Skip to main content

Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP

  • Conference paper
Signal Processing and Information Technology (SPIT 2011)

Abstract

This paper focuses on improving the accessibility and security of multiple escrow agents by dividing the session master key into M chunks and escrowing the chunks with M escrow agents. Using threshold cryptography the key can be regenerated by gathering any N-out-of-M chunks. This N-out-of-M approach increases the security of the session master key as at least N chunks of the session key are needed to regenerate the session key. Disclosure of less than N chunks does not threat the security of the session key. On the other hand, failure of a single escrow agent does not affect the availability of the session key as long as N escrow agents are working. For a highly sophisticated session, the user might define a higher value for M and N. For a less confidential or less important session, the value of M and N might be smaller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption (1997), http://www.schneier.com/paper-key-escrow.pdf

  2. Zhou, H., Mutka, M.W., Ni, L.M.: Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks. In: Global Telecommunications Conference, GLOBECOM 2005, vol. 3. IEEE, St. Louis (2005)

    Google Scholar 

  3. Evripidis, R.: Lawful Interception and Countermeasures: In the era of Internet Telephony, School of Information and Communication Technology (COS/CCS), 2008-20, Royal Institute of Technology (KTH), Stockholm (2008), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/080922-Romanidis_Evripidis-with-cover.pdf

  4. Hossen, M.S.: A Session Initiation Protocol User Agent with Key Escrow: Providing authenticity for recordings of secure sessions, Department of Communication Systems (CoS), Royal Institute of Technology (KTH), TRITA-ICT-EX-2010:1, Stockholm (2010), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100118-Md._Sakhawat_Hossen-with-cover.pdf

  5. Morshed, M.S.J.: VoIP Lawful Intercept: Good Cop/Bad Cop, Department of Communication Systems (CoS), Royal Institute of Technology (KTH), TRITA-ICT-EX-2010:28, Stockholm (2010), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100221-Muhammad_Sarwar_Jahan_Morshed-with-cover.pdf

  6. Shamir, A.: How to share a secret. Communications of the ACM 22(11) (1979)

    Google Scholar 

  7. RSA Laboratories, http://www.rsa.com/RSALABS/node.asp?id=2259

  8. MiniSIP homepage, http://www.minisip.org

  9. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, IETF RFC 3261, IETF Network Working Group (2002)

    Google Scholar 

  10. Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: MIKEY: Multimedia Internet KEYing, IETF RFC 3830, IETF Network Working Group (2004)

    Google Scholar 

  11. Libcurl-the Multiprotocol File Transfer Library, http://curl.haxx.se/libcurl/

  12. Shamir’s Secret Sharing Scheme, http://point-at-infinity.org/ssss/

  13. GNU General Public License, http://www.gnu.org/licenses/gpl.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Azfar, A. (2012). Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32573-1_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics