On the key recovery of the Key Escrow System

Author(s):  
Yung-Cheng Lee ◽  
Chi-Sung Laih
Keyword(s):  
1996 ◽  
Vol 1996 (11) ◽  
pp. 8-10
Author(s):  
Wayne Madsen
Keyword(s):  

2021 ◽  
Vol 190 ◽  
pp. 104511
Author(s):  
Obert C. Chikwanha ◽  
Sandra Mupfiga ◽  
Bosede R. Olagbegi ◽  
Chenaimoyo L.F. Katiyatiya ◽  
Annelin H. Molotsi ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3474
Author(s):  
Taehoon Kim ◽  
Wonbin Kim ◽  
Daehee Seo ◽  
Imyeong Lee

Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security. For instance, if a key used for encryption is lost or corrupted, then ciphertexts produced with this key cannot be decrypted any more. Hence, this paper presents two schemes for key recovery systems that can recover the lost or the corrupted keys of an Internet of Medical Things. In our proposal, when the key used for the ciphertext is needed, this key is obtained from a Key Recovery Field present in the cyphertext. Thus, the recovered key will allow decrypting the ciphertext. However, there are threats to this proposal, including the case of the Key Recovery Field being forged or altered by a malicious user and the possibility of collusion among participating entities (Medical Institution, Key Recovery Auditor, and Key Recovery Center) which can interpret the Key Recovery Field and abuse their authority to gain access to the data. To prevent these threats, two schemes are proposed. The first one enhances the security of a multi-agent key recovery system by providing the Key Recovery Field with efficient integrity and non-repudiation functions, and the second one provides a proxy re-encryption function resistant to collusion attacks against the key recovery system.


Sign in / Sign up

Export Citation Format

Share Document