JP2003169048A5 - - Google Patents

Download PDF

Info

Publication number
JP2003169048A5
JP2003169048A5 JP2002089674A JP2002089674A JP2003169048A5 JP 2003169048 A5 JP2003169048 A5 JP 2003169048A5 JP 2002089674 A JP2002089674 A JP 2002089674A JP 2002089674 A JP2002089674 A JP 2002089674A JP 2003169048 A5 JP2003169048 A5 JP 2003169048A5
Authority
JP
Japan
Prior art keywords
terminal
decryption key
decryption
sets
terminals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2002089674A
Other languages
Japanese (ja)
Other versions
JP4199472B2 (en
JP2003169048A (en
Filing date
Publication date
Application filed filed Critical
Priority to JP2002089674A priority Critical patent/JP4199472B2/en
Priority claimed from JP2002089674A external-priority patent/JP4199472B2/en
Publication of JP2003169048A publication Critical patent/JP2003169048A/en
Publication of JP2003169048A5 publication Critical patent/JP2003169048A5/ja
Application granted granted Critical
Publication of JP4199472B2 publication Critical patent/JP4199472B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Claims (5)

3台以上の各端末への配給用データが、特定処理により特定された複数の暗号化鍵それぞれを用いて暗号化されてなる複数の暗号化配給用データを、記録したコンピュータ読み取り可能な記録媒体であって、
前記特定処理は、
前記各端末が、2つ以上の端末を要素に含む集合である端末集合の少なくとも1つには属するように、
更に、同じ1つ以上の端末を各々要素に含む複数の端末集合であって、当該複数の端末集合におけるいずれの一の端末集合も当該複数の端末集合における他の各端末集合の部分集合でないという関係が成立するところの当該複数の端末集合が存在するように、
2つ以上の端末集合を決定する端末集合決定ステップと、
端末毎及び前記端末集合決定ステップにより決定された端末集合毎について各々別個の復号鍵を対応付ける復号鍵対応付けステップと、
前記各端末に対して、前記復号鍵対応付けステップにより当該端末に対応付けられた復号鍵に加えて、当該端末を含む全ての端末集合の各々に対応付けられた復号鍵に基づいて、当該端末に対応付ける復号鍵群を決定する復号鍵群対応付けステップとを含む
ことを特徴とする記録媒体。
A computer-readable recording medium on which a plurality of encrypted distribution data obtained by encrypting distribution data to each of three or more terminals using a plurality of encryption keys specified by a specific process is recorded Because
The specific process is:
Each terminal belongs to at least one of a terminal set that is a set including two or more terminals as elements.
Furthermore, it is a plurality of terminal sets each including the same one or more terminals, and any one terminal set in the plurality of terminal sets is not a subset of each other terminal set in the plurality of terminal sets As there are multiple sets of terminals where the relationship is established,
A terminal set determining step for determining two or more terminal sets;
A decryption key association step for associating a separate decryption key for each terminal and for each terminal set determined by the terminal set determination step;
For each terminal, in addition to the decryption key associated with the terminal in the decryption key association step, the terminal based on the decryption key associated with each of all terminal sets including the terminal And a decryption key group associating step for determining a decryption key group to be associated with the recording medium.
前記復号鍵群対応付けステップは、前記各端末に対して、前記復号鍵対応付けステップにより当該端末に対応付けられた復号鍵に加えて、当該端末を含む全ての端末集合の各々に対応付けられた復号鍵の全てを、当該端末に対応付けるIn the decryption key group association step, each terminal is associated with each terminal set including the terminal in addition to the decryption key associated with the terminal by the decryption key association step. Associate all decryption keys with the terminal
ことを特徴とする請求項1記載の記録媒体。The recording medium according to claim 1.
前記特定処理は、更に、
1つ以上の端末を無効化端末として特定する無効化端末特定ステップと、
前記復号鍵群対応付けステップにより端末に対応付けられた全ての復号鍵のうち無効化端末に対応付けられている復号鍵以外の復号鍵を有効復号鍵と定めた場合において、
選定済みの有効復号鍵が対応付けられていない最も多くの端末に対応付けられている有効復号鍵を選定するという手順を、選定済みの有効復号鍵が対応付けられていない端末が存在しなくなるまで繰り返し、
結果的に選定済みとなる全ての有効復号鍵それぞれに呼応する暗号化鍵を特定する暗号化鍵特定ステップとを含む
ことを特徴とする請求項1記載の記録媒体。
The specific processing further includes:
An invalidation terminal identification step for identifying one or more terminals as invalidation terminals;
In the case where a decryption key other than the decryption key associated with the invalidated terminal among all decryption keys associated with the terminal in the decryption key group association step is determined as an effective decryption key,
The procedure of selecting the effective decryption key associated with the largest number of terminals that are not associated with the selected effective decryption key is repeated until there is no terminal that is not associated with the selected effective decryption key. repetition,
The recording medium according to claim 1, further comprising: an encryption key specifying step that specifies an encryption key corresponding to each of all the effective decryption keys that have been selected as a result.
暗号化されたデータを取得して復号するための復号端末であって、
所定鍵割当方法により個別に割当てられた復号鍵群を記憶している復号鍵群記憶手段と、
暗号化されたデータを取得する暗号化データ取得手段と、
前記暗号化データ取得手段により取得されたデータを、前記復号鍵群記憶手段に記憶されている復号鍵を用いて復号する復号手段と、
前記所定鍵割当方法は、
(a) 本端末を含む3台以上の端末を想定した場合において本端末が、2つ以上の端末を要素に含む集合である複数の端末集合に属するように、
更に、本端末を各々要素に含む複数の端末集合であって、当該複数の端末集合におけるいずれの一の端末集合も当該複数の端末集合における他の各端末集合の部分集合でないという関係が成立するところの当該複数の端末集合が存在するように、
2つ以上の端末集合を決定し、
(b) 本端末に対応して及び決定した端末集合毎に対応して各々別個の復号鍵を定め、
(c) 本端末に対して、本端末に対応して定めた復号鍵、及び本端末を含む全ての端末集合の各々に対応して定めた復号鍵に基づいて、復号鍵群を割り当てる方法である
ことを特徴とする復号端末。
A decryption terminal for obtaining and decrypting encrypted data,
Decryption key group storage means for storing decryption key groups individually assigned by a predetermined key assignment method;
Encrypted data acquisition means for acquiring encrypted data;
Decryption means for decrypting the data acquired by the encrypted data acquisition means using a decryption key stored in the decryption key group storage means;
The predetermined key allocation method is:
(a) When three or more terminals including this terminal are assumed, this terminal belongs to a plurality of terminal sets that are sets including two or more terminals as elements.
Further, there is a plurality of terminal sets each including this terminal as an element, and the relationship that any one terminal set in the plurality of terminal sets is not a subset of each other terminal set in the plurality of terminal sets is established. However, as there are multiple such terminal sets,
Determine two or more terminal sets,
(b) Define a separate decryption key corresponding to this terminal and for each determined terminal set,
(c) A method of assigning a decryption key group to the terminal based on a decryption key defined for the terminal and a decryption key defined for each of all terminal sets including the terminal. A decoding terminal characterized by being.
前記所定鍵割当方法は、The predetermined key allocation method is:
本端末に対して、本端末に対応して定めた復号鍵、及び本端末を含む全ての端末集合の各々に対応して定めた復号鍵を全て割り当てる方法であるIn this method, all the decryption keys defined in correspondence with the terminal and the decryption keys defined in correspondence with all terminal sets including the terminal are assigned to the terminal.
ことを特徴とする請求項4記載の復号端末。The decoding terminal according to claim 4.
JP2002089674A 2001-03-29 2002-03-27 Data protection system that protects data by applying encryption Expired - Lifetime JP4199472B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2002089674A JP4199472B2 (en) 2001-03-29 2002-03-27 Data protection system that protects data by applying encryption

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2001-95730 2001-03-29
JP2001095730 2001-03-29
JP2001285608 2001-09-19
JP2001-285608 2001-09-19
JP2002089674A JP4199472B2 (en) 2001-03-29 2002-03-27 Data protection system that protects data by applying encryption

Related Child Applications (2)

Application Number Title Priority Date Filing Date
JP2005107795A Division JP4170304B2 (en) 2001-03-29 2005-04-04 Data protection system that protects data by applying encryption
JP2008169187A Division JP4870727B2 (en) 2001-03-29 2008-06-27 Data protection system that protects data by applying encryption

Publications (3)

Publication Number Publication Date
JP2003169048A JP2003169048A (en) 2003-06-13
JP2003169048A5 true JP2003169048A5 (en) 2005-09-29
JP4199472B2 JP4199472B2 (en) 2008-12-17

Family

ID=27346396

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2002089674A Expired - Lifetime JP4199472B2 (en) 2001-03-29 2002-03-27 Data protection system that protects data by applying encryption

Country Status (1)

Country Link
JP (1) JP4199472B2 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7340603B2 (en) * 2002-01-30 2008-03-04 Sony Corporation Efficient revocation of receivers
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system
WO2004064313A1 (en) 2003-01-15 2004-07-29 Matsushita Electric Industrial Co., Ltd. Content protection system, key data generation apparatus, and terminal appparatus
CN1795639A (en) 2003-05-22 2006-06-28 松下电器产业株式会社 Copyright protection system, power residue calculation device, and method
JP4161859B2 (en) 2003-09-11 2008-10-08 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
WO2005060149A1 (en) 2003-11-28 2005-06-30 Matsushita Electric Industrial Co.,Ltd. Management device, terminal device, and copyright protection system
JP2005333242A (en) * 2004-05-18 2005-12-02 Pioneer Electronic Corp Key management system and reproducing apparatus
KR101092543B1 (en) * 2004-11-12 2011-12-14 삼성전자주식회사 Method of managing a key of user for broadcast encryption
KR100717005B1 (en) * 2005-04-06 2007-05-10 삼성전자주식회사 Method and apparatus for determining revocation key, and method and apparatus for decrypting thereby
KR100803596B1 (en) * 2005-11-25 2008-02-19 삼성전자주식회사 Method and apparatus for decryption using external device or service on revocation mechanism, method and apparatus for supporting decryption therefor
JP5051429B2 (en) * 2006-11-14 2012-10-17 日本電気株式会社 Encryption key management method, system thereof, and program thereof
CA2714291A1 (en) * 2008-01-18 2009-07-23 Koninklijke Philips Electronics N.V. Wireless communication system and method for automatic node and key revocation

Similar Documents

Publication Publication Date Title
Provos Defending against statistical steganalysis
CN103532707B (en) For the system and method for the programmable processing step for determining to apply when protecting data
CN102867153B (en) Methods and devices for encrypting and decrypting video file and mobile terminal
CN1199389C (en) Method, device and medium for transfering and recording content information and decipher method and device
CN1133935C (en) Security system for protecting information stored in portable storage media
CA2419972A1 (en) Data protection system that protects data by encrypting the data
CN111310222B (en) File encryption method
JP2003169048A5 (en)
CN103906039B (en) A kind of method and apparatus for preventing phone number from revealing
JP2005505069A5 (en)
JP2008513915A5 (en)
CN109635576B (en) Method and system for hiding data in image
CN103778590A (en) Method and device for utilizing digital image to store and transmit information
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
JP6352441B2 (en) Anonymizing streaming data
CN106685640A (en) Generating method of electronic evidence fixed information and electronic evidence fixed server
CN111404679A (en) Big data oriented security authentication ciphertext retrieval method
CN110704853A (en) Desensitization method and system for sensitive data based on desensitization strategy
CN111414635A (en) File encryption and decryption method, device, equipment and storage medium
Yuan et al. Towards privacy-preserving and practical image-centric social discovery
CN110032894B (en) Database log recording method and system and database log detection method
RU2001128432A (en) Device for processing data and method for processing data
CN100593788C (en) A method for realizing software protection based on data file encryption
JP4199472B2 (en) Data protection system that protects data by applying encryption
CN115470506B (en) Homomorphic mapping-based secure file system implementation method