JP6173455B2 - 属性ベース暗号化 - Google Patents
属性ベース暗号化 Download PDFInfo
- Publication number
- JP6173455B2 JP6173455B2 JP2015527038A JP2015527038A JP6173455B2 JP 6173455 B2 JP6173455 B2 JP 6173455B2 JP 2015527038 A JP2015527038 A JP 2015527038A JP 2015527038 A JP2015527038 A JP 2015527038A JP 6173455 B2 JP6173455 B2 JP 6173455B2
- Authority
- JP
- Japan
- Prior art keywords
- secret
- encrypted
- policy
- message
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261684216P | 2012-08-17 | 2012-08-17 | |
| US61/684,216 | 2012-08-17 | ||
| PCT/IB2013/055995 WO2014027263A2 (en) | 2012-08-17 | 2013-07-22 | Attribute-based encryption |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2015524945A JP2015524945A (ja) | 2015-08-27 |
| JP2015524945A5 JP2015524945A5 (enExample) | 2016-09-08 |
| JP6173455B2 true JP6173455B2 (ja) | 2017-08-02 |
Family
ID=49354712
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015527038A Expired - Fee Related JP6173455B2 (ja) | 2012-08-17 | 2013-07-22 | 属性ベース暗号化 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9800555B2 (enExample) |
| EP (1) | EP2885893B1 (enExample) |
| JP (1) | JP6173455B2 (enExample) |
| CN (1) | CN104620535A (enExample) |
| BR (1) | BR112015003216A2 (enExample) |
| WO (1) | WO2014027263A2 (enExample) |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10764037B2 (en) * | 2014-12-23 | 2020-09-01 | Nokia Technologies Oy | Method and apparatus for duplicated data management in cloud computing |
| EP3248354A4 (en) * | 2015-01-19 | 2018-08-15 | Nokia Technologies Oy | Method and apparatus for heterogeneous data storage management in cloud computing |
| JP6721609B2 (ja) * | 2015-05-22 | 2020-07-15 | ベルンドルフ バント ゲゼルシャフト ミット ベシュレンクテル ハフツング | 少なくとも1つの溶接継目を有するエンドレスベルトを形成する方法 |
| SG10201508390PA (en) * | 2015-10-09 | 2017-05-30 | Singapore Man University | Data security system and method for operation thereof |
| EP3420518B1 (en) | 2016-02-23 | 2023-08-23 | nChain Licensing AG | Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain |
| KR20180115766A (ko) | 2016-02-23 | 2018-10-23 | 엔체인 홀딩스 리미티드 | 스마트 계약에 기초한 자동화 페이롤 방법 및 시스템을 초래하는, 블록체인 상에서 페이롤에 연관된 암호화폐를 효율적으로 전달하는 방법 및 시스템 |
| EP3364598B1 (en) | 2016-02-23 | 2020-10-14 | Nchain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| JP7114469B2 (ja) | 2016-02-23 | 2022-08-08 | エヌチェーン ホールディングス リミテッド | セキュアな投票及び配布に利用されるブロックチェーンが実装された計数システム及び方法 |
| CA3013185A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | A method and system for securing computer software using a distributed hash table and a blockchain |
| AU2017222421B2 (en) | 2016-02-23 | 2022-09-01 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
| JP2019513312A (ja) | 2016-02-23 | 2019-05-23 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーン上の交換を実施するためのトークン化方法及びシステム |
| JP6511201B1 (ja) | 2016-02-23 | 2019-05-15 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンにより施行される洗練された取引のためのレジストリ及び自動管理方法 |
| SG11201806713SA (en) | 2016-02-23 | 2018-09-27 | Nchain Holdings Ltd | Blockchain-implemented method for control and distribution of digital content |
| AU2017223127B2 (en) | 2016-02-23 | 2023-01-05 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
| SG11201805542TA (en) | 2016-02-23 | 2018-09-27 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| CN105915567A (zh) * | 2016-07-06 | 2016-08-31 | 杨炳 | 一种安全移动电子健康记录访问控制系统 |
| US10659222B2 (en) | 2017-04-28 | 2020-05-19 | IronCore Labs, Inc. | Orthogonal access control for groups via multi-hop transform encryption |
| CN108390876B (zh) * | 2018-02-13 | 2021-12-14 | 西安电子科技大学 | 支持撤销外包可验证多授权中心访问控制方法、云服务器 |
| WO2019214942A1 (en) * | 2018-05-10 | 2019-11-14 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
| CN108880796B (zh) * | 2018-06-25 | 2021-04-27 | 电子科技大学 | 一种针对服务器高效的基于属性加密算法的外包解密方法 |
| WO2020242614A1 (en) | 2019-05-30 | 2020-12-03 | Kim Bong Mann | Quantum safe cryptography and advanced encryption and key exchange (aeke) method for symmetric key encryption/exchange |
| US11115395B2 (en) | 2019-07-23 | 2021-09-07 | Harris Global Communications, Inc. | Cross-domain information transfer system and associated methods |
| US11870917B2 (en) | 2020-03-26 | 2024-01-09 | Issam ANDONI | Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations |
| US12489627B2 (en) * | 2021-04-26 | 2025-12-02 | Ntt Research, Inc. | Decentralized multi-authority attribute-based encryption with fully adaptive security |
| US20230179634A1 (en) * | 2021-12-02 | 2023-06-08 | International Business Machines Corporation | Secure policy distribution in a cloud environment |
| US20240275819A1 (en) * | 2023-02-15 | 2024-08-15 | International Business Machines Corporation | Secure system for hiding registration rules for dynamic client registration |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7426745B2 (en) * | 2003-04-24 | 2008-09-16 | International Business Machines Corporation | Methods and systems for transparent data encryption and decryption |
| CN101807991B (zh) * | 2009-02-18 | 2014-03-12 | 上海交通大学 | 密文政策属性基加密系统和方法 |
| WO2011045723A1 (en) * | 2009-10-15 | 2011-04-21 | Koninklijke Philips Electronics N.V. | Ciphertext-policy attribute-based encryption and re-encryption |
| JP5325755B2 (ja) * | 2009-12-11 | 2013-10-23 | 株式会社エヌ・ティ・ティ・データ | 暗号文復号権限委譲システム、暗号文復号権限委譲方法、暗号文変換装置、復号権限所持者用装置および暗号文変換プログラム |
| EP2609712A1 (en) * | 2010-08-24 | 2013-07-03 | Koninklijke Philips Electronics N.V. | Attribute-based digital signatures |
| US9049023B2 (en) * | 2011-05-24 | 2015-06-02 | Zeutro Llc | Outsourcing the decryption of functional encryption ciphertexts |
-
2013
- 2013-07-22 US US14/420,114 patent/US9800555B2/en not_active Expired - Fee Related
- 2013-07-22 WO PCT/IB2013/055995 patent/WO2014027263A2/en not_active Ceased
- 2013-07-22 EP EP13776561.6A patent/EP2885893B1/en not_active Not-in-force
- 2013-07-22 JP JP2015527038A patent/JP6173455B2/ja not_active Expired - Fee Related
- 2013-07-22 CN CN201380044170.3A patent/CN104620535A/zh active Pending
- 2013-07-22 BR BR112015003216A patent/BR112015003216A2/pt not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| US20150222605A1 (en) | 2015-08-06 |
| CN104620535A (zh) | 2015-05-13 |
| EP2885893A2 (en) | 2015-06-24 |
| WO2014027263A3 (en) | 2014-04-10 |
| WO2014027263A2 (en) | 2014-02-20 |
| JP2015524945A (ja) | 2015-08-27 |
| EP2885893B1 (en) | 2018-09-26 |
| BR112015003216A2 (pt) | 2017-07-04 |
| US9800555B2 (en) | 2017-10-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6173455B2 (ja) | 属性ベース暗号化 | |
| US10785019B2 (en) | Data transmission method and apparatus | |
| Zhu et al. | Towards temporal access control in cloud computing | |
| CN103957109B (zh) | 一种云数据隐私保护安全重加密方法 | |
| US9426131B2 (en) | Server apparatus and program to re-encrypt ciphertext data | |
| JP6363032B2 (ja) | 鍵付替え方向制御システムおよび鍵付替え方向制御方法 | |
| Li et al. | Low complexity multi-authority attribute based encryption scheme for mobile cloud computing | |
| CN111277413B (zh) | 一种适用于代理重加密的密码逆向防火墙方法 | |
| CN104735070B (zh) | 一种通用的异构加密云间的数据共享方法 | |
| JP6115573B2 (ja) | 暗号システム、データ保存システム、それに用いる装置および方法 | |
| JP6194886B2 (ja) | 暗号化統計処理システム、復号システム、鍵生成装置、プロキシ装置、暗号化統計データ生成装置、暗号化統計処理方法、および、暗号化統計処理プログラム | |
| Arfaoui et al. | Context-aware adaptive authentication and authorization in internet of things | |
| Pasupuleti et al. | Lightweight ciphertext-policy attribute-based encryption scheme for data privacy and security in cloud-assisted IoT | |
| JP2019102970A (ja) | データ共有サーバ装置、鍵生成サーバ装置、通信端末、プログラム | |
| He et al. | A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing | |
| Tong et al. | Towards auditable cloud-assisted access of encrypted health data | |
| Liu et al. | Secure data sharing in V2N based on a privacy-preserving identify-based broadcast proxy re-encryption plus scheme | |
| Chen et al. | A limited proxy re-encryption with keyword search for data access control in cloud computing | |
| Sanchol et al. | A mobile cloud-based access control with efficiently outsourced decryption | |
| Mora-Afonso et al. | Strong authentication on smart wireless devices | |
| CN110419195A (zh) | 在iot轻量级终端环境中基于代理重加密的数据管理方法及系统 | |
| Weber | A hybrid attribute-based encryption technique supporting expressive policies and dynamic attributes | |
| CN116961893A (zh) | 一种端到端的安全加密通信管理方法、系统及可存储介质 | |
| Khurshid et al. | A comparison of proxy re-encryption schemes-a survey | |
| Kaaniche et al. | Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IoT applications |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160720 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160720 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20170414 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20170605 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20170704 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6173455 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |