ES2873230T3 - Sistema de procesamiento de encriptado - Google Patents
Sistema de procesamiento de encriptado Download PDFInfo
- Publication number
- ES2873230T3 ES2873230T3 ES10766983T ES10766983T ES2873230T3 ES 2873230 T3 ES2873230 T3 ES 2873230T3 ES 10766983 T ES10766983 T ES 10766983T ES 10766983 T ES10766983 T ES 10766983T ES 2873230 T3 ES2873230 T3 ES 2873230T3
- Authority
- ES
- Spain
- Prior art keywords
- vector
- key
- formula
- base
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2009104915 | 2009-04-23 | ||
| JP2009264576A JP5349261B2 (ja) | 2009-04-23 | 2009-11-20 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| PCT/JP2010/056639 WO2010122926A1 (ja) | 2009-04-23 | 2010-04-14 | 暗号処理システム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ES2873230T3 true ES2873230T3 (es) | 2021-11-03 |
Family
ID=43011044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES10766983T Active ES2873230T3 (es) | 2009-04-23 | 2010-04-14 | Sistema de procesamiento de encriptado |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8559638B2 (enExample) |
| EP (1) | EP2424154B1 (enExample) |
| JP (1) | JP5349261B2 (enExample) |
| KR (1) | KR101359200B1 (enExample) |
| CN (1) | CN102415047B (enExample) |
| ES (1) | ES2873230T3 (enExample) |
| WO (1) | WO2010122926A1 (enExample) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010123117A1 (ja) * | 2009-04-24 | 2010-10-28 | 日本電信電話株式会社 | 有限体演算装置、有限体演算方法、プログラム及び記録媒体 |
| EP2423903B1 (en) * | 2009-04-24 | 2014-07-16 | Nippon Telegraph And Telephone Corporation | Encryption apparatus, deccryption apparatus, encryption method, decryption method, security method, program, and recording medium |
| WO2011062136A1 (ja) * | 2009-11-20 | 2011-05-26 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| JP5334873B2 (ja) * | 2010-01-08 | 2013-11-06 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| WO2011086687A1 (ja) | 2010-01-15 | 2011-07-21 | 三菱電機株式会社 | 秘匿検索システム及び暗号処理システム |
| JP5424974B2 (ja) | 2010-04-27 | 2014-02-26 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、署名処理システム、署名装置及び検証装置 |
| US9276746B2 (en) | 2011-01-18 | 2016-03-01 | Mitsubishi Electric Corporation | Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization |
| JP5606351B2 (ja) * | 2011-02-09 | 2014-10-15 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、鍵委譲装置、暗号処理方法及び暗号処理プログラム |
| JP5677273B2 (ja) * | 2011-11-18 | 2015-02-25 | 三菱電機株式会社 | 暗号処理システム、暗号処理方法、暗号処理プログラム及び鍵生成装置 |
| JP5680007B2 (ja) * | 2012-03-06 | 2015-03-04 | 三菱電機株式会社 | 暗号システム、暗号方法及び暗号プログラム |
| JP5730805B2 (ja) * | 2012-04-04 | 2015-06-10 | 日本電信電話株式会社 | 格子問題に基づく階層型内積暗号システム,格子問題に基づく階層型内積暗号方法,装置 |
| JP6057725B2 (ja) * | 2013-01-15 | 2017-01-11 | 三菱電機株式会社 | 情報処理装置 |
| EP2947810B1 (en) * | 2013-01-16 | 2021-07-14 | Mitsubishi Electric Corporation | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program |
| US9698977B2 (en) * | 2013-01-16 | 2017-07-04 | Mitsubishi Electric Corporation | Information processing apparatus, information processing method, and program |
| US8559631B1 (en) * | 2013-02-09 | 2013-10-15 | Zeutro Llc | Systems and methods for efficient decryption of attribute-based encryption |
| EP2860905A1 (en) * | 2013-10-09 | 2015-04-15 | Thomson Licensing | Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product |
| WO2015052799A1 (ja) * | 2013-10-09 | 2015-04-16 | 三菱電機株式会社 | 暗号システム、暗号化装置、再暗号化鍵生成装置、再暗号化装置及び暗号プログラム |
| WO2015107620A1 (ja) * | 2014-01-14 | 2015-07-23 | 三菱電機株式会社 | 暗号システム、再暗号化鍵生成装置、再暗号化装置及び暗号プログラム |
| JP6053983B2 (ja) | 2014-02-24 | 2016-12-27 | 三菱電機株式会社 | 暗号システム、署名システム、暗号プログラム及び署名プログラム |
| US10454673B2 (en) | 2014-12-05 | 2019-10-22 | Mitsubishi Electric Corporation | Cryptographic system, master key update apparatus, and non-transitory computer-readable recording medium storing master key update program |
| US9438412B2 (en) * | 2014-12-23 | 2016-09-06 | Palo Alto Research Center Incorporated | Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings |
| US10965459B2 (en) | 2015-03-13 | 2021-03-30 | Fornetix Llc | Server-client key escrow for applied key management system and process |
| JP6305638B2 (ja) | 2015-04-07 | 2018-04-04 | 三菱電機株式会社 | 暗号システム及び鍵生成装置 |
| CN105635135B (zh) * | 2015-12-28 | 2019-01-25 | 北京科技大学 | 一种基于属性集及关系谓词的加密系统及访问控制方法 |
| US10931653B2 (en) * | 2016-02-26 | 2021-02-23 | Fornetix Llc | System and method for hierarchy manipulation in an encryption key management system |
| CN106533697B (zh) * | 2016-12-06 | 2019-11-08 | 上海交通大学 | 随机数生成与提取方法及其在身份认证上的应用 |
| US10205713B2 (en) * | 2017-04-05 | 2019-02-12 | Fujitsu Limited | Private and mutually authenticated key exchange |
| CA3068145A1 (en) | 2017-07-18 | 2019-01-24 | Legic Identsystems Ag | Method and devices for communicating securely between devices |
| JP6456451B1 (ja) | 2017-09-25 | 2019-01-23 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 通信装置、通信方法、及びプログラム |
| US12362908B2 (en) | 2020-01-20 | 2025-07-15 | Nokia Technologies Oy | Data privacy protection based polar coding |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2744309B1 (fr) * | 1996-01-26 | 1998-03-06 | Bull Cp8 | Procede de communicatin cryptographique asymetrique, et objet portatif associe |
| CN100588131C (zh) * | 2003-02-12 | 2010-02-03 | 松下电器产业株式会社 | 发送装置及无线通信方法 |
| US20070223686A1 (en) * | 2004-09-16 | 2007-09-27 | Shidong Li | Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping |
| US8190553B2 (en) * | 2007-12-20 | 2012-05-29 | Routt Thomas J | Methods and systems for quantum search, computation and memory |
| US8401179B2 (en) | 2008-01-18 | 2013-03-19 | Mitsubishi Electric Corporation | Encryption parameter setting apparatus, key generation apparatus, cryptographic system, program, encryption parameter setting method, and key generation method |
| EP2423903B1 (en) * | 2009-04-24 | 2014-07-16 | Nippon Telegraph And Telephone Corporation | Encryption apparatus, deccryption apparatus, encryption method, decryption method, security method, program, and recording medium |
-
2009
- 2009-11-20 JP JP2009264576A patent/JP5349261B2/ja active Active
-
2010
- 2010-04-14 CN CN201080017994.8A patent/CN102415047B/zh active Active
- 2010-04-14 EP EP10766983.0A patent/EP2424154B1/en active Active
- 2010-04-14 ES ES10766983T patent/ES2873230T3/es active Active
- 2010-04-14 KR KR1020117027936A patent/KR101359200B1/ko not_active Expired - Fee Related
- 2010-04-14 WO PCT/JP2010/056639 patent/WO2010122926A1/ja not_active Ceased
- 2010-04-14 US US13/266,002 patent/US8559638B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| KR101359200B1 (ko) | 2014-02-05 |
| KR20120068762A (ko) | 2012-06-27 |
| US8559638B2 (en) | 2013-10-15 |
| EP2424154B1 (en) | 2021-04-07 |
| US20120045056A1 (en) | 2012-02-23 |
| EP2424154A1 (en) | 2012-02-29 |
| JP2010273317A (ja) | 2010-12-02 |
| WO2010122926A1 (ja) | 2010-10-28 |
| CN102415047B (zh) | 2015-12-09 |
| JP5349261B2 (ja) | 2013-11-20 |
| CN102415047A (zh) | 2012-04-11 |
| EP2424154A4 (en) | 2017-07-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2873230T3 (es) | Sistema de procesamiento de encriptado | |
| Zhang et al. | Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability | |
| ES2693146T3 (es) | Sistema de procesamiento criptográfico, dispositivo de generación de claves, dispositivo de cifrado, dispositivo de descifrado, sistema de procesamiento de firmas, dispositivo de firma y dispositivo de verificación | |
| Baek et al. | New constructions of fuzzy identity-based encryption | |
| ES2627124T3 (es) | Sistema de procesamiento de código, dispositivo de generación de claves, dispositivo codificador, dispositivo descodificador, procedimiento de procesamiento de código y programa de procesamiento de código | |
| Zhandry | How to avoid obfuscation using witness PRFs | |
| ES2955589T3 (es) | Sistema de procesamiento criptográfico, dispositivo de generación de clave, dispositivo de delegación de clave, dispositivo de cifrado, dispositivo de descifrado, procedimiento de procesamiento criptográfico y programa de procesamiento criptográfico | |
| KR101606317B1 (ko) | 암호 시스템, 암호 방법, 암호 프로그램을 기록한 컴퓨터 판독가능한 기록 매체 및 복호 장치 | |
| JPWO2010123116A1 (ja) | 情報生成装置、方法、プログラム及びその記録媒体 | |
| Gu et al. | New public key cryptosystems based on non‐Abelian factorization problems | |
| ES2365887A1 (es) | Metodo de verificacion de procesos de descifrado. | |
| Miyaji et al. | A scalable multiparty private set intersection | |
| KR20230141845A (ko) | 임계값 키 교환 | |
| Liu et al. | Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test | |
| Matsuda et al. | CCA proxy re-encryption without bilinear maps in the standard model | |
| Wang et al. | A new proxy re-encryption scheme for protecting critical information systems | |
| Datta et al. | Fully secure online/offline predicate and attribute-based encryption | |
| Qin et al. | Simultaneous authentication and secrecy in identity-based data upload to cloud | |
| Watanabe et al. | Identity-based hierarchical key-insulated encryption without random oracles | |
| Park et al. | An efficient IBE scheme with tight security reduction in the random oracle model | |
| Zhang et al. | Leakage-resilient attribute based encryption in prime-order groups via predicate encodings | |
| Tian | A new strong multiple designated verifiers signature | |
| Jia et al. | IBE with tight security against selective opening and chosen-ciphertext attacks | |
| Siddharth et al. | A homomorphic encryption scheme over integers based on Carmichael's theorem | |
| Isshiki et al. | Attacks to the proxy re-encryption schemes from IWSEC2011 |