Research Article
Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP
@INPROCEEDINGS{10.1007/978-3-642-32573-1_23, author={Abdullah Azfar}, title={Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP}, proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers}, proceedings_a={SPIT \& IPC}, year={2012}, month={10}, keywords={Key escrow VoIP Escrow Agents Threshold Cryptography Shamir’s Secret Sharing}, doi={10.1007/978-3-642-32573-1_23} }
- Abdullah Azfar
Year: 2012
Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP
SPIT & IPC
Springer
DOI: 10.1007/978-3-642-32573-1_23
Abstract
This paper focuses on improving the accessibility and security of multiple escrow agents by dividing the session master key into M chunks and escrowing the chunks with M escrow agents. Using threshold cryptography the key can be regenerated by gathering any N-out-of-M chunks. This N-out-of-M approach increases the security of the session master key as at least N chunks of the session key are needed to regenerate the session key. Disclosure of less than N chunks does not threat the security of the session key. On the other hand, failure of a single escrow agent does not affect the availability of the session key as long as N escrow agents are working. For a highly sophisticated session, the user might define a higher value for M and N. For a less confidential or less important session, the value of M and N might be smaller.