JP2006086568A - 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム - Google Patents
情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム Download PDFInfo
- Publication number
- JP2006086568A JP2006086568A JP2004266477A JP2004266477A JP2006086568A JP 2006086568 A JP2006086568 A JP 2006086568A JP 2004266477 A JP2004266477 A JP 2004266477A JP 2004266477 A JP2004266477 A JP 2004266477A JP 2006086568 A JP2006086568 A JP 2006086568A
- Authority
- JP
- Japan
- Prior art keywords
- node
- label
- subset
- tree
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2004266477A JP2006086568A (ja) | 2004-09-14 | 2004-09-14 | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
| US11/222,638 US7340054B2 (en) | 2004-09-14 | 2005-09-09 | Information processing method, decrypting method, information processing apparatus, and computer program |
| CNA2005101099087A CN1753356A (zh) | 2004-09-14 | 2005-09-14 | 信息处理方法、解密方法、信息处理装置和计算机程序 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2004266477A JP2006086568A (ja) | 2004-09-14 | 2004-09-14 | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2006086568A true JP2006086568A (ja) | 2006-03-30 |
| JP2006086568A5 JP2006086568A5 (enExample) | 2006-12-14 |
Family
ID=36035357
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2004266477A Abandoned JP2006086568A (ja) | 2004-09-14 | 2004-09-14 | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US7340054B2 (enExample) |
| JP (1) | JP2006086568A (enExample) |
| CN (1) | CN1753356A (enExample) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006253822A (ja) * | 2005-03-08 | 2006-09-21 | Toshiba Corp | 復号装置、復号方法、及びプログラム |
| JP2010193226A (ja) * | 2009-02-19 | 2010-09-02 | Mitsubishi Electric Corp | 通信装置及び通信方法及び通信プログラム |
Families Citing this family (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4701381B2 (ja) * | 2005-01-24 | 2011-06-15 | 国立大学法人 奈良先端科学技術大学院大学 | 暗号鍵生成装置、暗号鍵生成方法、暗号化データ配信装置、個別暗号鍵再生成装置、暗号化データ受信装置、暗号化データ配信システム、暗号鍵生成プログラム、および記録媒体 |
| US8156332B2 (en) * | 2007-05-29 | 2012-04-10 | Apple Inc. | Peer-to-peer security authentication protocol |
| WO2010011342A1 (en) * | 2008-07-25 | 2010-01-28 | Brown University | Apparatus, methods, and computer program products providing dynamic provable data possession |
| US8826036B1 (en) * | 2009-10-29 | 2014-09-02 | Amazon Technologies, Inc. | Ebook encryption using variable keys |
| CN102726108B (zh) * | 2010-04-06 | 2014-12-03 | 上海贝尔股份有限公司 | 在平坦反馈模式和分级反馈模式之间切换的方法和设备 |
| US8396896B2 (en) | 2010-11-10 | 2013-03-12 | International Business Machines Corporation | Assigning resources to a binary tree structure |
| JP5676331B2 (ja) * | 2011-03-24 | 2015-02-25 | 株式会社東芝 | ルートノード及びプログラム |
| JP2012248135A (ja) | 2011-05-31 | 2012-12-13 | Sony Corp | 情報処理装置、および情報処理方法、並びにプログラム |
| JP6100922B2 (ja) * | 2013-12-26 | 2017-03-22 | 株式会社東芝 | 通信制御装置、通信制御方法、プログラムおよび通信システム |
| CN104092537B (zh) * | 2014-07-03 | 2017-07-14 | 飞天诚信科技股份有限公司 | 一种实现密钥信息编解码的装置及其工作方法 |
| WO2016067471A1 (ja) * | 2014-10-31 | 2016-05-06 | 株式会社東芝 | 通信制御装置、通信制御方法およびプログラム |
| US20160232553A1 (en) * | 2015-02-05 | 2016-08-11 | Xerox Corporation | Apparatus and method for secure digital coupon verification |
| US9967093B2 (en) * | 2015-03-25 | 2018-05-08 | Intel Corporation | Techniques for securing and controlling access to data |
| US11010664B2 (en) * | 2016-02-05 | 2021-05-18 | Deepmind Technologies Limited | Augmenting neural networks with hierarchical external memory |
| CN108376054B (zh) * | 2018-01-30 | 2020-11-03 | 中国信息通信研究院 | 一种对标识数据进行索引的处理方法及装置 |
| US11934558B2 (en) * | 2018-12-26 | 2024-03-19 | University Of Tsukuba | Distributed data integration device, distributed data integration method, and program |
| US11411938B2 (en) * | 2019-08-19 | 2022-08-09 | Red Hat, Inc. | Proof-of-work key wrapping with integrated key fragments |
| US11316839B2 (en) | 2019-08-19 | 2022-04-26 | Red Hat, Inc. | Proof-of-work key wrapping for temporally restricting data access |
| US11436352B2 (en) | 2019-08-19 | 2022-09-06 | Red Hat, Inc. | Proof-of-work key wrapping for restricting data execution based on device capabilities |
| US11411728B2 (en) | 2019-08-19 | 2022-08-09 | Red Hat, Inc. | Proof-of-work key wrapping with individual key fragments |
| US11424920B2 (en) | 2019-08-19 | 2022-08-23 | Red Hat, Inc. | Proof-of-work key wrapping for cryptographically controlling data access |
| US12470378B2 (en) * | 2020-10-15 | 2025-11-11 | Keycrypt Labs Pty Ltd | Secure cloud storage and retrieval of client-side encrypted files |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3888138B2 (ja) | 2001-11-16 | 2007-02-28 | 東陶機器株式会社 | 超撥水性高輝度透明材およびその製造方法 |
-
2004
- 2004-09-14 JP JP2004266477A patent/JP2006086568A/ja not_active Abandoned
-
2005
- 2005-09-09 US US11/222,638 patent/US7340054B2/en not_active Expired - Fee Related
- 2005-09-14 CN CNA2005101099087A patent/CN1753356A/zh active Pending
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006253822A (ja) * | 2005-03-08 | 2006-09-21 | Toshiba Corp | 復号装置、復号方法、及びプログラム |
| JP2010193226A (ja) * | 2009-02-19 | 2010-09-02 | Mitsubishi Electric Corp | 通信装置及び通信方法及び通信プログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| US20060059179A1 (en) | 2006-03-16 |
| US7340054B2 (en) | 2008-03-04 |
| CN1753356A (zh) | 2006-03-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2006086568A (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP2005286959A (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP2001358707A (ja) | 暗号鍵ブロックを用いた情報処理システムおよび情報処理方法、並びにプログラム提供媒体 | |
| JP4162237B2 (ja) | 複数の復号化装置に対し選択的にメッセージを配信する暗号化通信システム、暗号化装置、復号化装置、暗号化方法、復号化方法、暗号化プログラム、及び復号化プログラム | |
| US20050210014A1 (en) | Information-processing method, decryption method, information-processing apparatus and computer program | |
| Seo et al. | Revocable hierarchical identity-based encryption | |
| Patranabis et al. | Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing | |
| Kim et al. | Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions | |
| KR20090127716A (ko) | 브로드캐스트 암호화에서 디바이스 키를 추적하는 방법 | |
| JP4561074B2 (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| Ling et al. | Server-aided revocable predicate encryption: formalization and lattice-based instantiation | |
| JP2006115464A (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| Acharya et al. | Secure and efficient construction of broadcast encryption with dealership | |
| JP2001358705A (ja) | 暗号鍵ブロックを用いた情報処理システムおよび情報処理方法、並びにプログラム提供媒体 | |
| JP4635459B2 (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP2005191805A (ja) | 暗号文配信方法、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| JP5612494B2 (ja) | 関数暗号を用いた時限暗号システム、時限暗号方法、装置、プログラム | |
| JP2004229128A (ja) | 暗号データ配信システム、および情報処理装置、情報処理方法、並びにコンピュータ・プログラム | |
| Asano | Reducing storage at receivers in SD and LSD broadcast encryption schemes | |
| Ma et al. | Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management | |
| JP2007020025A (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| KR20180113323A (ko) | 와일드 카드를 포함하는 키 발급, 암호화 및 복호화 방법 | |
| JP2005252916A (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP4576824B2 (ja) | 情報処理装置および情報処理方法 | |
| Zheng et al. | Trace-and-Revoke Quadratic Functional Encryption |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20061030 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20061030 |
|
| A762 | Written abandonment of application |
Free format text: JAPANESE INTERMEDIATE CODE: A762 Effective date: 20080825 |