DocumentCode :
3312993
Title :
Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case
Author :
Su Rui-dan ; Che Xiang-quan ; Fu Shao-feng ; Li Long-hai ; Zhou Li-hua
Author_Institution :
Key Lab. of Comput. Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi´an
Volume :
2
fYear :
2009
fDate :
25-26 April 2009
Firstpage :
719
Lastpage :
723
Abstract :
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
Keywords :
cryptographic protocols; IPSec key recovery; SSH; SSL; TLS; identity based encryption approach; protocol-based hidden key recovery; real time key recovery; security protocols; Computer networks; Computer security; Cryptography; Identity-based encryption; Information security; Laboratories; Protection; Protocols; Public key; Wireless communication; IBE; IPSec; Protocol-based key recovery;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
Type :
conf
DOI :
10.1109/NSWCTC.2009.137
Filename :
4908570
Link To Document :
بازگشت