IN2014CN04197A - - Google Patents
Info
- Publication number
- IN2014CN04197A IN2014CN04197A IN4197CHN2014A IN2014CN04197A IN 2014CN04197 A IN2014CN04197 A IN 2014CN04197A IN 4197CHN2014 A IN4197CHN2014 A IN 4197CHN2014A IN 2014CN04197 A IN2014CN04197 A IN 2014CN04197A
- Authority
- IN
- India
- Prior art keywords
- encrypted data
- secret key
- key
- encryption
- administration device
- Prior art date
Links
- 238000013500 data storage Methods 0.000 abstract 2
- 238000007620 mathematical function Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2011/079519 WO2013094018A1 (ja) | 2011-12-20 | 2011-12-20 | 暗号化データ管理装置、暗号化データ管理方法及び暗号化データ管理プログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014CN04197A true IN2014CN04197A (enExample) | 2015-07-17 |
Family
ID=48667946
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN4197CHN2014 IN2014CN04197A (enExample) | 2011-12-20 | 2011-12-20 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9237013B2 (enExample) |
| EP (1) | EP2797254A4 (enExample) |
| JP (1) | JP5668191B2 (enExample) |
| CN (1) | CN104012028B (enExample) |
| IN (1) | IN2014CN04197A (enExample) |
| WO (1) | WO2013094018A1 (enExample) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103023944B (zh) * | 2011-09-27 | 2015-11-25 | 腾讯科技(深圳)有限公司 | 一种sns网络中推送关联用户的方法及系统 |
| EP3001346B1 (en) * | 2013-07-18 | 2018-04-04 | Nippon Telegraph and Telephone Corporation | Directory service device, client device, key cloud system, method thereof, and program |
| EP3057262B1 (en) | 2013-10-09 | 2021-07-28 | Mitsubishi Electric Corporation | Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program |
| WO2015087407A1 (ja) * | 2013-12-11 | 2015-06-18 | 三菱電機株式会社 | ファイル保管システム、ファイル保管装置及びユーザ端末 |
| WO2015107641A1 (ja) * | 2014-01-16 | 2015-07-23 | 三菱電機株式会社 | 暗号システム、鍵生成装置、再暗号化装置及びユーザ端末 |
| JP6283119B2 (ja) * | 2014-10-07 | 2018-02-21 | 日本電信電話株式会社 | 秘密計算システム、中継装置、それらの方法、プログラム、および記録媒体 |
| JP6272546B2 (ja) * | 2015-02-20 | 2018-01-31 | 三菱電機株式会社 | データ保管装置及びデータ処理方法及びデータ処理プログラム |
| CN107251480B (zh) * | 2015-02-20 | 2018-07-10 | 三菱电机株式会社 | 数据保管装置、数据更新系统和数据处理方法 |
| US9811680B2 (en) | 2015-06-04 | 2017-11-07 | Microsoft Technology Licensing, Llc | Secure storage and sharing of data by hybrid encryption using predefined schema |
| EP3483866B1 (en) * | 2016-07-06 | 2020-12-23 | Nippon Telegraph and Telephone Corporation | Secure computation system, secure computation device, secure computation method, and program |
| JP6575547B2 (ja) | 2017-03-17 | 2019-09-18 | 富士ゼロックス株式会社 | ドキュメント管理システム |
| US10666422B2 (en) * | 2017-12-29 | 2020-05-26 | Shenzhen China Star Optoelectronics Technology Co., Ltd. | Data processing method |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1118184B1 (en) | 1999-08-09 | 2005-12-14 | Koninklijke Philips Electronics N.V. | Updating a revocation list to foil an adversary |
| JP3833635B2 (ja) | 2003-07-30 | 2006-10-18 | 三井住友海上火災保険株式会社 | 情報管理システム、キー配信サーバ、情報管理方法、及びプログラム |
| US8515060B2 (en) * | 2009-04-24 | 2013-08-20 | Nippon Telegraph And Telephone Corporation | Encryption apparatus, decryption apparatus, encryption method, decryption method, security method, program, and recording medium |
| EP2464051B1 (en) * | 2009-08-03 | 2015-05-27 | Nippon Telegraph And Telephone Corporation | Function cipher application system |
| CN103038805B (zh) * | 2009-11-20 | 2015-07-29 | 三菱电机株式会社 | 密码处理系统、密钥生成装置、密钥转让装置、加密装置、解密装置、密码处理方法以及密码处理程序 |
| JP5269209B2 (ja) * | 2010-01-13 | 2013-08-21 | 三菱電機株式会社 | 秘匿検索システム及び公開パラメータ生成装置及び暗号化装置及びユーザ秘密鍵生成装置及びクエリ発行装置及び検索装置及びコンピュータプログラム及び秘匿検索方法及び公開パラメータ生成方法及び暗号化方法及びユーザ秘密鍵生成方法及びクエリ発行方法及び検索方法 |
| US8634563B2 (en) * | 2010-12-17 | 2014-01-21 | Microsoft Corporation | Attribute based encryption using lattices |
| US8516244B2 (en) * | 2011-06-10 | 2013-08-20 | Zeutro Llc | System, apparatus and method for decentralizing attribute-based encryption information |
-
2011
- 2011-12-20 IN IN4197CHN2014 patent/IN2014CN04197A/en unknown
- 2011-12-20 JP JP2013549994A patent/JP5668191B2/ja not_active Expired - Fee Related
- 2011-12-20 WO PCT/JP2011/079519 patent/WO2013094018A1/ja not_active Ceased
- 2011-12-20 US US14/355,043 patent/US9237013B2/en active Active
- 2011-12-20 CN CN201180075670.4A patent/CN104012028B/zh not_active Expired - Fee Related
- 2011-12-20 EP EP11878276.2A patent/EP2797254A4/en not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| EP2797254A1 (en) | 2014-10-29 |
| CN104012028B (zh) | 2016-10-26 |
| JP5668191B2 (ja) | 2015-02-12 |
| JPWO2013094018A1 (ja) | 2015-04-27 |
| EP2797254A4 (en) | 2015-10-28 |
| WO2013094018A1 (ja) | 2013-06-27 |
| US9237013B2 (en) | 2016-01-12 |
| CN104012028A (zh) | 2014-08-27 |
| US20140310521A1 (en) | 2014-10-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014CN04197A (enExample) | ||
| AU2018256568A1 (en) | Systems and methods for software based encryption | |
| GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
| EP4236203A3 (en) | Data security using request-supplied keys | |
| PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
| IL261137A (en) | System and method for secure communication | |
| GB2498039B (en) | Password recovery service | |
| BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
| BR112016018486A8 (pt) | sistema e método para proteger chaves de conteúdo entregues em arquivos de manifesto | |
| WO2013068843A3 (en) | Multi-key cryptography for encrypting file system acceleration | |
| WO2015030903A3 (en) | Image based key derivation function | |
| EP2658165A3 (en) | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |
| GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
| JP2014519099A5 (enExample) | ||
| GB201315863D0 (en) | Systems and methods for secure file portability between mobile applications on a mobile device | |
| EP2544400A3 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
| WO2017034642A3 (en) | Optimizable full-path encryption in a virtualization environment | |
| TW200701725A (en) | Automatic data encryption and access control based on bluetooth device proximity | |
| EP2433246A4 (en) | BIOMETRIC IDENTIFICATION PROCEDURES | |
| MX2013004764A (es) | Metodos para procesar metadatos privados. | |
| CN109218291B (zh) | 一种基于区块链的数据流转方法、系统及相关设备 | |
| WO2013182103A3 (zh) | 加密、解密终端及应用于终端的加密和解密方法 | |
| WO2010011921A3 (en) | Http authentication and authorization management | |
| GB201108816D0 (en) | A secure computer network | |
| GB2529342A (en) | Method and system for exchanging encrypted messages between computing devices in a communication network |