Providing key recovery capability for mobile communications

Xiaowen CHU*, Yixin Jiang, Chuang Lin, Hao Yin, Bo Li

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review


In this paper, we propose a novel security scheme with key recovery capability for mobile communications. The proposed key recovery mechanism offers a "backdoor" for an authorized agency to monitor suspected communications while protecting legal users from unauthorized disclosure of their data privacy. All the features form a unitary security scheme with monitoring service. The performance analysis shows that our scheme has a low-computational complexity and it can be practically deployed on contemporary mobile devices.

Original languageEnglish
Pages (from-to)207-216
Number of pages10
JournalSecurity and Communication Networks
Issue number2-3
Publication statusPublished - 2010

Scopus Subject Areas

  • Information Systems
  • Computer Networks and Communications

User-Defined Keywords

  • Authentication
  • Key recovery
  • Mobile communications


Dive into the research topics of 'Providing key recovery capability for mobile communications'. Together they form a unique fingerprint.

Cite this