A Proposal for Authenticated Key Recovery System 1

نویسندگان

  • Tsuyoshi Nishioka
  • Kanta Matsuura
  • Yuliang Zheng
  • Hideki Imai
چکیده

Information-security technologies are often implemented with redundant data fields attached to message containers. In a Key Recovery System that employs public key cryptography, a data recovery field (DRF) attached to a message typically contains a session key encrypted with a Key Recovery Agent’s public key. At a later time when needs arise, the session key can be retrieved from DRF and used to recover the original message without the involvement of the message originator or recipient. Two problems with such a system are (1) that DRF is at least as long as the public modulo of the Key Recovery Agent, which represents an increasingly large communication overhead, (2) and that DRF is not created in an authenticated way, which opens a door for an originator to create a bogus DRF and deny his/her act at a later time. The main purposes of this paper are to address the two problems and exhibit a possible solution to them. In particular, we propose an authenticated Key Recovery System using a recently discovered signcryption primitive that combines the functions of digital signature with those of public-key encryption. We also carry out a detailed comparison between our proposal and existing Key Recovery Systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TITLE : A Framework for Authenticated Key Distribution in ATM

This contribution proposes a framework for authenticated key distribution in ATM networks in endpoint-to-endpoint, switch-to-switch, and endpoint-to-switch settings. The proposal is for a two-tiered hierarchy with initial pairwise key distribution based on public key cryptography and subsequent session key distribution based on conventional cryptography. All protocols are derived from existing ...

متن کامل

Authenticated Encryption Schemes: Current Status and Key Issues

Nyberg and Ruppel first proposed a signature scheme with message recovery based on DSA in 1993, and the authenticated encryption scheme is a special application of their scheme. Afterward, there are many papers proposed about the authenticated encryption schemes. The signature scheme can reduce the transmitted cost, because the message has been contained in the signature of the message and the ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Authenticated Interleaved Encryption and its Application to Wireless Sensor Networks

We present AIE (Authenticated Interleaved Encryption), a new scheme that allows nodes of a network to exchange messages securely (i.e. encrypted and authenticated) without sharing a common key or using public key cryptography. Our scheme is well adapted to networks, such as ad hoc, overlay or sensor networks, where nodes have limited capabilities and can share only a small number of symmetric k...

متن کامل

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes

Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schemes avoiding some attacks against the original proposal. In this paper we show that there is a weakness on all these schemes affecting both the authentication of the signer’s public key and the own security of the syste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005