Abstract
This paper focuses on improving the accessibility and security of multiple escrow agents by dividing the session master key into M chunks and escrowing the chunks with M escrow agents. Using threshold cryptography the key can be regenerated by gathering any N-out-of-M chunks. This N-out-of-M approach increases the security of the session master key as at least N chunks of the session key are needed to regenerate the session key. Disclosure of less than N chunks does not threat the security of the session key. On the other hand, failure of a single escrow agent does not affect the availability of the session key as long as N escrow agents are working. For a highly sophisticated session, the user might define a higher value for M and N. For a less confidential or less important session, the value of M and N might be smaller.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption (1997), http://www.schneier.com/paper-key-escrow.pdf
Zhou, H., Mutka, M.W., Ni, L.M.: Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks. In: Global Telecommunications Conference, GLOBECOM 2005, vol. 3. IEEE, St. Louis (2005)
Evripidis, R.: Lawful Interception and Countermeasures: In the era of Internet Telephony, School of Information and Communication Technology (COS/CCS), 2008-20, Royal Institute of Technology (KTH), Stockholm (2008), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/080922-Romanidis_Evripidis-with-cover.pdf
Hossen, M.S.: A Session Initiation Protocol User Agent with Key Escrow: Providing authenticity for recordings of secure sessions, Department of Communication Systems (CoS), Royal Institute of Technology (KTH), TRITA-ICT-EX-2010:1, Stockholm (2010), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100118-Md._Sakhawat_Hossen-with-cover.pdf
Morshed, M.S.J.: VoIP Lawful Intercept: Good Cop/Bad Cop, Department of Communication Systems (CoS), Royal Institute of Technology (KTH), TRITA-ICT-EX-2010:28, Stockholm (2010), http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100221-Muhammad_Sarwar_Jahan_Morshed-with-cover.pdf
Shamir, A.: How to share a secret. Communications of the ACM 22(11) (1979)
RSA Laboratories, http://www.rsa.com/RSALABS/node.asp?id=2259
MiniSIP homepage, http://www.minisip.org
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, IETF RFC 3261, IETF Network Working Group (2002)
Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: MIKEY: Multimedia Internet KEYing, IETF RFC 3830, IETF Network Working Group (2004)
Libcurl-the Multiprotocol File Transfer Library, http://curl.haxx.se/libcurl/
Shamir’s Secret Sharing Scheme, http://point-at-infinity.org/ssss/
GNU General Public License, http://www.gnu.org/licenses/gpl.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Azfar, A. (2012). Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-32573-1_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32572-4
Online ISBN: 978-3-642-32573-1
eBook Packages: Computer ScienceComputer Science (R0)