Result: Key escrow with tree-based access structure

Title:
Key escrow with tree-based access structure
Source:
Computer network security (Third international workshop on mathematical methods, models, and architectures for computer network security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, proceedings)Lecture notes in computer science. :454-459
Publisher Information:
New York, NY: Springer, 2005.
Publication Year:
2005
Physical Description:
print, 9 ref 1
Original Material:
INIST-CNRS
Document Type:
Conference Conference Paper
File Description:
text
Language:
English
Author Affiliations:
University of Klagenfurt, Computer Science System Security, Austria
ISSN:
0302-9743
Rights:
Copyright 2005 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.17199295
Database:
PASCAL Archive

Further Information

In this paper we propose a system in which a set of people is able to confidentially communicate using a common session key. Due to required governmental surveillance properties, this key will be escrowed using a multi-party version of the ElGamal cryptosystem. The resulting shares of the ciphertext are stored over a set of trusted servers to provide availability and to hamper ciphertext-based attacks. Using a particular tree-based multi-party decryption, the session key can be reconstructed by a tree-structured set of escrow agencies without reconstructing the private ElGamal key and the ciphertext.