New key escrow model for the lawful interception in 3GPP

Kyusuk Han, Chan Yeob Yeun, Kwangjo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

For the lawful interception (LI) of the secure communications, ID-based cryptosystem has the property of key escrow that can be efficiently used for LI. However, it does not prevent the malicious use of the escrowed key by the LEA. Thus, we would like to propose a new key escrow model that enablesthe limited capability of lawful interception agency.

Original languageBritish English
Title of host publication2009 Digest of Technical Papers International Conference on Consumer Electronics, ICCE 2009
DOIs
StatePublished - 2009
Event2009 International Conference on Consumer Electronics, ICCE 2009 - Las Vegas, NV, United States
Duration: 10 Jan 200914 Jan 2009

Publication series

NameDigest of Technical Papers - IEEE International Conference on Consumer Electronics
ISSN (Print)0747-668X

Conference

Conference2009 International Conference on Consumer Electronics, ICCE 2009
Country/TerritoryUnited States
CityLas Vegas, NV
Period10/01/0914/01/09

Fingerprint

Dive into the research topics of 'New key escrow model for the lawful interception in 3GPP'. Together they form a unique fingerprint.

Cite this