Result: Key escrow with tree-based access structure
Title:
Key escrow with tree-based access structure
Authors:
Source:
Computer network security (Third international workshop on mathematical methods, models, and architectures for computer network security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, proceedings)Lecture notes in computer science. :454-459
Publisher Information:
New York, NY: Springer, 2005.
Publication Year:
2005
Physical Description:
print, 9 ref 1
Original Material:
INIST-CNRS
Subject Terms:
Computer science, Informatique, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Organisation des mémoires. Traitement des données, Memory organisation. Data processing, Gestion des mémoires et des fichiers (y compris la protection et la sécurité des fichiers), Memory and file management (including protection and security), Clé privée, Private key, Clave privada, Confiance, Confidence, Confianza, Cryptanalyse, Cryptanalysis, Criptoanálisis, Cryptographie, Cryptography, Criptografía, Disponibilité, Availability, Disponibilidad, Décryptage, Decryption, Desciframiento, Gestion version, Version management, Gestión versión, Monitorage, Monitoring, Monitoreo, Méthode arborescente, Tree structured method, Método arborescente, Psychologie sociale, Social psychology, Psicología social, Surveillance, Vigilancia, Système réparti, Distributed system, Sistema repartido, Sécurité informatique, Computer security, Seguridad informatica
Document Type:
Conference
Conference Paper
File Description:
text
Language:
English
Author Affiliations:
University of Klagenfurt, Computer Science System Security, Austria
ISSN:
0302-9743
Rights:
Copyright 2005 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.17199295
Database:
PASCAL Archive
Further Information
In this paper we propose a system in which a set of people is able to confidentially communicate using a common session key. Due to required governmental surveillance properties, this key will be escrowed using a multi-party version of the ElGamal cryptosystem. The resulting shares of the ciphertext are stored over a set of trusted servers to provide availability and to hamper ciphertext-based attacks. Using a particular tree-based multi-party decryption, the session key can be reconstructed by a tree-structured set of escrow agencies without reconstructing the private ElGamal key and the ciphertext.