SG11201405579RA - Re-encrypted data verification program, re-encryption apparatus and re-encryption system - Google Patents
Re-encrypted data verification program, re-encryption apparatus and re-encryption systemInfo
- Publication number
- SG11201405579RA SG11201405579RA SG11201405579RA SG11201405579RA SG11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA SG 11201405579R A SG11201405579R A SG 11201405579RA
- Authority
- SG
- Singapore
- Prior art keywords
- encryption
- encrypted data
- data verification
- verification program
- encryption system
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012074773A JP5389212B2 (en) | 2012-03-28 | 2012-03-28 | Re-ciphertext verification program, re-encryption device, and re-encryption system |
PCT/JP2013/050226 WO2013145796A1 (en) | 2012-03-28 | 2013-01-09 | Re-encrypted text verification program, re-encryption device, and re-encryption system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201405579RA true SG11201405579RA (en) | 2014-11-27 |
Family
ID=49259083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201405579RA SG11201405579RA (en) | 2012-03-28 | 2013-01-09 | Re-encrypted data verification program, re-encryption apparatus and re-encryption system |
Country Status (5)
Country | Link |
---|---|
US (1) | US9698984B2 (en) |
EP (1) | EP2833573B1 (en) |
JP (1) | JP5389212B2 (en) |
SG (1) | SG11201405579RA (en) |
WO (1) | WO2013145796A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9565022B1 (en) * | 2013-07-02 | 2017-02-07 | Impinj, Inc. | RFID tags with dynamic key replacement |
WO2015065472A1 (en) * | 2013-11-01 | 2015-05-07 | Hewlett-Packard Development Company, L.P. | Content encryption to produce multiply encrypted content |
US20180123784A1 (en) * | 2015-04-24 | 2018-05-03 | Pcms Holdings, Inc. | Systems, methods, and devices for device credential protection |
JP6433448B2 (en) * | 2016-03-09 | 2018-12-05 | 株式会社日立製作所 | ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM |
CN111512592A (en) * | 2017-12-28 | 2020-08-07 | 三菱电机株式会社 | Conversion key generation device, ciphertext conversion device, secret information processing system, conversion key generation method, conversion key generation program, ciphertext conversion method, and ciphertext conversion program |
US10965653B2 (en) * | 2018-03-28 | 2021-03-30 | Xaptum, Inc. | Scalable and secure message brokering approach in a communication system |
US11362824B2 (en) * | 2018-05-25 | 2022-06-14 | Intertrust Technologies Corporation | Content management systems and methods using proxy reencryption |
JP7119605B2 (en) * | 2018-06-08 | 2022-08-17 | 日本電信電話株式会社 | Ciphertext conversion system, ciphertext conversion method, and program |
CN111010265B (en) * | 2019-12-21 | 2023-04-18 | 上海中和软件有限公司 | Block chain organization key management method based on hierarchical key and BLS digital signature |
CN111490876B (en) * | 2020-04-03 | 2021-12-28 | 北京达龙上东文化艺术传播有限责任公司 | Communication method based on USB KEY and USB KEY |
CN112261015B (en) * | 2020-10-12 | 2023-05-12 | 北京沃东天骏信息技术有限公司 | Information sharing method, platform, system and electronic equipment based on block chain |
US11888829B2 (en) * | 2022-02-10 | 2024-01-30 | 7-Eleven, Inc. | Dynamic routing and encryption using an information gateway |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6959288B1 (en) | 1998-08-13 | 2005-10-25 | International Business Machines Corporation | Digital content preparation system |
US6611812B2 (en) | 1998-08-13 | 2003-08-26 | International Business Machines Corporation | Secure electronic content distribution on CDS and DVDs |
US6859791B1 (en) | 1998-08-13 | 2005-02-22 | International Business Machines Corporation | Method for determining internet users geographic region |
US7962413B2 (en) | 1998-08-13 | 2011-06-14 | International Business Machines Corporation | End-user system of preventing unauthorized rerecording of multimedia content |
US6983371B1 (en) | 1998-10-22 | 2006-01-03 | International Business Machines Corporation | Super-distribution of protected digital content |
US7228437B2 (en) | 1998-08-13 | 2007-06-05 | International Business Machines Corporation | Method and system for securing local database file of local content stored on end-user system |
US7383228B2 (en) | 1998-08-13 | 2008-06-03 | International Business Machines Corporation | Method and system for preventing unauthorized rerecording of multimedia content |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US7110984B1 (en) | 1998-08-13 | 2006-09-19 | International Business Machines Corporation | Updating usage conditions in lieu of download digital rights management protected content |
US7346580B2 (en) | 1998-08-13 | 2008-03-18 | International Business Machines Corporation | Method and system of preventing unauthorized rerecording of multimedia content |
US6389403B1 (en) | 1998-08-13 | 2002-05-14 | International Business Machines Corporation | Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system |
JP2000181803A (en) | 1998-12-18 | 2000-06-30 | Fujitsu Ltd | Electronic data keeping device with key management function and method therefor |
ATE397337T1 (en) * | 1999-12-21 | 2008-06-15 | Contentguard Holdings Inc | METHOD FOR TRANSFERRING POWER TO DECRYPT MESSAGES |
JP2002055830A (en) | 2000-05-29 | 2002-02-20 | Seiko Epson Corp | Interruption signal generation device and its method |
JP2004363779A (en) | 2003-06-03 | 2004-12-24 | Fujitsu Ltd | Authentication system and recording server |
EP1858194A4 (en) * | 2005-02-28 | 2013-10-30 | Nec Corp | Shuffle decryption validity verifying device and method, shuffle decryption validating device and method, program and recording medium |
JP5047638B2 (en) * | 2006-12-14 | 2012-10-10 | 株式会社エヌ・ティ・ティ・データ | Ciphertext decryption right delegation system |
JP2011055309A (en) * | 2009-09-03 | 2011-03-17 | National Institute Of Information & Communication Technology | Id-based encryption method with double function and encryption system |
JP5325755B2 (en) * | 2009-12-11 | 2013-10-23 | 株式会社エヌ・ティ・ティ・データ | Ciphertext decryption authority delegation system, ciphertext decryption authority delegation method, ciphertext conversion apparatus, decryption authority holder apparatus, and ciphertext conversion program |
JP2011147047A (en) * | 2010-01-18 | 2011-07-28 | Nippon Telegr & Teleph Corp <Ntt> | Proxy re-encryption system, transmitter, re-encryption key generating device, proxy device, receiver, proxy re-encryption method, programs therefor, and recording medium |
US8347093B1 (en) | 2010-07-19 | 2013-01-01 | Google Inc. | Privacy preserving name verification |
JP2012150378A (en) * | 2011-01-21 | 2012-08-09 | Nippon Telegr & Teleph Corp <Ntt> | Proxy re-encryption system, key generation device, re-encryption device, proxy re-encryption method, and program |
-
2012
- 2012-03-28 JP JP2012074773A patent/JP5389212B2/en active Active
-
2013
- 2013-01-09 WO PCT/JP2013/050226 patent/WO2013145796A1/en active Application Filing
- 2013-01-09 EP EP13767295.2A patent/EP2833573B1/en active Active
- 2013-01-09 SG SG11201405579RA patent/SG11201405579RA/en unknown
-
2014
- 2014-09-08 US US14/480,073 patent/US9698984B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9698984B2 (en) | 2017-07-04 |
EP2833573B1 (en) | 2017-03-01 |
WO2013145796A1 (en) | 2013-10-03 |
EP2833573A4 (en) | 2015-12-16 |
EP2833573A1 (en) | 2015-02-04 |
US20150043735A1 (en) | 2015-02-12 |
JP2013207581A (en) | 2013-10-07 |
JP5389212B2 (en) | 2014-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201402113SA (en) | Re-encryption system, re-encryption apparatus, and program | |
SG11201405579RA (en) | Re-encrypted data verification program, re-encryption apparatus and re-encryption system | |
HK1208952A1 (en) | Verification method, verification system, verification device, and program therefor | |
SG11201509412WA (en) | System and methods for encrypting data | |
EP2790411A4 (en) | Data processing device, data processing method, and program | |
EP2858297A4 (en) | Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program | |
EP2879324A4 (en) | Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program | |
EP2809070A4 (en) | Receiving device, receiving method, program, and information processing system | |
EP2933973A4 (en) | Data protection method, apparatus and system | |
EP2784675A4 (en) | Method, device and system for data reconstruction | |
EP2924659A4 (en) | Information processing device, system, information processing method and program | |
EP2947810A4 (en) | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program | |
EP2835932A4 (en) | Encryption device, decryption device, encryption method, decryption method, and program | |
EP2881930A4 (en) | Encryption system, encryption method, encryption program and decryption device | |
SG11201508780UA (en) | Method and system for encrypting data | |
EP2919147A4 (en) | Data communications system, data analysis device, data communications method, and program | |
EP2797254A4 (en) | Encrypted data administration device, encrypted data administration method, and encrypted data administration program | |
ZA201406517B (en) | Reception device, reception method, program, decryption processing device, reception processing system, and information processing device | |
EP2790412A4 (en) | Data processing device, data processing method, and program | |
EP2843871A4 (en) | Device, method and program for format-preserving encryption, and device, method and program for decryption | |
EP2857975A4 (en) | Parallel data processing system, computer, and parallel data processing method | |
EP2712115A4 (en) | Order-preserving encryption system, device, method, and program | |
EP2938092A4 (en) | Communication device, communication method, communication system, and computer program | |
EP2866151A4 (en) | Information processing method and device, and data processing method and device using same | |
EP2713645A4 (en) | Data sending method, device, and system |