IN2014CN04110A - - Google Patents
Info
- Publication number
- IN2014CN04110A IN2014CN04110A IN4110CHN2014A IN2014CN04110A IN 2014CN04110 A IN2014CN04110 A IN 2014CN04110A IN 4110CHN2014 A IN4110CHN2014 A IN 4110CHN2014A IN 2014CN04110 A IN2014CN04110 A IN 2014CN04110A
- Authority
- IN
- India
- Prior art keywords
- vector
- basis
- key
- private key
- encrypted
- Prior art date
Links
- 239000011159 matrix material Substances 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2011252244A JP5677273B2 (ja) | 2011-11-18 | 2011-11-18 | 暗号処理システム、暗号処理方法、暗号処理プログラム及び鍵生成装置 |
| PCT/JP2012/079210 WO2013073488A1 (ja) | 2011-11-18 | 2012-11-12 | 暗号処理システム、暗号処理方法、暗号処理プログラム及び鍵生成装置 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014CN04110A true IN2014CN04110A (enExample) | 2015-07-10 |
Family
ID=48429548
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN4110CHN2014 IN2014CN04110A (enExample) | 2011-11-18 | 2012-11-12 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US9203622B2 (enExample) |
| EP (1) | EP2782087B1 (enExample) |
| JP (1) | JP5677273B2 (enExample) |
| KR (1) | KR101581605B1 (enExample) |
| CN (1) | CN103946910B (enExample) |
| ES (1) | ES2613811T3 (enExample) |
| IN (1) | IN2014CN04110A (enExample) |
| WO (1) | WO2013073488A1 (enExample) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5855234B2 (ja) * | 2012-03-27 | 2016-02-09 | 三菱電機株式会社 | デジタル放送受信装置及びデジタル放送受信方法 |
| JP6275536B2 (ja) * | 2014-04-16 | 2018-02-07 | 日本放送協会 | 限定受信システム、ならびに、コンテンツ配信装置、コンテンツ受信装置およびそれらのプログラム |
| DE112014007226B4 (de) * | 2014-12-05 | 2023-09-07 | Mitsubishi Electric Corporation | Entschlüsselungsbedingungs-Hinzufügungsvorrichtung, kryptografisches System und Entschlüsselungsbedingungs-Hinzufügungsprogramm |
| WO2016088251A1 (ja) * | 2014-12-05 | 2016-06-09 | 三菱電機株式会社 | 暗号システム、マスター鍵更新装置及びマスター鍵更新プログラム |
| US9516000B2 (en) * | 2015-03-27 | 2016-12-06 | International Business Machines Corporation | Runtime instantiation of broadcast encryption schemes |
| US10205713B2 (en) * | 2017-04-05 | 2019-02-12 | Fujitsu Limited | Private and mutually authenticated key exchange |
| JP6971917B2 (ja) * | 2018-06-11 | 2021-11-24 | 三菱電機株式会社 | 復号装置、暗号化装置及び暗号システム |
| JP7024666B2 (ja) * | 2018-08-28 | 2022-02-24 | 日本電信電話株式会社 | Idベースハッシュ証明系構成装置、idベース暗号装置及びプログラム |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| WO2025080241A2 (en) * | 2022-09-28 | 2025-04-17 | Cryptography Research, Inc. | Protection of additive fast fourier transforms against side-channel attacks in cryptographic operations |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4354609B2 (ja) * | 1999-07-16 | 2009-10-28 | パナソニック株式会社 | 有限体上の連立方程式求解装置及び逆元演算装置 |
| JP2003152703A (ja) * | 2001-11-12 | 2003-05-23 | Victor Co Of Japan Ltd | 暗号化装置、暗号化方法、復号化装置、復号化方法、暗号化復号化装置及び暗号化復号化方法 |
| KR100604828B1 (ko) * | 2004-01-09 | 2006-07-28 | 삼성전자주식회사 | 펌웨어 암호화 방법 및 해독 방법과 그 처리 장치 |
| US7634085B1 (en) | 2005-03-25 | 2009-12-15 | Voltage Security, Inc. | Identity-based-encryption system with partial attribute matching |
| JP2007299088A (ja) * | 2006-04-28 | 2007-11-15 | Fujitsu Ltd | データ保護システム、方法及びプログラム |
| US20090080658A1 (en) | 2007-07-13 | 2009-03-26 | Brent Waters | Method and apparatus for encrypting data for fine-grained access control |
| JP5164029B2 (ja) * | 2008-04-10 | 2013-03-13 | 日本電気株式会社 | 情報漏洩防止装置、その方法及びそのプログラム |
| CN101329869B (zh) * | 2008-07-31 | 2012-04-11 | 中国电信股份有限公司 | 适用矢量量化的语音编码的声源加密的系统和方法 |
| JP5349261B2 (ja) * | 2009-04-23 | 2013-11-20 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| JP5253567B2 (ja) * | 2009-04-24 | 2013-07-31 | 日本電信電話株式会社 | 暗号システム、暗号通信方法、暗号化装置、鍵生成装置、復号装置、コンテンツサーバ装置、プログラム、記憶媒体 |
| ES2512115T3 (es) * | 2009-04-24 | 2014-10-23 | Nippon Telegraph And Telephone Corporation | Dispositivo de generación de información, método de generación de información, y programa de generación de información y medio de almacenamiento del mismo |
| JP5334873B2 (ja) * | 2010-01-08 | 2013-11-06 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、鍵委譲装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| CN102713995B (zh) * | 2010-01-15 | 2015-06-24 | 三菱电机株式会社 | 隐匿检索系统以及密码处理系统 |
| JP5424974B2 (ja) * | 2010-04-27 | 2014-02-26 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、署名処理システム、署名装置及び検証装置 |
| CN103004130B (zh) * | 2010-07-23 | 2015-03-11 | 日本电信电话株式会社 | 密码系统、密码通信方法、加密装置、密钥生成装置、解密装置、内容服务器装置 |
| US8977579B2 (en) * | 2011-10-11 | 2015-03-10 | Nec Laboratories America, Inc. | Latent factor dependency structure determination |
-
2011
- 2011-11-18 JP JP2011252244A patent/JP5677273B2/ja active Active
-
2012
- 2012-11-12 KR KR1020147016602A patent/KR101581605B1/ko not_active Expired - Fee Related
- 2012-11-12 CN CN201280056310.4A patent/CN103946910B/zh active Active
- 2012-11-12 IN IN4110CHN2014 patent/IN2014CN04110A/en unknown
- 2012-11-12 WO PCT/JP2012/079210 patent/WO2013073488A1/ja not_active Ceased
- 2012-11-12 ES ES12850218.4T patent/ES2613811T3/es active Active
- 2012-11-12 EP EP12850218.4A patent/EP2782087B1/en active Active
- 2012-11-12 US US14/355,699 patent/US9203622B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| JP2013109048A (ja) | 2013-06-06 |
| WO2013073488A1 (ja) | 2013-05-23 |
| ES2613811T3 (es) | 2017-05-26 |
| EP2782087B1 (en) | 2016-12-28 |
| EP2782087A4 (en) | 2015-09-09 |
| EP2782087A1 (en) | 2014-09-24 |
| KR101581605B1 (ko) | 2015-12-30 |
| CN103946910B (zh) | 2017-05-31 |
| JP5677273B2 (ja) | 2015-02-25 |
| CN103946910A (zh) | 2014-07-23 |
| KR20140093281A (ko) | 2014-07-25 |
| US20140298028A1 (en) | 2014-10-02 |
| US9203622B2 (en) | 2015-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014CN04110A (enExample) | ||
| GB2509422A (en) | Decryption and encryption of application data | |
| IN2013MU01234A (enExample) | ||
| EP2882132A4 (en) | SHARED SECRET KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SHARED SECRET KEY GENERATION METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM | |
| MX2016001900A (es) | Criptografia nado utilizando funciones unidireccionales. | |
| AU2018256568A1 (en) | Systems and methods for software based encryption | |
| EP2884690A4 (en) | READY KEY GENERATING DEVICE, RECTIFYING DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM | |
| TR201907002T4 (tr) | Mamul ürünleri fiziksel karakteristiği kullanarak işaretlemek için yöntem ve tertibat. | |
| EP4236203A3 (en) | Data security using request-supplied keys | |
| BR112016018486A8 (pt) | sistema e método para proteger chaves de conteúdo entregues em arquivos de manifesto | |
| WO2016122747A3 (en) | Storage for encrypted data with enhanced security | |
| EP2544400A3 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
| IN2014CN04372A (enExample) | ||
| BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
| IN2014CH00971A (enExample) | ||
| UA122327C2 (uk) | Nado- криптографія з генераторами ключів | |
| NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
| JP2011128609A5 (enExample) | ||
| EP4618603A3 (en) | Encryption method, decryption method, and related apparatus | |
| EA201591431A1 (ru) | Полупроводниковое устройство для обеспечения безопасности, обладающее свойствами для предотвращения обратного проектирования | |
| GB201703301D0 (en) | Password-based generation and management of secret cryptographic keys | |
| JP2014085674A5 (enExample) | ||
| WO2008146546A1 (ja) | 鍵生成装置、暗号化装置及び復号装置 | |
| EP2725567A3 (en) | Method and device for 3d object encryption by application of a pseudo-randomly generated secret function | |
| GB2500557A (en) | Data encryption |