{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T12:08:19Z","timestamp":1717330099051},"reference-count":18,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T00:00:00Z","timestamp":1301356800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2011,4]]},"abstract":"Abstract<\/jats:title>Key escrowing is one of the core technologies for the lawful interception (LI) of secure communications in the wired and wireless networks. Although many previous studies on the key escrowing have been done before, they are insufficient to be deployed in practical networks due to conflicts with the LI requirements. Moreover, there is lack of consideration on the LI of ID\u2010based cryptosystem (IDBC)\u2010based secure communication because the interest of the LI was moved to the industries and IDBC has the inherent key escrowing property. However, the inherent property of IDBC cannot prevent \u2018illegal\u2019 eavesdropping of all the communications in the networks from the law enforcement agency with the \u2018legally\u2019 obtained key. Thus, we propose a new key escrow model that satisfies the requirements of LI and overcomes the potential threats of IDBC. Our contributions enable the scalable and efficient key escrowing for the LI of secure one\u2010way and two\u2010pass communication in the mobile networks. Copyright \u00a9 2010 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.1165","type":"journal-article","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T12:13:45Z","timestamp":1279541625000},"page":"461-472","source":"Crossref","is-referenced-by-count":42,"title":["A scalable and efficient key escrow model for lawful interception of IDBC\u2010based secure communication"],"prefix":"10.1002","volume":"24","author":[{"given":"Kyusuk","family":"Han","sequence":"first","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]},{"given":"Jonghyuk","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,3,29]]},"reference":[{"key":"e_1_2_8_2_2","unstructured":"HanK YeunCY KimK.New key escrow model for the lawful interception in 3GPP. 2009 IEEE ICCE 2009 Las Vegas U.S.A. 12\u201314 January2009."},{"key":"e_1_2_8_3_2","doi-asserted-by":"crossref","unstructured":"BakerF FosterB SharpC.Cisco architecture for lawful intercept in IP networks. RFC 3924 2004.","DOI":"10.17487\/rfc3924"},{"key":"e_1_2_8_4_2","unstructured":"3rd Generation Partnership Project. TS 33.106: \u2018Lawful Interception Requirements\u2019. V8.1.0 edn March2008."},{"key":"e_1_2_8_5_2","unstructured":"3rd Generation Partnership Project. TS 33.107: \u2018Lawful Interception Architecture and Functions\u2019. V8.8.0 edn June2009."},{"key":"e_1_2_8_6_2","unstructured":"3rd Generation Partnership Project. TS 33.108: \u2018Handover Interface for Lawful Interception (LI)\u2019. V8.7.0 edn June2009."},{"key":"e_1_2_8_7_2","unstructured":"3rd Generation Partnership Project. TS 33.102 v9.1.0 3G Security: Security Architecture (Release 9) 18 December2009."},{"key":"e_1_2_8_8_2","doi-asserted-by":"crossref","unstructured":"KarpagavinayagamB StateR FestorO.Monitoring architecture for lawful interception in VoIP networks. Second International Conference on Internet Monitoring and Protection (ICIMP 2007) San Jose CA 1\u20135 July 2007. ISBN 0\u20107695\u20102911\u20109.","DOI":"10.1109\/ICIMP.2007.27"},{"key":"e_1_2_8_9_2","doi-asserted-by":"crossref","unstructured":"SeedorfJ.Lawful interception in P2P\u2010based VoIP systems. Principles Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference IPTComm 2008 Heidelberg Germany July 2008;217\u2013235. Revised Selected Papers.","DOI":"10.1007\/978-3-540-89054-6_11"},{"key":"e_1_2_8_10_2","series-title":"Lecture Notes in Computer Science","first-page":"113","volume-title":"Proceedings of the Advances in Cryptology\u2010CRYPTO '92","author":"Micali S","year":"1992"},{"key":"e_1_2_8_11_2","unstructured":"ShamirA.Partial key escrow: a new approach to software key escrow. Proceedings of the Key Escrow Conference Washington DC 15 September 1995."},{"key":"e_1_2_8_12_2","series-title":"Lecture Notes in Computer Science","first-page":"98","volume-title":"Proceedings Cryptography: Policy and Algorithms","author":"Jefferies N","year":"1995"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_10"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_18"},{"issue":"6","key":"e_1_2_8_15_2","first-page":"661","article-title":"A key escrow scheme with time\u2010limited monitoring for one\u2010way communication","volume":"45","author":"Abe M","year":"2002","journal-title":"British Computer Society 2002, The Computer Journal"},{"key":"e_1_2_8_16_2","series-title":"Lecture Notes in Computer Science","first-page":"47","volume-title":"Proceedings of the Advances in Cryptology\u2014CRYPTO 84","author":"Shamir A","year":"1984"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211"},{"key":"e_1_2_8_19_2","first-page":"130","article-title":"Secure key\u2010escrowless explicit authenticated key agreement protocol in ID\u2010based public key cryptography","volume":"5","author":"Hou M","year":"2010","journal-title":"Journal of Information Assurance and Security"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.1165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.1165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T05:04:06Z","timestamp":1696914246000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.1165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,29]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["10.1002\/dac.1165"],"URL":"https:\/\/doi.org\/10.1002\/dac.1165","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,29]]}}}