Retained-Key Encryption
David Crowe and
Wasim Al-Hamdani
Additional contact information
David Crowe: Department of Computer and Information Science, Kentucky State University, Frankfort, KY, USA
Wasim Al-Hamdani: College of Mathematics, Sciences, Technology and Health, State University, Frankfort, KY, USA
International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 2013, vol. 5, issue 2, 1-17
Abstract:
This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control over their keys. The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party—presumably, the software’s vendor. This model is not intended to replace public/private key-based mechanisms, as they serve an important role in message signing and authentication. Rather, it seeks to provide an alternative means of decrypting messages in a secure fashion while allowing the sender to avoid the need to disclose the message’s key.
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jitn.2013040101 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jitn00:v:5:y:2013:i:2:p:1-17
Access Statistics for this article
International Journal of Interdisciplinary Telecommunications and Networking (IJITN) is currently edited by Efosa Carroll Idemudia
More articles in International Journal of Interdisciplinary Telecommunications and Networking (IJITN) from IGI Global
Bibliographic data for series maintained by Journal Editor ().