The Internet of Things in this article is formed of security center, key escrow centers, readers and tags. Authentication use asymmetric encryption algorithm, there is a private key in the reader / tag. When the reader / tag in some special cases, it may be lost or damaged their own private key and can't be authenticated, then the key recovery is very important. This article compares the two threshold scheme, eventually propose a key escrow program based on the Shamir threshold. Using a the shamir threshold algorithm, the private key of the reader / tag is divided into n parts and sent to key escrow centers. if you want to restore the private key, you need at least t parts. This scheme makes key management more secure and flexible.
[1]
G. R. BLAKLEY.
Safeguarding cryptographic keys
,
1979,
1979 International Workshop on Managing Requirements Knowledge (MARK).
[2]
Rafail Ostrovsky,et al.
How To Withstand Mobile Virus Attacks
,
1991,
PODC 1991.
[3]
Rafail Ostrovsky,et al.
How to withstand mobile virus attacks (extended abstract)
,
1991,
PODC '91.
[4]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.