Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2002.9C.5.665

Key Exchange md Key Recovery System in Wireless Communications using Key Escrow  

Joo, Mi-Ri (국가보안기술연구소)
Won, Dong-Ho (성균관대학교 정보통신공학부)
Abstract
Wireless communications require the cryptography system which satisfies a opposite purpose as safety and efficiency. In this paper we proposed the efficient key distribution system satisfying in wireless communication using escrow in order to satisfy the requirements. We supplemented the key recovery function to prevent side effects of cryptography and it is possible to check verification. Also, transmitted information is a little so that the system is efficient. The proposed key recovery method can be applicable to various application fields.
Keywords
wireless communications; authentication; Key exchange; Key recovery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 NIST, 'Escrowed Encryption Standard,' Federal Information Proceeding Standards Publication 185, 1994
2 David M. Balenson, Carl M. Elli son, StevenB. Lipner and Stephen T. Walker, 'A New Approach to Software Key Escrow Encryption,' Building in Big Brother : The Cryptographic Policy Debate, Springer-Verlag, pp.180-207, 1995
3 Sivio Micali, 'Fair public key crypto-systems,' Crypto'92, Springer-Verlag, Lecture Notes in Computer Science, LNCS 740, pp.113-138, 1992
4 Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, Dennis K. Branstad and David M. Balenson, 'Commercial Key Escow : something for everyone now and for the future,' TIS Report, No.541, Trusted Information Systems Inc., 1995
5 Eric Verheul and Henk C. A. van Tilborg, 'Binding ElGamal : A Fraud Detectable Alternative to Key-Escrow Proposals,' Eurocrypto'97,Springer-Verlag,Lecture Notes in Comfuter Science, LNCS 1233, pp.119-133, 1997
6 K. Rantos and C. Mltchell, 'Key Recovery in ASPeCT Authentication and Initialisation of Payment Protocol,' presented at ACTS Mobiles Summint, Sorrento, Italy, June, 1999
7 J. Nieto, D. Park, C. Boyd and E. Dawson, 'Key Recovery in Third Generation Wireless Communication Symtems,' Public Key Cryptography-PKC 2000, LNCS 1751, pp.223-237, 2000
8 W. Diffie and M. Hellman, 'New Direction in Cryptography,' IEEE Trans. Info. Theory, 22, pp.644-654, 1976   DOI
9 Adam Young and Moti Yung, 'Auto-Recoverablel Auto-Certifiable Cryptosystems,' Advanced in Cryptology-Eurocrypto'98, Springer-Verlag, Lecture Notes in Computer Science, pp.17-31, 1998   DOI
10 Pascal Pailler and Moti Yung, 'Self-Escrowed Public Key Infrastructures,' Proceedings of ICISC'99, The 2nd International Conference Information Security and Cryptology. Springer-Verlag, Lecture Note in Computer Science, 1999
11 Advanced Securuty for Personal Communications Technologies, http://www.esat.kuleuven.ac.be/cosic/aspect/index.html
12 C. H. Kim, P. J. Lee, 'New Key Recovery in WAKE Protocol,' Public Key Cryptography-PKC 2001, LNCS 1992, pp.325-338, 2001