ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Information-Revealing with Distributed Escrow Authorities
Cited 1 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
유종호, 나중찬
발행일
200908
출처
International Joint Conference on INC, IMS and IDC NCM (NCM) 2009, pp.1141-1146
출판사
IEEE
DOI
https://dx.doi.org/10.1109/NCM.2009.394
협약과제
09MS2700, AII-IP 환경의 지능형 사이버 공격 감시 및 추적 시스템 개발, 나중찬
초록
This paper present an alternative scheme to key escrow scheme which allows probabilistic law enforcement access to reveal the encrypted communications. Namely, key escrow authority can reveal the information between communication parties partially. Our scheme allows law enforcement access with probability p for each message. The scheme in this paper is basically the complemented scheme of Mihir Bellare and Ronald L. Rivest [2], and combine a publicly verifiable encryption technique and translucent cryptography based on non-interactive fractional oblivious transfer. This protocol allows such access with probability P for each message, for a parameter P between 0 and 1, which should be chosen to provide an appropriate balance between concerns for individual privacy and the need for such law enforcement access by government. This paper induct a set of distributed key escrow authorities(DEA). The scheme is based on the El-Gamal encryption, a proof scheme of knowledge of common exponent in publicly verifiable El-Gamal public-key encryption, and a set of distributed escrow authorities. In session key recovery phase by DEA, use only partial parameters from each key escrow authorities required for session key recovery that have been passed through zero-knowledge(ZK) interactive proof protocol. The scheme allows both the law enforcement access with probability and DEA to recover the session key used to encrypt communication by User A. © 2009 IEEE.
KSP 제안 키워드
Encryption technique, Individual privacy, Interactive Proof, Key Escrow, Non-interactive, Public-key encryption, Publicly verifiable, Recovery phase, Session key, Verifiable encryption, Zero-knowledge