JP2014533445A5 - - Google Patents

Download PDF

Info

Publication number
JP2014533445A5
JP2014533445A5 JP2014518465A JP2014518465A JP2014533445A5 JP 2014533445 A5 JP2014533445 A5 JP 2014533445A5 JP 2014518465 A JP2014518465 A JP 2014518465A JP 2014518465 A JP2014518465 A JP 2014518465A JP 2014533445 A5 JP2014533445 A5 JP 2014533445A5
Authority
JP
Japan
Prior art keywords
ciphertext
key
keys
equation
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2014518465A
Other languages
English (en)
Japanese (ja)
Other versions
JP2014533445A (ja
Filing date
Publication date
Application filed filed Critical
Priority claimed from PCT/JP2011/005830 external-priority patent/WO2013057757A1/en
Publication of JP2014533445A publication Critical patent/JP2014533445A/ja
Publication of JP2014533445A5 publication Critical patent/JP2014533445A5/ja
Pending legal-status Critical Current

Links

JP2014518465A 2011-10-18 2011-10-18 人に依存しない鍵管理のシステム Pending JP2014533445A (ja)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/005830 WO2013057757A1 (en) 2011-10-18 2011-10-18 Management-free key system

Publications (2)

Publication Number Publication Date
JP2014533445A JP2014533445A (ja) 2014-12-11
JP2014533445A5 true JP2014533445A5 (enrdf_load_stackoverflow) 2015-03-19

Family

ID=48140438

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2014518465A Pending JP2014533445A (ja) 2011-10-18 2011-10-18 人に依存しない鍵管理のシステム

Country Status (2)

Country Link
JP (1) JP2014533445A (enrdf_load_stackoverflow)
WO (1) WO2013057757A1 (enrdf_load_stackoverflow)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6075017B2 (ja) * 2012-11-09 2017-02-08 富士通株式会社 情報分析システム及び情報分析方法
US9407440B2 (en) * 2013-06-20 2016-08-02 Amazon Technologies, Inc. Multiple authority data security and access
IL272516A (en) 2020-02-06 2021-08-31 Google Llc Prevention of data manipulation using multiple aggregation servers
WO2021215031A1 (ja) * 2020-04-24 2021-10-28 株式会社L&I 情報処理システムおよびプログラム
JP6938065B1 (ja) 2020-04-24 2021-09-22 株式会社L&I 情報処理システムおよびプログラム

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07225550A (ja) * 1994-02-10 1995-08-22 Hitachi Software Eng Co Ltd データ多段階参照方法およびデータ多段階参照システム
US6266704B1 (en) * 1997-05-30 2001-07-24 The United States Of America As Represented By The Secretary Of The Navy Onion routing network for securely moving data through communication networks

Similar Documents

Publication Publication Date Title
JP2014533445A5 (enrdf_load_stackoverflow)
Guo et al. A variable threshold-value authentication architecture for wireless mesh networks
JP2013512614A5 (enrdf_load_stackoverflow)
WO2012139919A3 (en) Method and apparatus for public-key cryptography based on error correcting codes
JP2017200196A5 (enrdf_load_stackoverflow)
TW201613416A (en) Node-to-multinode communication
JP2015090708A5 (enrdf_load_stackoverflow)
WO2011045714A3 (en) A method for operating a node in a wireless sensor network
CN103581175A (zh) 一种安全的数据聚合方法
JP2016500944A5 (enrdf_load_stackoverflow)
Liu et al. Dynamical behavior of stochastic multigroup S-DI-A epidemic models for the transmission of HIV
NakaharaJr New impossible differential and known-key distinguishers for the 3D cipher
JP2012090236A5 (enrdf_load_stackoverflow)
Jia et al. Global stability and optimal control of epidemic spreading on multiplex networks with nonlinear mutual interaction
Roman'kov Essays in algebra and cryptology: Algebraic cryptanalysis
JP2012090036A5 (enrdf_load_stackoverflow)
Zheng et al. Piecewise constructions of inverses of some permutation polynomials
Dutta et al. Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks
WO2017103226A8 (en) Improved system for key sharing
Hou Permutation polynomials of of the form aX+ X r (q− 1)+ 1
Zhang Length-doubling ciphers and tweakable ciphers
JP2015230561A5 (enrdf_load_stackoverflow)
Schaeffer et al. Flexible and robust key rollover in DNSSEC
JP2005027358A5 (enrdf_load_stackoverflow)
Domosi A novel stream cipher based on deterministic finite automaton