基于Asmuth-Bloom門限體制的密鑰托管
KEY ESCROW BASED ON ASMUTH-BLOOM THRESHOLD SYSTEM
-
摘要: 密鑰托管密碼體制不僅能保護用戶的隱私權(quán),同時允許法律授權(quán)下的監(jiān)聽。本文基于Asmuth-Bloom門限體制提出了一種密鑰托管體制,并分析了體制的安全性。
-
關(guān)鍵詞:
- 密鑰托管; 門限方案; 委托人
Abstract: A key escrow cryptosystem can not only provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a secret key escrow system based on Asmuth-Bloom threshold scheme is given and its security is analysed. -
Denning D E, Smid M. Key escrowing today. IEEE Communications Magazine, 1994, 32(9) 54-68.[2]Denning D E, Branstad D A. A taxonomy for key-escrow encryption systems. Commun. ACM 1996, 39(3): 34-40.[3]Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. on Information Theory, 1983, IT-29: 208-210.[4]Desmedt Y, Frakel Y. Threshold Cryptosystems. In G. Brassard, editor, Advances in Cryptology, Proc.of Crypto'89 (Lecture Notes in Computer Science 435), Heidelberg: Springer-Verlag, 1990, 307-315.[5]Pedersen T. Non-interactive and Information Theoretic Secure Verifiable Secret Sharing. Ad-[6]vances in Cryptology-Crypto'91 (Lecture Notes in Computer Science 576), Berlin: Springer-[7]Verlag, 1991, 129-140. -
計量
- 文章訪問數(shù): 2335
- HTML全文瀏覽量: 156
- PDF下載量: 471
- 被引次數(shù): 0