DocumentCode
3312993
Title
Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case
Author
Su Rui-dan ; Che Xiang-quan ; Fu Shao-feng ; Li Long-hai ; Zhou Li-hua
Author_Institution
Key Lab. of Comput. Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi´an
Volume
2
fYear
2009
fDate
25-26 April 2009
Firstpage
719
Lastpage
723
Abstract
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
Keywords
cryptographic protocols; IPSec key recovery; SSH; SSL; TLS; identity based encryption approach; protocol-based hidden key recovery; real time key recovery; security protocols; Computer networks; Computer security; Cryptography; Identity-based encryption; Information security; Laboratories; Protection; Protocols; Public key; Wireless communication; IBE; IPSec; Protocol-based key recovery;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-1-4244-4223-2
Type
conf
DOI
10.1109/NSWCTC.2009.137
Filename
4908570
Link To Document