ES2873230T3 - Sistema de procesamiento de encriptado - Google Patents

Sistema de procesamiento de encriptado Download PDF

Info

Publication number
ES2873230T3
ES2873230T3 ES10766983T ES10766983T ES2873230T3 ES 2873230 T3 ES2873230 T3 ES 2873230T3 ES 10766983 T ES10766983 T ES 10766983T ES 10766983 T ES10766983 T ES 10766983T ES 2873230 T3 ES2873230 T3 ES 2873230T3
Authority
ES
Spain
Prior art keywords
vector
key
formula
base
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES10766983T
Other languages
English (en)
Spanish (es)
Inventor
Katsuyuki Takashima
Tatsuaki Okamoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
NTT Inc
Original Assignee
Mitsubishi Electric Corp
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp, Nippon Telegraph and Telephone Corp filed Critical Mitsubishi Electric Corp
Application granted granted Critical
Publication of ES2873230T3 publication Critical patent/ES2873230T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Computational Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
ES10766983T 2009-04-23 2010-04-14 Sistema de procesamiento de encriptado Active ES2873230T3 (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2009104915 2009-04-23
JP2009264576A JP5349261B2 (ja) 2009-04-23 2009-11-20 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
PCT/JP2010/056639 WO2010122926A1 (ja) 2009-04-23 2010-04-14 暗号処理システム

Publications (1)

Publication Number Publication Date
ES2873230T3 true ES2873230T3 (es) 2021-11-03

Family

ID=43011044

Family Applications (1)

Application Number Title Priority Date Filing Date
ES10766983T Active ES2873230T3 (es) 2009-04-23 2010-04-14 Sistema de procesamiento de encriptado

Country Status (7)

Country Link
US (1) US8559638B2 (enExample)
EP (1) EP2424154B1 (enExample)
JP (1) JP5349261B2 (enExample)
KR (1) KR101359200B1 (enExample)
CN (1) CN102415047B (enExample)
ES (1) ES2873230T3 (enExample)
WO (1) WO2010122926A1 (enExample)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010123117A1 (ja) * 2009-04-24 2010-10-28 日本電信電話株式会社 有限体演算装置、有限体演算方法、プログラム及び記録媒体
EP2423903B1 (en) * 2009-04-24 2014-07-16 Nippon Telegraph And Telephone Corporation Encryption apparatus, deccryption apparatus, encryption method, decryption method, security method, program, and recording medium
WO2011062136A1 (ja) * 2009-11-20 2011-05-26 三菱電機株式会社 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
JP5334873B2 (ja) * 2010-01-08 2013-11-06 三菱電機株式会社 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
WO2011086687A1 (ja) 2010-01-15 2011-07-21 三菱電機株式会社 秘匿検索システム及び暗号処理システム
JP5424974B2 (ja) 2010-04-27 2014-02-26 三菱電機株式会社 暗号処理システム、鍵生成装置、暗号化装置、復号装置、署名処理システム、署名装置及び検証装置
US9276746B2 (en) 2011-01-18 2016-03-01 Mitsubishi Electric Corporation Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization
JP5606351B2 (ja) * 2011-02-09 2014-10-15 三菱電機株式会社 暗号処理システム、鍵生成装置、暗号化装置、復号装置、鍵委譲装置、暗号処理方法及び暗号処理プログラム
JP5677273B2 (ja) * 2011-11-18 2015-02-25 三菱電機株式会社 暗号処理システム、暗号処理方法、暗号処理プログラム及び鍵生成装置
JP5680007B2 (ja) * 2012-03-06 2015-03-04 三菱電機株式会社 暗号システム、暗号方法及び暗号プログラム
JP5730805B2 (ja) * 2012-04-04 2015-06-10 日本電信電話株式会社 格子問題に基づく階層型内積暗号システム,格子問題に基づく階層型内積暗号方法,装置
JP6057725B2 (ja) * 2013-01-15 2017-01-11 三菱電機株式会社 情報処理装置
EP2947810B1 (en) * 2013-01-16 2021-07-14 Mitsubishi Electric Corporation Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
US9698977B2 (en) * 2013-01-16 2017-07-04 Mitsubishi Electric Corporation Information processing apparatus, information processing method, and program
US8559631B1 (en) * 2013-02-09 2013-10-15 Zeutro Llc Systems and methods for efficient decryption of attribute-based encryption
EP2860905A1 (en) * 2013-10-09 2015-04-15 Thomson Licensing Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product
WO2015052799A1 (ja) * 2013-10-09 2015-04-16 三菱電機株式会社 暗号システム、暗号化装置、再暗号化鍵生成装置、再暗号化装置及び暗号プログラム
WO2015107620A1 (ja) * 2014-01-14 2015-07-23 三菱電機株式会社 暗号システム、再暗号化鍵生成装置、再暗号化装置及び暗号プログラム
JP6053983B2 (ja) 2014-02-24 2016-12-27 三菱電機株式会社 暗号システム、署名システム、暗号プログラム及び署名プログラム
US10454673B2 (en) 2014-12-05 2019-10-22 Mitsubishi Electric Corporation Cryptographic system, master key update apparatus, and non-transitory computer-readable recording medium storing master key update program
US9438412B2 (en) * 2014-12-23 2016-09-06 Palo Alto Research Center Incorporated Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
JP6305638B2 (ja) 2015-04-07 2018-04-04 三菱電機株式会社 暗号システム及び鍵生成装置
CN105635135B (zh) * 2015-12-28 2019-01-25 北京科技大学 一种基于属性集及关系谓词的加密系统及访问控制方法
US10931653B2 (en) * 2016-02-26 2021-02-23 Fornetix Llc System and method for hierarchy manipulation in an encryption key management system
CN106533697B (zh) * 2016-12-06 2019-11-08 上海交通大学 随机数生成与提取方法及其在身份认证上的应用
US10205713B2 (en) * 2017-04-05 2019-02-12 Fujitsu Limited Private and mutually authenticated key exchange
CA3068145A1 (en) 2017-07-18 2019-01-24 Legic Identsystems Ag Method and devices for communicating securely between devices
JP6456451B1 (ja) 2017-09-25 2019-01-23 エヌ・ティ・ティ・コミュニケーションズ株式会社 通信装置、通信方法、及びプログラム
US12362908B2 (en) 2020-01-20 2025-07-15 Nokia Technologies Oy Data privacy protection based polar coding
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2744309B1 (fr) * 1996-01-26 1998-03-06 Bull Cp8 Procede de communicatin cryptographique asymetrique, et objet portatif associe
CN100588131C (zh) * 2003-02-12 2010-02-03 松下电器产业株式会社 发送装置及无线通信方法
US20070223686A1 (en) * 2004-09-16 2007-09-27 Shidong Li Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping
US8190553B2 (en) * 2007-12-20 2012-05-29 Routt Thomas J Methods and systems for quantum search, computation and memory
US8401179B2 (en) 2008-01-18 2013-03-19 Mitsubishi Electric Corporation Encryption parameter setting apparatus, key generation apparatus, cryptographic system, program, encryption parameter setting method, and key generation method
EP2423903B1 (en) * 2009-04-24 2014-07-16 Nippon Telegraph And Telephone Corporation Encryption apparatus, deccryption apparatus, encryption method, decryption method, security method, program, and recording medium

Also Published As

Publication number Publication date
KR101359200B1 (ko) 2014-02-05
KR20120068762A (ko) 2012-06-27
US8559638B2 (en) 2013-10-15
EP2424154B1 (en) 2021-04-07
US20120045056A1 (en) 2012-02-23
EP2424154A1 (en) 2012-02-29
JP2010273317A (ja) 2010-12-02
WO2010122926A1 (ja) 2010-10-28
CN102415047B (zh) 2015-12-09
JP5349261B2 (ja) 2013-11-20
CN102415047A (zh) 2012-04-11
EP2424154A4 (en) 2017-07-12

Similar Documents

Publication Publication Date Title
ES2873230T3 (es) Sistema de procesamiento de encriptado
Zhang et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
ES2693146T3 (es) Sistema de procesamiento criptográfico, dispositivo de generación de claves, dispositivo de cifrado, dispositivo de descifrado, sistema de procesamiento de firmas, dispositivo de firma y dispositivo de verificación
Baek et al. New constructions of fuzzy identity-based encryption
ES2627124T3 (es) Sistema de procesamiento de código, dispositivo de generación de claves, dispositivo codificador, dispositivo descodificador, procedimiento de procesamiento de código y programa de procesamiento de código
Zhandry How to avoid obfuscation using witness PRFs
ES2955589T3 (es) Sistema de procesamiento criptográfico, dispositivo de generación de clave, dispositivo de delegación de clave, dispositivo de cifrado, dispositivo de descifrado, procedimiento de procesamiento criptográfico y programa de procesamiento criptográfico
KR101606317B1 (ko) 암호 시스템, 암호 방법, 암호 프로그램을 기록한 컴퓨터 판독가능한 기록 매체 및 복호 장치
JPWO2010123116A1 (ja) 情報生成装置、方法、プログラム及びその記録媒体
Gu et al. New public key cryptosystems based on non‐Abelian factorization problems
ES2365887A1 (es) Metodo de verificacion de procesos de descifrado.
Miyaji et al. A scalable multiparty private set intersection
KR20230141845A (ko) 임계값 키 교환
Liu et al. Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
Matsuda et al. CCA proxy re-encryption without bilinear maps in the standard model
Wang et al. A new proxy re-encryption scheme for protecting critical information systems
Datta et al. Fully secure online/offline predicate and attribute-based encryption
Qin et al. Simultaneous authentication and secrecy in identity-based data upload to cloud
Watanabe et al. Identity-based hierarchical key-insulated encryption without random oracles
Park et al. An efficient IBE scheme with tight security reduction in the random oracle model
Zhang et al. Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
Tian A new strong multiple designated verifiers signature
Jia et al. IBE with tight security against selective opening and chosen-ciphertext attacks
Siddharth et al. A homomorphic encryption scheme over integers based on Carmichael's theorem
Isshiki et al. Attacks to the proxy re-encryption schemes from IWSEC2011