Skip to main content

New Identity Escrow Scheme for Anonymity Authentication

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2002 (INDOCRYPT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2551))

Included in the following conference series:

Abstract

When a user and a service provider carry out the authentication process, a user’s identity may be exposed and this issue has become a serious social problem. To solve this problem, identity escrow scheme is suggested. In the identity escrow scheme, the issuer who has accurate user identity safely transmits anonymous authentication information to the user and by utilizing this information, the user proceeds authentication steps with the service provider while keeping anonymity. In this thesis, requirements for security and trusty of the identity escrow scheme are suggested and new mechanism is proposed to satisfy them. Also, methods for a service provider to safely transmit the contents to the user and improved mechanism able to support key escrow in encryption communication using the key generated by key agreement among users in the same domain are proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Camenisch, “Efficient and generalized group signatures”, Advances in Cryptology-EUROCRYPT’ 97, pp. 465–479, 1997

    Google Scholar 

  2. J. Kilian and E. Petrank, “Identity Escrow,” Advances in Cryptology-CRYPTO’98, pp. 169–184, 1998

    Google Scholar 

  3. J. Kilian and E. Petrank, “Identity Escrow”, Theory of Cryptography Library, ftp://theory.lcs.mit.edu/pub/tcrypto1/97-11.ps, 1997

  4. K. Sakurai and Y. Yamane, “Key Escrow system of Protecting User’s Privacy by Blind Decoding”, pp. 147–157, 1998

    Google Scholar 

  5. M. Stadler, “Fair blind signatures”, In Proc. Eurocrypt 95, LNCS 921, pp. 209–219, 1995

    Google Scholar 

  6. S. Micali, “Fair Cryptosystems”, Advances in Cryptology-CRYPTO’ 92, pp. 113–138, 1992

    Google Scholar 

  7. Yong-Rak Choi, Ou-Yeong So, Jae-Gwang Lee, and Im-Yeong Lee, Computer network security, proceeding in greenpress, 2001

    Google Scholar 

  8. Yong-Ho Lee and Im-Yeong Lee, “Identity Escrow scheme for publicly verifiable of anonymity control”, CISC 2001, pp. 79–82, 2001

    Google Scholar 

  9. Bo-Sung Hwang and Im-Yeong Lee, “The proposals of Identity Escrow Scheme to Control user’s anonymity”, journal of korea multimedia society, vol.4, no.6, pp. 617–624, 2000

    MathSciNet  Google Scholar 

  10. Bo-Sung Hwang and Im-Yeong Lee, “A Design of Identity Escrow Scheme”, WISC’2000, pp. 588–602, 2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, YH., Lee, IY., Lee, HW. (2002). New Identity Escrow Scheme for Anonymity Authentication. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-36231-2_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00263-5

  • Online ISBN: 978-3-540-36231-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics