerVerlag.1991,:-[4]Liaw H T. A dynamic cryptographic key generation and information broadcasting scheme in information systems[J].Computer Security.1994, (13):601-610[5]楊波,馬文平,王育民.一種新的密鑰分割門限方案及密鑰托管體制.電子學(xué)報(bào),1998,26(10):1-3. -
計(jì)量
- 文章訪問(wèn)數(shù): 1832
- HTML全文瀏覽量: 69
- PDF下載量: 478
- 被引次數(shù): 0