MY166590A - Non-repudiable log entries for file retrievel with semi-trusted server - Google Patents

Non-repudiable log entries for file retrievel with semi-trusted server

Info

Publication number
MY166590A
MY166590A MYPI2013002055A MYPI2013002055A MY166590A MY 166590 A MY166590 A MY 166590A MY PI2013002055 A MYPI2013002055 A MY PI2013002055A MY PI2013002055 A MYPI2013002055 A MY PI2013002055A MY 166590 A MY166590 A MY 166590A
Authority
MY
Malaysia
Prior art keywords
user
server
file
module
signature
Prior art date
Application number
MYPI2013002055A
Inventor
Soeheila Mohamad Moesfa
Geong Sen Poh
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2013002055A priority Critical patent/MY166590A/en
Priority to PCT/MY2014/000068 priority patent/WO2014196850A1/en
Publication of MY166590A publication Critical patent/MY166590A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

NON-REPUDIABLE LOG ENTRIES FOR FILE RETRIEVAL WITH SEMI-TRUSTED SERVER IS PROVIDED BY COERCING USER TO DIGITALLY SIGN THE LOG ENTRY ON THE EVENT THAT THE USER RETRIEVES A FILE FROM THE SERVER WHICH PREVENTS USER OR SERVER FROM INDEPENDENTLY FORGING OR MODIFYING A LOG ENTRY. THE SYSTEM (100) COMPRISING A USER INTERFACE MODULE (102A), A SERVER INTERFACE MODULE (104A), AN ASYMMETRIC ENCRYPTION MODULE (102C), A SYMMETRIC ENCRYPTION MODULE (102E), A DIGITAL SIGNATURE MODULE (102B), A COMBINER MODULE (102D), A REGISTRATION MODULE (104D) AND A LOG FILE (104G). THE ASYMMETRIC ENCRYPTION MODULE (102C) EXPLOITS KEY DUALITIES PROPERTIES BY ENCRYPTING MESSAGES USING PUBLIC KEY AND COMBINED PUBLIC KEY; AND DECRYPTING MESSAGES USING DECRYPTION KEY WHICH INCLUDES ONE SIGNATURE OR A COMBINATION OF SIGNATURES. THE METHOD OF FILE RETRIEVAL IS CONSTRUCTED SUCH THAT THE USER MUST SUBMIT THE FIRST SIGNATURE TO THE SERVER; THE USER MUST SIGN THE CORRECT LOG ENTRY RECORDING THE FILE RETRIEVAL. FURTHER, WHEN THE SERVER COMBINES THE FIRST SIGNATURE WITH ITS OWN SIGNATURE, THE COMBINATION FORMS ONLY PART OF THE DECRYPTION KEY. THE DECRYPTION KEY CAN BE COMPLETED ONLY BY USING THE USER’S SECOND SIGNING KEY WHEREBY THE SERVER CANNOT DECRYPT THE FILE AT ANY TIME. THE METHOD OF PROTECTION OF THE PRESENT INVENTION LIES IN THE COMBINATION OF SERVER’S AND USER’S DIGITAL SIGNATURES ON EVERY LOG ENTRY TO PROTECT AGAINST RECIPIENT OR USER WHO DENIES FROM RETRIEVING A FILE. THE MOST ILLUSTRATIVE DRAWING IS
MYPI2013002055A 2013-06-05 2013-06-05 Non-repudiable log entries for file retrievel with semi-trusted server MY166590A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2013002055A MY166590A (en) 2013-06-05 2013-06-05 Non-repudiable log entries for file retrievel with semi-trusted server
PCT/MY2014/000068 WO2014196850A1 (en) 2013-06-05 2014-04-22 Non-repudiable log entries for file retrieval with semi-trusted server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2013002055A MY166590A (en) 2013-06-05 2013-06-05 Non-repudiable log entries for file retrievel with semi-trusted server

Publications (1)

Publication Number Publication Date
MY166590A true MY166590A (en) 2018-07-17

Family

ID=50979847

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2013002055A MY166590A (en) 2013-06-05 2013-06-05 Non-repudiable log entries for file retrievel with semi-trusted server

Country Status (2)

Country Link
MY (1) MY166590A (en)
WO (1) WO2014196850A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282179B (en) * 2015-11-27 2018-12-25 中国电子科技集团公司第五十四研究所 A method of family's Internet of Things security control based on CPK
US9705859B2 (en) * 2015-12-11 2017-07-11 Amazon Technologies, Inc. Key exchange through partially trusted third party
CN115361593B (en) * 2022-08-19 2023-04-07 湖北巨字传媒有限公司 Video equipment data secure transmission method and system
CN116208428B (en) * 2023-04-27 2023-07-18 中科信工创新技术(北京)有限公司 Method, system, device, storage medium and electronic equipment for transmitting file

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000011619A1 (en) 1998-08-21 2000-03-02 Peha John M Methods for generating a verifiable audit record and performing an audit
US20050234909A1 (en) 2004-04-15 2005-10-20 International Business Machines Corporation Method, computer program product, and data processing system for source verifiable audit logging

Also Published As

Publication number Publication date
WO2014196850A1 (en) 2014-12-11

Similar Documents

Publication Publication Date Title
PH12018502196A1 (en) System and methods for validating and performing operations on homomorphically encrypted data
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
MX2013004764A (en) Methods for processing private metadata.
US9722795B2 (en) Digitally signing JSON messages
UA115501C2 (en) Method and system for secure tranmission of remote notification service messages to mobile devices without secure elements
GB2505590A (en) System and method for secure instant messaging
WO2013068843A3 (en) Multi-key cryptography for encrypting file system acceleration
PH12019550119A1 (en) Addressing a trusted execution environment using signing key
MY166564A (en) A system and method for privacy management for internet of things services
NZ701459A (en) Systems and methods for secure processing with embedded cryptographic unit
MY166590A (en) Non-repudiable log entries for file retrievel with semi-trusted server
JP2015501110A5 (en)
GB201305600D0 (en) Security
GB201108816D0 (en) A secure computer network
WO2014153315A3 (en) Methods and apparatuses for reducing or eliminating unauthorized access to tethered data
CN104252606A (en) Document encryption method, decryption method and device based on dual-encryption factors
Patil et al. Analysing Secure Image Secret Sharing Schemes Based on Steganography
CN103679052A (en) Method for encrypting, verifying and protecting image file
GB201201930D0 (en) A method and database system for secure storage and communication of information
US20150156175A1 (en) Methods for securing a communication to a social media application and devices thereof
Deshmukh et al. A study of electronic document security
CN109711181A (en) A kind of file content fine granularity guard method based on credible formatted data
Bhardwaj et al. Security algorithms for cloud computing environment
Zhang Highly secured android apps based smart phone
Kim et al. Management Method to Secure Private Key of PKI using One Time Password