About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers

Research Article

Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP

Download(Requires a free EAI acccount)
543 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-32573-1_23,
        author={Abdullah Azfar},
        title={Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP},
        proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers},
        proceedings_a={SPIT \& IPC},
        year={2012},
        month={10},
        keywords={Key escrow VoIP Escrow Agents Threshold Cryptography Shamir’s Secret Sharing},
        doi={10.1007/978-3-642-32573-1_23}
    }
    
  • Abdullah Azfar
    Year: 2012
    Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP
    SPIT & IPC
    Springer
    DOI: 10.1007/978-3-642-32573-1_23
Abdullah Azfar1,*
  • 1: Islamic University of Technology (IUT)
*Contact email: azfar@iut-dhaka.edu

Abstract

This paper focuses on improving the accessibility and security of multiple escrow agents by dividing the session master key into M chunks and escrowing the chunks with M escrow agents. Using threshold cryptography the key can be regenerated by gathering any N-out-of-M chunks. This N-out-of-M approach increases the security of the session master key as at least N chunks of the session key are needed to regenerate the session key. Disclosure of less than N chunks does not threat the security of the session key. On the other hand, failure of a single escrow agent does not affect the availability of the session key as long as N escrow agents are working. For a highly sophisticated session, the user might define a higher value for M and N. For a less confidential or less important session, the value of M and N might be smaller.

Keywords
Key escrow VoIP Escrow Agents Threshold Cryptography Shamir’s Secret Sharing
Published
2012-10-08
http://dx.doi.org/10.1007/978-3-642-32573-1_23
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL