{"title":"New key escrow model for the lawful interception in 3GPP","authors":"Kyusuk Han, C. Yeun, Kwangjo Kim","doi":"10.1109/ICCE.2009.5012307","DOIUrl":null,"url":null,"abstract":"For the lawful interception (LI) of the secure communications, ID-based cryptosystem has the property of key escrow that can be efficiently used for LI. However, it does not prevent the malicious use of the escrowed key by the LEA. Thus, we would like to propose a new key escrow model that enables the limited capability of lawful interception agency.","PeriodicalId":154986,"journal":{"name":"2009 Digest of Technical Papers International Conference on Consumer Electronics","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Digest of Technical Papers International Conference on Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE.2009.5012307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
For the lawful interception (LI) of the secure communications, ID-based cryptosystem has the property of key escrow that can be efficiently used for LI. However, it does not prevent the malicious use of the escrowed key by the LEA. Thus, we would like to propose a new key escrow model that enables the limited capability of lawful interception agency.