KR20060129934A - 정보 처리 방법, 복호 처리 방법 및 정보 처리 장치와컴퓨터 프로그램 - Google Patents
정보 처리 방법, 복호 처리 방법 및 정보 처리 장치와컴퓨터 프로그램 Download PDFInfo
- Publication number
- KR20060129934A KR20060129934A KR1020057022453A KR20057022453A KR20060129934A KR 20060129934 A KR20060129934 A KR 20060129934A KR 1020057022453 A KR1020057022453 A KR 1020057022453A KR 20057022453 A KR20057022453 A KR 20057022453A KR 20060129934 A KR20060129934 A KR 20060129934A
- Authority
- KR
- South Korea
- Prior art keywords
- label
- subset
- node
- special
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Circuits Of Receivers In General (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JPJP-P-2004-00102039 | 2004-03-31 | ||
| JP2004102039A JP2005286959A (ja) | 2004-03-31 | 2004-03-31 | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| KR20060129934A true KR20060129934A (ko) | 2006-12-18 |
Family
ID=35125436
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020057022453A Withdrawn KR20060129934A (ko) | 2004-03-31 | 2005-02-22 | 정보 처리 방법, 복호 처리 방법 및 정보 처리 장치와컴퓨터 프로그램 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US20070133806A1 (enExample) |
| EP (1) | EP1732260A1 (enExample) |
| JP (1) | JP2005286959A (enExample) |
| KR (1) | KR20060129934A (enExample) |
| CN (1) | CN1774886A (enExample) |
| TW (1) | TW200610344A (enExample) |
| WO (1) | WO2005099167A1 (enExample) |
Families Citing this family (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4599194B2 (ja) * | 2005-03-08 | 2010-12-15 | 株式会社東芝 | 復号装置、復号方法、及びプログラム |
| KR100717005B1 (ko) * | 2005-04-06 | 2007-05-10 | 삼성전자주식회사 | 폐기 키를 결정하는 방법 및 장치와 이것을 이용하여복호화하는 방법 및 장치 |
| DE102005033285C5 (de) | 2005-07-15 | 2019-11-07 | Institut für Rundfunktechnik GmbH | Consumer-Electronic-Gerät |
| DE102005033836B4 (de) * | 2005-07-20 | 2009-11-19 | Institut für Rundfunktechnik GmbH | Verfahren zum Weiterleiten von Nutzungsberechtigungsinformationen |
| US8042151B2 (en) * | 2005-12-20 | 2011-10-18 | Microsoft Corporation | Application context based access control |
| US7693948B2 (en) * | 2006-05-15 | 2010-04-06 | Sap Ag | Email traffic integration into a knowledge management system |
| JP2009044516A (ja) * | 2007-08-09 | 2009-02-26 | Kddi Corp | ブロードキャスト暗号の生成方法およびプログラム |
| US9729316B2 (en) * | 2008-02-27 | 2017-08-08 | International Business Machines Corporation | Unified broadcast encryption system |
| JP5197424B2 (ja) * | 2009-02-19 | 2013-05-15 | 三菱電機株式会社 | 通信装置及び通信方法及び通信プログラム |
| WO2011068996A1 (en) * | 2009-12-04 | 2011-06-09 | Cryptography Research, Inc. | Verifiable, leak-resistant encryption and decryption |
| US9516000B2 (en) * | 2015-03-27 | 2016-12-06 | International Business Machines Corporation | Runtime instantiation of broadcast encryption schemes |
| US9537652B2 (en) * | 2015-03-27 | 2017-01-03 | International Business Machines Corporation | Polymorphic encryption key allocation scheme |
| US10812464B2 (en) | 2015-06-15 | 2020-10-20 | Airwatch Llc | Single sign-on for managed mobile devices |
| US10944738B2 (en) | 2015-06-15 | 2021-03-09 | Airwatch, Llc. | Single sign-on for managed mobile devices using kerberos |
| US11057364B2 (en) * | 2015-06-15 | 2021-07-06 | Airwatch Llc | Single sign-on for managed mobile devices |
| US10171447B2 (en) | 2015-06-15 | 2019-01-01 | Airwatch Llc | Single sign-on for unmanaged mobile devices |
| US11010664B2 (en) * | 2016-02-05 | 2021-05-18 | Deepmind Technologies Limited | Augmenting neural networks with hierarchical external memory |
| WO2017151602A1 (en) * | 2016-02-29 | 2017-09-08 | Craxel, Inc. | Efficient encrypted data management system and method |
| CN108063756B (zh) * | 2017-11-21 | 2020-07-03 | 阿里巴巴集团控股有限公司 | 一种密钥管理方法、装置及设备 |
| WO2020005853A1 (en) * | 2018-06-25 | 2020-01-02 | Virtual Software Systems, Inc. | Systems and methods for securing communications |
| CN112052875B (zh) * | 2020-07-30 | 2024-08-20 | 华控清交信息科技(北京)有限公司 | 一种训练树模型的方法、装置和用于训练树模型的装置 |
| TWI809545B (zh) * | 2021-10-29 | 2023-07-21 | 律芯科技股份有限公司 | 混合式樹狀加解密系統 |
| DE102021006430B4 (de) | 2021-12-31 | 2023-12-07 | Kcrypt Lab UG (haftungsbeschränkt) | Verfahren zur Erzeugung verteilter One-Way-Trapdoor-Permutationen durch additives Teilen ohne einen vertrauenswürdigen Händler |
| US20240275590A1 (en) * | 2023-02-15 | 2024-08-15 | Zoom Video Communications, Inc. | Tree-based key storage for selectively granting access to an encrypted conversation history |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6011847A (en) * | 1995-06-01 | 2000-01-04 | Follendore, Iii; Roy D. | Cryptographic access and labeling system |
| US7039803B2 (en) * | 2001-01-26 | 2006-05-02 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
| US7043024B1 (en) * | 2001-04-18 | 2006-05-09 | Mcafee, Inc. | System and method for key distribution in a hierarchical tree |
-
2004
- 2004-03-31 JP JP2004102039A patent/JP2005286959A/ja not_active Abandoned
-
2005
- 2005-02-22 EP EP05710513A patent/EP1732260A1/en not_active Withdrawn
- 2005-02-22 WO PCT/JP2005/002787 patent/WO2005099167A1/ja not_active Ceased
- 2005-02-22 US US10/557,707 patent/US20070133806A1/en not_active Abandoned
- 2005-02-22 KR KR1020057022453A patent/KR20060129934A/ko not_active Withdrawn
- 2005-02-22 CN CNA2005800003329A patent/CN1774886A/zh active Pending
- 2005-03-11 TW TW094107403A patent/TW200610344A/zh unknown
Also Published As
| Publication number | Publication date |
|---|---|
| EP1732260A1 (en) | 2006-12-13 |
| US20070133806A1 (en) | 2007-06-14 |
| JP2005286959A (ja) | 2005-10-13 |
| CN1774886A (zh) | 2006-05-17 |
| WO2005099167A1 (ja) | 2005-10-20 |
| TW200610344A (en) | 2006-03-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR20060129934A (ko) | 정보 처리 방법, 복호 처리 방법 및 정보 처리 장치와컴퓨터 프로그램 | |
| US7340054B2 (en) | Information processing method, decrypting method, information processing apparatus, and computer program | |
| US7308583B2 (en) | Data distribution system | |
| JP4162237B2 (ja) | 複数の復号化装置に対し選択的にメッセージを配信する暗号化通信システム、暗号化装置、復号化装置、暗号化方法、復号化方法、暗号化プログラム、及び復号化プログラム | |
| JP2001358707A (ja) | 暗号鍵ブロックを用いた情報処理システムおよび情報処理方法、並びにプログラム提供媒体 | |
| US20050210014A1 (en) | Information-processing method, decryption method, information-processing apparatus and computer program | |
| KR20090090308A (ko) | 정보처리장치 | |
| US8229121B2 (en) | Method of tracing device keys for broadcast encryption | |
| CN101542966B (zh) | 信息处理装置 | |
| JP4561074B2 (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| Lee et al. | Identity-based revocation from subset difference methods under simple assumptions | |
| Billet et al. | Traitors collaborating in public: Pirates 2.0 | |
| JP4161859B2 (ja) | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム | |
| KR20070052687A (ko) | 정보처리 방법, 복호 처리 방법 및 정보처리 장치와컴퓨터ㆍ프로그램 | |
| JP4635459B2 (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP2001358705A (ja) | 暗号鍵ブロックを用いた情報処理システムおよび情報処理方法、並びにプログラム提供媒体 | |
| KR101951545B1 (ko) | 와일드 카드를 포함하는 키 발급, 암호화 및 복호화 방법 | |
| JP2005191805A (ja) | 暗号文配信方法、情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| Lee | Ciphertext outdate attacks on the revocable attribute-based encryption scheme with time encodings | |
| JP2005252916A (ja) | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム | |
| JP2007020025A (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
| JP4576824B2 (ja) | 情報処理装置および情報処理方法 | |
| JP2007189597A (ja) | 暗号化装置および暗号化方法、並びに復号化装置および復号化方法 | |
| JP5052207B2 (ja) | 不正者追跡可能な放送型暗号システム、そのセンタ装置及び利用者装置、それらのプログラム及びその記録媒体 | |
| Asano | Reducing receiver's storage in CS, SD and LSD broadcast encryption schemes |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
Patent event date: 20051124 Patent event code: PA01051R01D Comment text: International Patent Application |
|
| PG1501 | Laying open of application | ||
| PC1203 | Withdrawal of no request for examination | ||
| WITN | Application deemed withdrawn, e.g. because no request for examination was filed or no examination fee was paid |