Multiple Escrow Agents in VoIP

Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in ...

[1]  W. W. PETERSONt,et al.  Cyclic Codes for Error Detection * , 2022 .

[2]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[3]  Romanidis Evripidis Lawful Interception and Countermeasures : In the era of Internet Telephony , 2008 .

[4]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[5]  H. L. Nguyen,et al.  RSA Threshold Cryptography , 2005 .

[6]  Jari Arkko,et al.  MIKEY: Multimedia Internet KEYing , 2004, RFC.

[7]  Lionel M. Ni,et al.  Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[8]  Andrew S. Tanenbaum,et al.  Computer networks, third edition , 1996 .

[9]  Johan Bilien Key Agreement for Secure Voice over IP , 2003 .

[10]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[11]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[12]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[13]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[14]  Peter G. Neumann,et al.  The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..

[15]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[16]  Matt Blaze,et al.  Protocol failure in the escrowed encryption standard , 1994, CCS '94.

[17]  Erik Eliasson Secure Internet telephony : design, implementation and performance measurements , 2006 .

[18]  A. Michael Froomkin The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution , 1995 .

[19]  J. Sobolewski Cyclic redundancy check , 2003 .

[20]  Tal Rabin,et al.  A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.