CN102415047B - 密码处理系统 - Google Patents
密码处理系统 Download PDFInfo
- Publication number
- CN102415047B CN102415047B CN201080017994.8A CN201080017994A CN102415047B CN 102415047 B CN102415047 B CN 102415047B CN 201080017994 A CN201080017994 A CN 201080017994A CN 102415047 B CN102415047 B CN 102415047B
- Authority
- CN
- China
- Prior art keywords
- vector
- keys
- information
- key
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2009-104915 | 2009-04-23 | ||
| JP2009104915 | 2009-04-23 | ||
| JP2009-264576 | 2009-11-20 | ||
| JP2009264576A JP5349261B2 (ja) | 2009-04-23 | 2009-11-20 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| PCT/JP2010/056639 WO2010122926A1 (ja) | 2009-04-23 | 2010-04-14 | 暗号処理システム |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102415047A CN102415047A (zh) | 2012-04-11 |
| CN102415047B true CN102415047B (zh) | 2015-12-09 |
Family
ID=43011044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201080017994.8A Active CN102415047B (zh) | 2009-04-23 | 2010-04-14 | 密码处理系统 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8559638B2 (enExample) |
| EP (1) | EP2424154B1 (enExample) |
| JP (1) | JP5349261B2 (enExample) |
| KR (1) | KR101359200B1 (enExample) |
| CN (1) | CN102415047B (enExample) |
| ES (1) | ES2873230T3 (enExample) |
| WO (1) | WO2010122926A1 (enExample) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010123112A1 (ja) * | 2009-04-24 | 2010-10-28 | 日本電信電話株式会社 | 暗号化装置、復号装置、暗号化方法、復号方法、セキュリティ方法、プログラム及び記録媒体 |
| US8488780B2 (en) * | 2009-04-24 | 2013-07-16 | Nippon Telegraph And Telephone Corporation | Finite field calculation apparatus, finite field calculation method and recording medium |
| US8577030B2 (en) * | 2009-11-20 | 2013-11-05 | Mitsubishi Electric Corporation | Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program |
| JP5334873B2 (ja) * | 2010-01-08 | 2013-11-06 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| WO2011086687A1 (ja) | 2010-01-15 | 2011-07-21 | 三菱電機株式会社 | 秘匿検索システム及び暗号処理システム |
| JP5424974B2 (ja) | 2010-04-27 | 2014-02-26 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、署名処理システム、署名装置及び検証装置 |
| US9276746B2 (en) | 2011-01-18 | 2016-03-01 | Mitsubishi Electric Corporation | Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization |
| JP5606351B2 (ja) * | 2011-02-09 | 2014-10-15 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、鍵委譲装置、暗号処理方法及び暗号処理プログラム |
| JP5677273B2 (ja) | 2011-11-18 | 2015-02-25 | 三菱電機株式会社 | 暗号処理システム、暗号処理方法、暗号処理プログラム及び鍵生成装置 |
| JP5680007B2 (ja) * | 2012-03-06 | 2015-03-04 | 三菱電機株式会社 | 暗号システム、暗号方法及び暗号プログラム |
| JP5730805B2 (ja) * | 2012-04-04 | 2015-06-10 | 日本電信電話株式会社 | 格子問題に基づく階層型内積暗号システム,格子問題に基づく階層型内積暗号方法,装置 |
| JP6057725B2 (ja) * | 2013-01-15 | 2017-01-11 | 三菱電機株式会社 | 情報処理装置 |
| CN104871477B (zh) * | 2013-01-16 | 2018-07-10 | 三菱电机株式会社 | 加密系统、重加密密钥生成装置、重加密装置、加密方法 |
| WO2014112170A1 (ja) * | 2013-01-16 | 2014-07-24 | 三菱電機株式会社 | 情報処理装置及び情報処理方法及びプログラム |
| US8559631B1 (en) * | 2013-02-09 | 2013-10-15 | Zeutro Llc | Systems and methods for efficient decryption of attribute-based encryption |
| EP2860905A1 (en) * | 2013-10-09 | 2015-04-15 | Thomson Licensing | Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product |
| US9979536B2 (en) * | 2013-10-09 | 2018-05-22 | Mitsubishi Electric Corporation | Cryptographic system, encryption device, re-encryption key generation device, re-encryption device, and cryptographic program |
| US20160344708A1 (en) * | 2014-01-14 | 2016-11-24 | Mitsubishi Electric Corporation | Cryptographic system, re-encryption key generation device, re-encryption device, and cryptographic computer readable medium |
| CN106031080B (zh) | 2014-02-24 | 2019-07-16 | 三菱电机株式会社 | 加密系统 |
| DE112014007235B4 (de) | 2014-12-05 | 2024-10-10 | Mitsubishi Electric Corporation | Kryptografisches System, Hauptschlüsselaktualisierungseinrichtung und Hauptschlüsselaktualisierungsprogramm |
| US9438412B2 (en) * | 2014-12-23 | 2016-09-06 | Palo Alto Research Center Incorporated | Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings |
| US10965459B2 (en) | 2015-03-13 | 2021-03-30 | Fornetix Llc | Server-client key escrow for applied key management system and process |
| JP6305638B2 (ja) | 2015-04-07 | 2018-04-04 | 三菱電機株式会社 | 暗号システム及び鍵生成装置 |
| CN105635135B (zh) * | 2015-12-28 | 2019-01-25 | 北京科技大学 | 一种基于属性集及关系谓词的加密系统及访问控制方法 |
| US10931653B2 (en) * | 2016-02-26 | 2021-02-23 | Fornetix Llc | System and method for hierarchy manipulation in an encryption key management system |
| CN106533697B (zh) * | 2016-12-06 | 2019-11-08 | 上海交通大学 | 随机数生成与提取方法及其在身份认证上的应用 |
| US10205713B2 (en) * | 2017-04-05 | 2019-02-12 | Fujitsu Limited | Private and mutually authenticated key exchange |
| WO2019016185A1 (en) | 2017-07-18 | 2019-01-24 | Legic Identsystems Ag | METHOD AND DEVICES FOR SECURE COMMUNICATION BETWEEN DEVICES |
| JP6456451B1 (ja) | 2017-09-25 | 2019-01-23 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 通信装置、通信方法、及びプログラム |
| CN115004559A (zh) * | 2020-01-20 | 2022-09-02 | 上海诺基亚贝尔股份有限公司 | 基于数据隐私保护的极性编码 |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1178619A (zh) * | 1996-01-26 | 1998-04-08 | 布尔Cp8公司 | 非对称密码通信过程与相关的便携装置 |
| CN1706138A (zh) * | 2003-02-12 | 2005-12-07 | 松下电器产业株式会社 | 发送装置及无线通信方法 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070223686A1 (en) * | 2004-09-16 | 2007-09-27 | Shidong Li | Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping |
| US8190553B2 (en) * | 2007-12-20 | 2012-05-29 | Routt Thomas J | Methods and systems for quantum search, computation and memory |
| CN101911582B (zh) | 2008-01-18 | 2012-09-05 | 三菱电机株式会社 | 密码参数设定装置、密钥生成装置、密码系统、密码参数设定方法和密钥生成方法 |
| WO2010123112A1 (ja) * | 2009-04-24 | 2010-10-28 | 日本電信電話株式会社 | 暗号化装置、復号装置、暗号化方法、復号方法、セキュリティ方法、プログラム及び記録媒体 |
-
2009
- 2009-11-20 JP JP2009264576A patent/JP5349261B2/ja active Active
-
2010
- 2010-04-14 KR KR1020117027936A patent/KR101359200B1/ko not_active Expired - Fee Related
- 2010-04-14 ES ES10766983T patent/ES2873230T3/es active Active
- 2010-04-14 WO PCT/JP2010/056639 patent/WO2010122926A1/ja not_active Ceased
- 2010-04-14 CN CN201080017994.8A patent/CN102415047B/zh active Active
- 2010-04-14 EP EP10766983.0A patent/EP2424154B1/en active Active
- 2010-04-14 US US13/266,002 patent/US8559638B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1178619A (zh) * | 1996-01-26 | 1998-04-08 | 布尔Cp8公司 | 非对称密码通信过程与相关的便携装置 |
| CN1706138A (zh) * | 2003-02-12 | 2005-12-07 | 松下电器产业株式会社 | 发送装置及无线通信方法 |
Non-Patent Citations (2)
| Title |
|---|
| Hierarchical Identity Based Encryption with Polynomially Many Levels;Craig Gentry and Shai Halevi;《LNCS》;20090331;437-456 * |
| Predicate Privacy in Encryption Systems;Emily Shen,Elain Shi,and Brent Waters;《LNCS》;20090331;457-473 * |
Also Published As
| Publication number | Publication date |
|---|---|
| ES2873230T3 (es) | 2021-11-03 |
| JP2010273317A (ja) | 2010-12-02 |
| KR101359200B1 (ko) | 2014-02-05 |
| KR20120068762A (ko) | 2012-06-27 |
| EP2424154A1 (en) | 2012-02-29 |
| WO2010122926A1 (ja) | 2010-10-28 |
| US8559638B2 (en) | 2013-10-15 |
| US20120045056A1 (en) | 2012-02-23 |
| CN102415047A (zh) | 2012-04-11 |
| JP5349261B2 (ja) | 2013-11-20 |
| EP2424154A4 (en) | 2017-07-12 |
| EP2424154B1 (en) | 2021-04-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102415047B (zh) | 密码处理系统 | |
| CN103038805B (zh) | 密码处理系统、密钥生成装置、密钥转让装置、加密装置、解密装置、密码处理方法以及密码处理程序 | |
| CN103444126B (zh) | 密码处理系统、密钥生成装置、加密装置、解密装置以及密码处理方法 | |
| CN102598576B (zh) | 数据处理装置 | |
| CN104160437B (zh) | 密码系统以及密码方法 | |
| CN102859571B (zh) | 密码处理系统、密钥生成装置、加密装置、解密装置、签名处理系统、签名装置以及验证装置 | |
| CN102822883B (zh) | 密码处理系统、密钥生成装置、密钥转让装置、加密装置、解密装置、密码处理方法以及密码处理程序 | |
| JP5905128B2 (ja) | 暗号システム、再暗号化装置及び暗号方法 | |
| CN107086912B (zh) | 一种异构存储系统中的密文转换方法、解密方法及系统 | |
| CN105850071A (zh) | 加密系统、重加密密钥生成装置、重加密装置和加密程序 | |
| WO2018043049A1 (ja) | 暗号システム、暗号方法及び暗号プログラム | |
| CN105637799B (zh) | 加密系统、加密装置、重加密密钥生成装置以及重加密装置 | |
| CN104718566A (zh) | 密码系统 | |
| CN103354984B (zh) | 密码处理系统、密钥生成装置、加密装置、解密装置、密钥移交装置以及密码处理方法 | |
| Lin et al. | Cca-secure identity-based matchmaking encryption from standard assumptions |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |