2019
DOI: 10.1109/access.2019.2946874
|View full text |Cite
|
Sign up to set email alerts
|

Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography

Abstract: While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities. Therefore, determining how to balance the privacy protection requirements of user communication in the network with the authorized monitoring requirements of law enforcement agencies (LEAs) is a meaningful task. To solve this problem, a new tripartite authenticated key agreement (Tri-AKA) protocol and a session key escrow scheme based on threshold cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…LIKE also provides much stronger guarantees than key-escrow [37,21,7,44,40,10,18,34,32,33,26,35,41,38,19]: we can handle malicious authority input; we fine-grain exceptional opening so that it only holds for one session at a time; we allow authorities to remain offline at all times except for exceptional opening; we minimize storage and computational costs for users and authorities; we have no central key-generation authority which knows all secret keys; and we guarantee the new properties of non-frameability and honest operator, which are tailored to the LI requirements analyzed above. In return, our use-case is narrower than typically considered in key-escrow: by considering the case of mobile communications, we can safely assume that parties always use the operator as a proxy, unlike in generic key-escrow settings.…”
Section: Related Workmentioning
confidence: 99%
“…LIKE also provides much stronger guarantees than key-escrow [37,21,7,44,40,10,18,34,32,33,26,35,41,38,19]: we can handle malicious authority input; we fine-grain exceptional opening so that it only holds for one session at a time; we allow authorities to remain offline at all times except for exceptional opening; we minimize storage and computational costs for users and authorities; we have no central key-generation authority which knows all secret keys; and we guarantee the new properties of non-frameability and honest operator, which are tailored to the LI requirements analyzed above. In return, our use-case is narrower than typically considered in key-escrow: by considering the case of mobile communications, we can safely assume that parties always use the operator as a proxy, unlike in generic key-escrow settings.…”
Section: Related Workmentioning
confidence: 99%
“…We provide stronger guarantees than typical key-escrow [19,12,4,23,21,6,10,17,15,16,13,18,22,20,11]. First, our chosen use-case (mobile communications) obliges participants to communicate via two serving networks which can now vouchsafe for Alice's and Bob's protocol-compliance.…”
Section: Introductionmentioning
confidence: 99%
“…On the application side, Key-Escrow (KE) and Key-Recovery (KR) [13,18,23,24] schemes deal with the capability of an authority to decrypt the messages exchanged between two users by recovering their secret key. Some works deal with KR mechanisms for lawful interception [1,13,24], where a set of authorities has to collude to open an encrypted phone conversation between two users. As in APOPKE, the security model ensures that the recovered conversation is the same as the exchanged one.…”
Section: Introductionmentioning
confidence: 99%