Title :
A key escrow scheme to IOT based on Shamir
Author :
Zeng Yingli ; Liu Dan
Author_Institution :
Res. Inst. Electron. Sci. & Technol., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Abstract :
The Internet of Things in this article is formed of security center, key escrow centers, readers and tags. Authentication use asymmetric encryption algorithm, there is a private key in the reader / tag. When the reader / tag in some special cases, it may be lost or damaged their own private key and can´t be authenticated, then the key recovery is very important. This article compares the two threshold scheme, eventually propose a key escrow program based on the Shamir threshold. Using a the shamir threshold algorithm, the private key of the reader / tag is divided into n parts and sent to key escrow centers. if you want to restore the private key, you need at least t parts. This scheme makes key management more secure and flexible.
Keywords :
Internet of Things; private key cryptography; telecommunication security; IOT; Internet of Things; Shamir threshold; asymmetric encryption algorithm; authentication; key escrow scheme; key recovery; private key management; security center; Authentication; Digital signatures; Encryption; Polynomials; Public key;
Conference_Titel :
Communications, Circuits and Systems (ICCCAS), 2013 International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-3050-0
DOI :
10.1109/ICCCAS.2013.6765293