Title :
Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case
Author :
Su Rui-dan ; Che Xiang-quan ; Fu Shao-feng ; Li Long-hai ; Zhou Li-hua
Author_Institution :
Key Lab. of Comput. Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi´an
Abstract :
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
Keywords :
cryptographic protocols; IPSec key recovery; SSH; SSL; TLS; identity based encryption approach; protocol-based hidden key recovery; real time key recovery; security protocols; Computer networks; Computer security; Cryptography; Identity-based encryption; Information security; Laboratories; Protection; Protocols; Public key; Wireless communication; IBE; IPSec; Protocol-based key recovery;
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
DOI :
10.1109/NSWCTC.2009.137