A Proposal for Authenticated Key Recovery System 1
نویسندگان
چکیده
Information-security technologies are often implemented with redundant data fields attached to message containers. In a Key Recovery System that employs public key cryptography, a data recovery field (DRF) attached to a message typically contains a session key encrypted with a Key Recovery Agent’s public key. At a later time when needs arise, the session key can be retrieved from DRF and used to recover the original message without the involvement of the message originator or recipient. Two problems with such a system are (1) that DRF is at least as long as the public modulo of the Key Recovery Agent, which represents an increasingly large communication overhead, (2) and that DRF is not created in an authenticated way, which opens a door for an originator to create a bogus DRF and deny his/her act at a later time. The main purposes of this paper are to address the two problems and exhibit a possible solution to them. In particular, we propose an authenticated Key Recovery System using a recently discovered signcryption primitive that combines the functions of digital signature with those of public-key encryption. We also carry out a detailed comparison between our proposal and existing Key Recovery Systems.
منابع مشابه
TITLE : A Framework for Authenticated Key Distribution in ATM
This contribution proposes a framework for authenticated key distribution in ATM networks in endpoint-to-endpoint, switch-to-switch, and endpoint-to-switch settings. The proposal is for a two-tiered hierarchy with initial pairwise key distribution based on public key cryptography and subsequent session key distribution based on conventional cryptography. All protocols are derived from existing ...
متن کاملAuthenticated Encryption Schemes: Current Status and Key Issues
Nyberg and Ruppel first proposed a signature scheme with message recovery based on DSA in 1993, and the authenticated encryption scheme is a special application of their scheme. Afterward, there are many papers proposed about the authenticated encryption schemes. The signature scheme can reduce the transmitted cost, because the message has been contained in the signature of the message and the ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAuthenticated Interleaved Encryption and its Application to Wireless Sensor Networks
We present AIE (Authenticated Interleaved Encryption), a new scheme that allows nodes of a network to exchange messages securely (i.e. encrypted and authenticated) without sharing a common key or using public key cryptography. Our scheme is well adapted to networks, such as ad hoc, overlay or sensor networks, where nodes have limited capabilities and can share only a small number of symmetric k...
متن کاملA Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schemes avoiding some attacks against the original proposal. In this paper we show that there is a weakness on all these schemes affecting both the authentication of the signer’s public key and the own security of the syste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005