• DocumentCode
    3312993
  • Title

    Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case

  • Author

    Su Rui-dan ; Che Xiang-quan ; Fu Shao-feng ; Li Long-hai ; Zhou Li-hua

  • Author_Institution
    Key Lab. of Comput. Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi´an
  • Volume
    2
  • fYear
    2009
  • fDate
    25-26 April 2009
  • Firstpage
    719
  • Lastpage
    723
  • Abstract
    Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
  • Keywords
    cryptographic protocols; IPSec key recovery; SSH; SSL; TLS; identity based encryption approach; protocol-based hidden key recovery; real time key recovery; security protocols; Computer networks; Computer security; Cryptography; Identity-based encryption; Information security; Laboratories; Protection; Protocols; Public key; Wireless communication; IBE; IPSec; Protocol-based key recovery;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-1-4244-4223-2
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2009.137
  • Filename
    4908570