MY166590A - Non-repudiable log entries for file retrievel with semi-trusted server - Google Patents
Non-repudiable log entries for file retrievel with semi-trusted serverInfo
- Publication number
- MY166590A MY166590A MYPI2013002055A MYPI2013002055A MY166590A MY 166590 A MY166590 A MY 166590A MY PI2013002055 A MYPI2013002055 A MY PI2013002055A MY PI2013002055 A MYPI2013002055 A MY PI2013002055A MY 166590 A MY166590 A MY 166590A
- Authority
- MY
- Malaysia
- Prior art keywords
- user
- server
- file
- module
- signature
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
NON-REPUDIABLE LOG ENTRIES FOR FILE RETRIEVAL WITH SEMI-TRUSTED SERVER IS PROVIDED BY COERCING USER TO DIGITALLY SIGN THE LOG ENTRY ON THE EVENT THAT THE USER RETRIEVES A FILE FROM THE SERVER WHICH PREVENTS USER OR SERVER FROM INDEPENDENTLY FORGING OR MODIFYING A LOG ENTRY. THE SYSTEM (100) COMPRISING A USER INTERFACE MODULE (102A), A SERVER INTERFACE MODULE (104A), AN ASYMMETRIC ENCRYPTION MODULE (102C), A SYMMETRIC ENCRYPTION MODULE (102E), A DIGITAL SIGNATURE MODULE (102B), A COMBINER MODULE (102D), A REGISTRATION MODULE (104D) AND A LOG FILE (104G). THE ASYMMETRIC ENCRYPTION MODULE (102C) EXPLOITS KEY DUALITIES PROPERTIES BY ENCRYPTING MESSAGES USING PUBLIC KEY AND COMBINED PUBLIC KEY; AND DECRYPTING MESSAGES USING DECRYPTION KEY WHICH INCLUDES ONE SIGNATURE OR A COMBINATION OF SIGNATURES. THE METHOD OF FILE RETRIEVAL IS CONSTRUCTED SUCH THAT THE USER MUST SUBMIT THE FIRST SIGNATURE TO THE SERVER; THE USER MUST SIGN THE CORRECT LOG ENTRY RECORDING THE FILE RETRIEVAL. FURTHER, WHEN THE SERVER COMBINES THE FIRST SIGNATURE WITH ITS OWN SIGNATURE, THE COMBINATION FORMS ONLY PART OF THE DECRYPTION KEY. THE DECRYPTION KEY CAN BE COMPLETED ONLY BY USING THE USER’S SECOND SIGNING KEY WHEREBY THE SERVER CANNOT DECRYPT THE FILE AT ANY TIME. THE METHOD OF PROTECTION OF THE PRESENT INVENTION LIES IN THE COMBINATION OF SERVER’S AND USER’S DIGITAL SIGNATURES ON EVERY LOG ENTRY TO PROTECT AGAINST RECIPIENT OR USER WHO DENIES FROM RETRIEVING A FILE. THE MOST ILLUSTRATIVE DRAWING IS
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013002055A MY166590A (en) | 2013-06-05 | 2013-06-05 | Non-repudiable log entries for file retrievel with semi-trusted server |
PCT/MY2014/000068 WO2014196850A1 (en) | 2013-06-05 | 2014-04-22 | Non-repudiable log entries for file retrieval with semi-trusted server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013002055A MY166590A (en) | 2013-06-05 | 2013-06-05 | Non-repudiable log entries for file retrievel with semi-trusted server |
Publications (1)
Publication Number | Publication Date |
---|---|
MY166590A true MY166590A (en) | 2018-07-17 |
Family
ID=50979847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2013002055A MY166590A (en) | 2013-06-05 | 2013-06-05 | Non-repudiable log entries for file retrievel with semi-trusted server |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY166590A (en) |
WO (1) | WO2014196850A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105282179B (en) * | 2015-11-27 | 2018-12-25 | 中国电子科技集团公司第五十四研究所 | A method of family's Internet of Things security control based on CPK |
US9705859B2 (en) * | 2015-12-11 | 2017-07-11 | Amazon Technologies, Inc. | Key exchange through partially trusted third party |
CN115361593B (en) * | 2022-08-19 | 2023-04-07 | 湖北巨字传媒有限公司 | Video equipment data secure transmission method and system |
CN116208428B (en) * | 2023-04-27 | 2023-07-18 | 中科信工创新技术(北京)有限公司 | Method, system, device, storage medium and electronic equipment for transmitting file |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000011619A1 (en) | 1998-08-21 | 2000-03-02 | Peha John M | Methods for generating a verifiable audit record and performing an audit |
US20050234909A1 (en) | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | Method, computer program product, and data processing system for source verifiable audit logging |
-
2013
- 2013-06-05 MY MYPI2013002055A patent/MY166590A/en unknown
-
2014
- 2014-04-22 WO PCT/MY2014/000068 patent/WO2014196850A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2014196850A1 (en) | 2014-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12018502196A1 (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
WO2016057086A3 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
MX2013004764A (en) | Methods for processing private metadata. | |
US9722795B2 (en) | Digitally signing JSON messages | |
UA115501C2 (en) | Method and system for secure tranmission of remote notification service messages to mobile devices without secure elements | |
GB2505590A (en) | System and method for secure instant messaging | |
WO2013068843A3 (en) | Multi-key cryptography for encrypting file system acceleration | |
PH12019550119A1 (en) | Addressing a trusted execution environment using signing key | |
MY166564A (en) | A system and method for privacy management for internet of things services | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
MY166590A (en) | Non-repudiable log entries for file retrievel with semi-trusted server | |
JP2015501110A5 (en) | ||
GB201305600D0 (en) | Security | |
GB201108816D0 (en) | A secure computer network | |
WO2014153315A3 (en) | Methods and apparatuses for reducing or eliminating unauthorized access to tethered data | |
CN104252606A (en) | Document encryption method, decryption method and device based on dual-encryption factors | |
Patil et al. | Analysing Secure Image Secret Sharing Schemes Based on Steganography | |
CN103679052A (en) | Method for encrypting, verifying and protecting image file | |
GB201201930D0 (en) | A method and database system for secure storage and communication of information | |
US20150156175A1 (en) | Methods for securing a communication to a social media application and devices thereof | |
Deshmukh et al. | A study of electronic document security | |
CN109711181A (en) | A kind of file content fine granularity guard method based on credible formatted data | |
Bhardwaj et al. | Security algorithms for cloud computing environment | |
Zhang | Highly secured android apps based smart phone | |
Kim et al. | Management Method to Secure Private Key of PKI using One Time Password |