z-logo
open-access-imgOpen Access
Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks
Author(s) -
B. Sugumar,
M. Ramakrishnan
Publication year - 2018
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v11.i3.pp1060-1067
Subject(s) - key escrow , computer science , encryption , elliptic curve cryptography , signcryption , cryptography , id based cryptography , public key cryptography , key management , computer network , key (lock) , computer security , distributed computing , key distribution
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key escrow scheme is implemented with the light weighted symmetric algorithm, elliptic curve cryptography in the distributed environment. Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme. The implementation of Key Escrow mechanism with Elliptical Curve Cryptography provides wide range of flexibility and confidentiality in the distributed environment. It also eliminates private secret sub key problem and thereby ensuring better security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here