SG11201405579RA - Re-encrypted data verification program, re-encryption apparatus and re-encryption system - Google Patents

Re-encrypted data verification program, re-encryption apparatus and re-encryption system

Info

Publication number
SG11201405579RA
SG11201405579RA SG11201405579RA SG11201405579RA SG11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA
Authority
SG
Singapore
Prior art keywords
encryption
encrypted data
data verification
verification program
encryption system
Prior art date
Application number
SG11201405579RA
Inventor
Yoshihiro Fujii
Takuya Yoshida
Koji Okada
Original Assignee
Toshiba Kk
Toshiba Solutions Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Kk, Toshiba Solutions Corp filed Critical Toshiba Kk
Publication of SG11201405579RA publication Critical patent/SG11201405579RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
SG11201405579RA 2012-03-28 2013-01-09 Re-encrypted data verification program, re-encryption apparatus and re-encryption system SG11201405579RA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2012074773A JP5389212B2 (en) 2012-03-28 2012-03-28 Re-ciphertext verification program, re-encryption device, and re-encryption system
PCT/JP2013/050226 WO2013145796A1 (en) 2012-03-28 2013-01-09 Re-encrypted text verification program, re-encryption device, and re-encryption system

Publications (1)

Publication Number Publication Date
SG11201405579RA true SG11201405579RA (en) 2014-11-27

Family

ID=49259083

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201405579RA SG11201405579RA (en) 2012-03-28 2013-01-09 Re-encrypted data verification program, re-encryption apparatus and re-encryption system

Country Status (5)

Country Link
US (1) US9698984B2 (en)
EP (1) EP2833573B1 (en)
JP (1) JP5389212B2 (en)
SG (1) SG11201405579RA (en)
WO (1) WO2013145796A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9565022B1 (en) * 2013-07-02 2017-02-07 Impinj, Inc. RFID tags with dynamic key replacement
WO2015065472A1 (en) * 2013-11-01 2015-05-07 Hewlett-Packard Development Company, L.P. Content encryption to produce multiply encrypted content
US20180123784A1 (en) * 2015-04-24 2018-05-03 Pcms Holdings, Inc. Systems, methods, and devices for device credential protection
JP6433448B2 (en) * 2016-03-09 2018-12-05 株式会社日立製作所 ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM
CN111512592A (en) * 2017-12-28 2020-08-07 三菱电机株式会社 Conversion key generation device, ciphertext conversion device, secret information processing system, conversion key generation method, conversion key generation program, ciphertext conversion method, and ciphertext conversion program
US10965653B2 (en) * 2018-03-28 2021-03-30 Xaptum, Inc. Scalable and secure message brokering approach in a communication system
US11362824B2 (en) * 2018-05-25 2022-06-14 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
JP7119605B2 (en) * 2018-06-08 2022-08-17 日本電信電話株式会社 Ciphertext conversion system, ciphertext conversion method, and program
CN111010265B (en) * 2019-12-21 2023-04-18 上海中和软件有限公司 Block chain organization key management method based on hierarchical key and BLS digital signature
CN111490876B (en) * 2020-04-03 2021-12-28 北京达龙上东文化艺术传播有限责任公司 Communication method based on USB KEY and USB KEY
CN112261015B (en) * 2020-10-12 2023-05-12 北京沃东天骏信息技术有限公司 Information sharing method, platform, system and electronic equipment based on block chain
US11888829B2 (en) * 2022-02-10 2024-01-30 7-Eleven, Inc. Dynamic routing and encryption using an information gateway

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959288B1 (en) 1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system
US6611812B2 (en) 1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs
US6859791B1 (en) 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US7962413B2 (en) 1998-08-13 2011-06-14 International Business Machines Corporation End-user system of preventing unauthorized rerecording of multimedia content
US6983371B1 (en) 1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content
US7228437B2 (en) 1998-08-13 2007-06-05 International Business Machines Corporation Method and system for securing local database file of local content stored on end-user system
US7383228B2 (en) 1998-08-13 2008-06-03 International Business Machines Corporation Method and system for preventing unauthorized rerecording of multimedia content
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US7110984B1 (en) 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US7346580B2 (en) 1998-08-13 2008-03-18 International Business Machines Corporation Method and system of preventing unauthorized rerecording of multimedia content
US6389403B1 (en) 1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system
JP2000181803A (en) 1998-12-18 2000-06-30 Fujitsu Ltd Electronic data keeping device with key management function and method therefor
ATE397337T1 (en) * 1999-12-21 2008-06-15 Contentguard Holdings Inc METHOD FOR TRANSFERRING POWER TO DECRYPT MESSAGES
JP2002055830A (en) 2000-05-29 2002-02-20 Seiko Epson Corp Interruption signal generation device and its method
JP2004363779A (en) 2003-06-03 2004-12-24 Fujitsu Ltd Authentication system and recording server
EP1858194A4 (en) * 2005-02-28 2013-10-30 Nec Corp Shuffle decryption validity verifying device and method, shuffle decryption validating device and method, program and recording medium
JP5047638B2 (en) * 2006-12-14 2012-10-10 株式会社エヌ・ティ・ティ・データ Ciphertext decryption right delegation system
JP2011055309A (en) * 2009-09-03 2011-03-17 National Institute Of Information & Communication Technology Id-based encryption method with double function and encryption system
JP5325755B2 (en) * 2009-12-11 2013-10-23 株式会社エヌ・ティ・ティ・データ Ciphertext decryption authority delegation system, ciphertext decryption authority delegation method, ciphertext conversion apparatus, decryption authority holder apparatus, and ciphertext conversion program
JP2011147047A (en) * 2010-01-18 2011-07-28 Nippon Telegr & Teleph Corp <Ntt> Proxy re-encryption system, transmitter, re-encryption key generating device, proxy device, receiver, proxy re-encryption method, programs therefor, and recording medium
US8347093B1 (en) 2010-07-19 2013-01-01 Google Inc. Privacy preserving name verification
JP2012150378A (en) * 2011-01-21 2012-08-09 Nippon Telegr & Teleph Corp <Ntt> Proxy re-encryption system, key generation device, re-encryption device, proxy re-encryption method, and program

Also Published As

Publication number Publication date
US9698984B2 (en) 2017-07-04
EP2833573B1 (en) 2017-03-01
WO2013145796A1 (en) 2013-10-03
EP2833573A4 (en) 2015-12-16
EP2833573A1 (en) 2015-02-04
US20150043735A1 (en) 2015-02-12
JP2013207581A (en) 2013-10-07
JP5389212B2 (en) 2014-01-15

Similar Documents

Publication Publication Date Title
SG11201402113SA (en) Re-encryption system, re-encryption apparatus, and program
SG11201405579RA (en) Re-encrypted data verification program, re-encryption apparatus and re-encryption system
HK1208952A1 (en) Verification method, verification system, verification device, and program therefor
SG11201509412WA (en) System and methods for encrypting data
EP2790411A4 (en) Data processing device, data processing method, and program
EP2858297A4 (en) Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program
EP2879324A4 (en) Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program
EP2809070A4 (en) Receiving device, receiving method, program, and information processing system
EP2933973A4 (en) Data protection method, apparatus and system
EP2784675A4 (en) Method, device and system for data reconstruction
EP2924659A4 (en) Information processing device, system, information processing method and program
EP2947810A4 (en) Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
EP2835932A4 (en) Encryption device, decryption device, encryption method, decryption method, and program
EP2881930A4 (en) Encryption system, encryption method, encryption program and decryption device
SG11201508780UA (en) Method and system for encrypting data
EP2919147A4 (en) Data communications system, data analysis device, data communications method, and program
EP2797254A4 (en) Encrypted data administration device, encrypted data administration method, and encrypted data administration program
ZA201406517B (en) Reception device, reception method, program, decryption processing device, reception processing system, and information processing device
EP2790412A4 (en) Data processing device, data processing method, and program
EP2843871A4 (en) Device, method and program for format-preserving encryption, and device, method and program for decryption
EP2857975A4 (en) Parallel data processing system, computer, and parallel data processing method
EP2712115A4 (en) Order-preserving encryption system, device, method, and program
EP2938092A4 (en) Communication device, communication method, communication system, and computer program
EP2866151A4 (en) Information processing method and device, and data processing method and device using same
EP2713645A4 (en) Data sending method, device, and system