ZA200602587B - Efficient management of cryptographic key generations - Google Patents
Efficient management of cryptographic key generations Download PDFInfo
- Publication number
- ZA200602587B ZA200602587B ZA200602587A ZA200602587A ZA200602587B ZA 200602587 B ZA200602587 B ZA 200602587B ZA 200602587 A ZA200602587 A ZA 200602587A ZA 200602587 A ZA200602587 A ZA 200602587A ZA 200602587 B ZA200602587 B ZA 200602587B
- Authority
- ZA
- South Africa
- Prior art keywords
- key
- generation
- information
- older
- derivation function
- Prior art date
Links
- 238000009795 derivation Methods 0.000 claims description 60
- 238000000034 method Methods 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 21
- 230000001131 transforming effect Effects 0.000 claims 2
- 230000008901 benefit Effects 0.000 description 8
- 239000000463 material Substances 0.000 description 8
- 230000003466 anti-cipated effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US51015303P | 2003-10-14 | 2003-10-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200602587B true ZA200602587B (en) | 2007-06-27 |
Family
ID=34465122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA200602587A ZA200602587B (en) | 2003-10-14 | 2004-10-13 | Efficient management of cryptographic key generations |
Country Status (10)
Country | Link |
---|---|
US (1) | US20070127719A1 (pt) |
EP (1) | EP1676281B1 (pt) |
JP (1) | JP4855940B2 (pt) |
KR (1) | KR100807926B1 (pt) |
CN (1) | CN1910848B (pt) |
BR (1) | BRPI0415314B8 (pt) |
CA (1) | CA2539879C (pt) |
RU (1) | RU2351078C2 (pt) |
WO (1) | WO2005038818A1 (pt) |
ZA (1) | ZA200602587B (pt) |
Families Citing this family (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020114453A1 (en) * | 2001-02-21 | 2002-08-22 | Bartholet Thomas G. | System and method for secure cryptographic data transport and storage |
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
KR100727387B1 (ko) * | 2004-10-22 | 2007-06-12 | 삼성전자주식회사 | 네트워크 시스템에서의 키 관리방법 |
US7995758B1 (en) * | 2004-11-30 | 2011-08-09 | Adobe Systems Incorporated | Family of encryption keys |
US9384149B2 (en) * | 2005-01-31 | 2016-07-05 | Unisys Corporation | Block-level data storage security system |
JP5255436B2 (ja) * | 2005-06-08 | 2013-08-07 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 人体センサネットワーク用の決定論的鍵事前配布及び運用鍵管理 |
JP2007005878A (ja) * | 2005-06-21 | 2007-01-11 | Kddi Corp | 共有鍵生成方法、共有鍵生成方式、暗号化データコピー方法、共有鍵生成プログラム、暗号化データ送信プログラムおよび暗号化データ受信プログラム |
DE102005044949A1 (de) * | 2005-09-20 | 2007-03-29 | Nec Europe Ltd. | Verfahren zur Authentifizierung |
US8001584B2 (en) * | 2005-09-30 | 2011-08-16 | Intel Corporation | Method for secure device discovery and introduction |
CN100452737C (zh) * | 2005-11-02 | 2009-01-14 | 华为技术有限公司 | 数字家庭网络中的版权管理方法及数字家庭网络系统 |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US7477738B2 (en) * | 2005-12-21 | 2009-01-13 | General Instrument Corporation | Data sequence encryption and decryption |
US20070150744A1 (en) * | 2005-12-22 | 2007-06-28 | Cheng Siu L | Dual authentications utilizing secure token chains |
US20140108796A1 (en) * | 2006-01-26 | 2014-04-17 | Unisys Corporation | Storage of cryptographically-split data blocks at geographically-separated locations |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US8082574B2 (en) * | 2006-08-11 | 2011-12-20 | Certes Networks, Inc. | Enforcing security groups in network of data processors |
WO2008030523A2 (en) * | 2006-09-06 | 2008-03-13 | Bsecured Solutions, Llc | Real privacy management authentication system |
US20080072281A1 (en) * | 2006-09-14 | 2008-03-20 | Willis Ronald B | Enterprise data protection management for providing secure communication in a network |
JP4179563B2 (ja) | 2006-09-21 | 2008-11-12 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 暗号通信の暗号鍵を管理する技術 |
IL178488A0 (en) | 2006-10-05 | 2008-01-20 | Nds Ltd | Improved key production system |
JP5141099B2 (ja) * | 2007-06-12 | 2013-02-13 | 株式会社日立製作所 | アクセス鍵自動配信システム |
US8059814B1 (en) * | 2007-09-28 | 2011-11-15 | Emc Corporation | Techniques for carrying out seed or key derivation |
JP5139028B2 (ja) * | 2007-10-24 | 2013-02-06 | エイチジーエスティーネザーランドビーブイ | コンテンツデータ管理システム及び方法 |
DE102008021933B4 (de) * | 2008-05-02 | 2011-04-07 | Secutanta Gmbh | Verfahren zur Bestimmung einer Kette von Schlüsseln, Verfahren zur Übertragung einer Teilkette der Schlüssel, Computersystem und Chipkarte I |
JP2009284086A (ja) * | 2008-05-20 | 2009-12-03 | Tokai Rika Co Ltd | 暗号鍵更新システム及び暗号鍵更新方法 |
JP5288901B2 (ja) * | 2008-06-23 | 2013-09-11 | 三菱電機株式会社 | 鍵管理サーバ、端末、通信システム、鍵配信方法、鍵配信プログラム、鍵受信方法及び鍵受信プログラム |
WO2010024379A1 (ja) * | 2008-08-29 | 2010-03-04 | 日本電気株式会社 | 通信システム、送信側及び受信又は転送側の通信装置、データ通信方法、データ通信プログラム |
EP2219374A1 (en) * | 2009-02-13 | 2010-08-18 | Irdeto Access B.V. | Securely providing a control word from a smartcard to a conditional access module |
KR101199476B1 (ko) * | 2009-03-05 | 2012-11-12 | 한국전자통신연구원 | 지능형 로봇 서비스 시스템에서의 콘텐츠 관리 방법 및 장치, 이를 위한 콘텐츠 서버 및 로봇 |
KR20100100134A (ko) * | 2009-03-05 | 2010-09-15 | 한국전자통신연구원 | 네트워크 로봇 서비스를 위한 보안 서비스 방법 및 장치 |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
CN102195775B (zh) * | 2010-03-15 | 2016-03-02 | 中兴通讯股份有限公司 | 一种云计算密钥的加密和解密方法及装置 |
US8886935B2 (en) * | 2010-04-30 | 2014-11-11 | Kabushiki Kaisha Toshiba | Key management device, system and method having a rekey mechanism |
US8675875B2 (en) | 2010-05-18 | 2014-03-18 | International Business Machines Corporation | Optimizing use of hardware security modules |
US9710616B2 (en) * | 2010-12-15 | 2017-07-18 | Ericsson Ab | DRM plugins |
US8611544B1 (en) | 2011-01-25 | 2013-12-17 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
US9137014B2 (en) * | 2011-01-25 | 2015-09-15 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
KR101690093B1 (ko) * | 2011-01-28 | 2016-12-27 | 로얄티 패이스 홀딩스 코포레이션 | 제어된 보안 도메인 |
US8924737B2 (en) * | 2011-08-25 | 2014-12-30 | Microsoft Corporation | Digital signing authority dependent platform secret |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
US8769303B2 (en) | 2011-12-05 | 2014-07-01 | Microsoft Corporation | Infrastructure independent recovery key release |
US9489528B2 (en) * | 2011-12-12 | 2016-11-08 | Microsoft Technology Licensing, Llc | Single use recovery key |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US8892865B1 (en) | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
US9215076B1 (en) | 2012-03-27 | 2015-12-15 | Amazon Technologies, Inc. | Key generation for hierarchical data access |
US20150371013A1 (en) * | 2012-03-30 | 2015-12-24 | Irdeto Usa, Inc. | Method and system for locking content |
WO2014022813A1 (en) | 2012-08-02 | 2014-02-06 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
US9154481B1 (en) * | 2012-12-13 | 2015-10-06 | Emc Corporation | Decryption of a protected resource on a cryptographic device using wireless communication |
KR101422759B1 (ko) * | 2013-02-04 | 2014-07-23 | 순천향대학교 산학협력단 | 데이터 위탁 환경에서 결탁을 방지하는 데이터 저장 및 공유 방법 |
EP2819057B1 (en) * | 2013-06-24 | 2017-08-09 | Nxp B.V. | Data processing system, method of initializing a data processing system, and computer program product |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US10034169B2 (en) * | 2014-11-12 | 2018-07-24 | Qualcomm Incorporated | Method to authenticate peers in an infrastructure-less peer-to-peer network |
DE102015209368A1 (de) * | 2015-05-21 | 2016-11-24 | Siemens Aktiengesellschaft | Ableiten eines kryptographischen Schlüssels einer vorgebbaren Schlüsselgeneration |
US20170063853A1 (en) * | 2015-07-10 | 2017-03-02 | Infineon Technologies Ag | Data cipher and decipher based on device and data authentication |
US9990503B2 (en) | 2015-08-04 | 2018-06-05 | Ge Aviation Systems, Llc | Cryptographic key server embedded in data transfer system |
US10255420B2 (en) | 2015-08-04 | 2019-04-09 | Ge Aviation Systems, Llc | Configuring cryptographic systems |
US10002257B2 (en) | 2015-08-04 | 2018-06-19 | Ge Aviation Systems Llc | Cryptographic key loader embedded in removable data cartridge |
US10116446B2 (en) | 2015-08-04 | 2018-10-30 | Ge Aviation Systems Llc | Cryptographic ignition key (CIK) embedded in removable data cartridge |
WO2017049111A1 (en) * | 2015-09-18 | 2017-03-23 | Jung-Min Park | Group signatures with probabilistic revocation |
CN106779703B (zh) * | 2016-11-29 | 2020-10-27 | 中国银行股份有限公司 | 一种银行卡密钥集中管理的动态实现方法及装置 |
US10735384B2 (en) * | 2017-02-17 | 2020-08-04 | Whatsapp Inc. | Techniques for key ratcheting with multiple step sizes |
DE102017008688A1 (de) * | 2017-09-15 | 2019-03-21 | Diehl Metering Systems Gmbh | Verfahren zur Datenübertragung |
JP6885304B2 (ja) * | 2017-11-13 | 2021-06-09 | トヨタ自動車株式会社 | 鍵情報共有システム、配信装置、プログラム |
DE102018213038A1 (de) * | 2018-08-03 | 2020-02-06 | Continental Teves Ag & Co. Ohg | Verfahren zum fahrzeuginternen Verwalten von kryptographischen Schlüsseln |
CN111404666B (zh) * | 2019-01-02 | 2024-07-05 | 中国移动通信有限公司研究院 | 一种密钥生成方法、终端设备及网络设备 |
US11496326B2 (en) | 2019-03-13 | 2022-11-08 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Physical unclonable function-based encryption schemes with combination of hashing methods |
US11283633B2 (en) | 2019-03-13 | 2022-03-22 | Arizona Board Of Regents On Behalf Of Northern Arizona University | PUF-based key generation for cryptographic schemes |
RU2716207C1 (ru) * | 2019-06-05 | 2020-03-06 | федеральное государственное казенное военное образовательное учреждение высшего образования "Краснодарское высшее военное училище имени генерала армии С.М. Штеменко" Министерства обороны Российской Федерации | Способ децентрализованного распределения ключевой информации |
US11418333B2 (en) | 2020-01-10 | 2022-08-16 | Dell Products L.P. | System and method for trusted control flow enforcement using derived encryption keys |
US11176058B2 (en) * | 2020-01-22 | 2021-11-16 | Arm Limited | Address decryption for memory storage |
KR102364254B1 (ko) * | 2020-04-29 | 2022-02-16 | 단국대학교 산학협력단 | 블록 체인에서 엔티티의 키 관리 방법 및 장치 |
JP2022130947A (ja) * | 2021-02-26 | 2022-09-07 | 株式会社日立製作所 | 暗号通信システム及び通信端末 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5483598A (en) * | 1993-07-01 | 1996-01-09 | Digital Equipment Corp., Patent Law Group | Message encryption using a hash function |
JPH11296078A (ja) * | 1998-04-15 | 1999-10-29 | Yrs:Kk | 記念品 |
US6539092B1 (en) * | 1998-07-02 | 2003-03-25 | Cryptography Research, Inc. | Leak-resistant cryptographic indexed key update |
US6363149B1 (en) * | 1999-10-01 | 2002-03-26 | Sony Corporation | Method and apparatus for accessing stored digital programs |
EP1133866A4 (en) * | 1998-11-25 | 2009-03-11 | Sony Electronics Inc | METHOD AND APPARATUS FOR ACCESSING MEMORIZED DIGITAL PROGRAMS |
US6985583B1 (en) * | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
EP1059578A3 (en) * | 1999-06-07 | 2003-02-05 | Hewlett-Packard Company, A Delaware Corporation | Secure backdoor access for a computer |
US6891951B2 (en) * | 2000-01-21 | 2005-05-10 | Victor Company Of Japan, Ltd. | Cryptosystem-related method and apparatus |
JP4622064B2 (ja) * | 2000-04-06 | 2011-02-02 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
JP4604418B2 (ja) * | 2001-07-26 | 2011-01-05 | パナソニック株式会社 | 通信装置および通信方法 |
JP2003110541A (ja) * | 2001-09-26 | 2003-04-11 | Ntt Docomo Inc | 著作物利用方法、著作物利用システム、移動機及びサーバ |
JP3695526B2 (ja) * | 2001-10-01 | 2005-09-14 | 学校法人慶應義塾 | 暗号鍵更新方法 |
JP2003174445A (ja) * | 2001-12-05 | 2003-06-20 | Hitachi Ltd | 情報制限方法 |
AU2003214411A1 (en) * | 2002-03-27 | 2003-10-13 | British Telecommunications Public Limited Company | Key management protocol |
US7477738B2 (en) * | 2005-12-21 | 2009-01-13 | General Instrument Corporation | Data sequence encryption and decryption |
-
2004
- 2004-10-13 EP EP04793792.5A patent/EP1676281B1/en not_active Expired - Lifetime
- 2004-10-13 RU RU2006116499/09A patent/RU2351078C2/ru active
- 2004-10-13 BR BRPI0415314A patent/BRPI0415314B8/pt active IP Right Grant
- 2004-10-13 CN CN2004800303600A patent/CN1910848B/zh not_active Expired - Lifetime
- 2004-10-13 CA CA2539879A patent/CA2539879C/en not_active Expired - Lifetime
- 2004-10-13 ZA ZA200602587A patent/ZA200602587B/en unknown
- 2004-10-13 WO PCT/SE2004/001466 patent/WO2005038818A1/en active Application Filing
- 2004-10-13 US US10/575,727 patent/US20070127719A1/en not_active Abandoned
- 2004-10-13 JP JP2006535304A patent/JP4855940B2/ja not_active Expired - Lifetime
- 2004-10-13 KR KR1020067007217A patent/KR100807926B1/ko active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
RU2351078C2 (ru) | 2009-03-27 |
CN1910848A (zh) | 2007-02-07 |
WO2005038818A1 (en) | 2005-04-28 |
WO2005038818A9 (en) | 2005-06-09 |
BRPI0415314B8 (pt) | 2018-05-02 |
EP1676281A1 (en) | 2006-07-05 |
KR20060084447A (ko) | 2006-07-24 |
CA2539879A1 (en) | 2005-04-28 |
CN1910848B (zh) | 2010-06-16 |
US20070127719A1 (en) | 2007-06-07 |
JP2007508778A (ja) | 2007-04-05 |
EP1676281B1 (en) | 2018-03-14 |
KR100807926B1 (ko) | 2008-02-28 |
CA2539879C (en) | 2013-09-24 |
BRPI0415314B1 (pt) | 2018-04-17 |
JP4855940B2 (ja) | 2012-01-18 |
RU2006116499A (ru) | 2007-11-27 |
BRPI0415314A (pt) | 2006-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2539879C (en) | Efficient management of cryptographic key generations | |
Belguith et al. | Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications | |
US6483920B2 (en) | Key recovery process used for strong encryption of messages | |
US8799981B2 (en) | Privacy protection system | |
US6859533B1 (en) | System and method for transferring the right to decode messages in a symmetric encoding scheme | |
EP1043864A2 (en) | System and method for document distribution | |
US8488782B2 (en) | Parameterizable cryptography | |
CN111371790B (zh) | 基于联盟链的数据加密发送方法、相关方法、装置和系统 | |
US7266705B2 (en) | Secure transmission of data within a distributed computer system | |
CN114679340B (zh) | 一种文件共享方法、系统、设备及可读存储介质 | |
EP1113617A2 (en) | System and method for transferring the right to decode messages | |
Pareek et al. | Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance | |
Tian et al. | An efficient scheme of cloud data assured deletion | |
CA3184487A1 (en) | Distributed anonymized compliant encryption management system | |
GB2395304A (en) | A digital locking system for physical and digital items using a location based indication for unlocking | |
Dutta et al. | Vector space access structure and ID based distributed DRM key management | |
EP1130843A2 (en) | System and method for transferring the right to decode messages in a symmetric encoding scheme | |
CN107769915B (zh) | 具备细粒度用户控制的数据加解密系统和方法 | |
JP2001147899A (ja) | コンテンツ配布システム | |
Wang et al. | Secure Data Deduplication And Sharing Method Based On UMLE And CP-ABE | |
Chokhani et al. | PKI and certificate authorities | |
Rosa | Data-at-Rest Protection and Efficient Access Control in the Cloud | |
EP4402593A1 (en) | System and method of creating symmetric keys using elliptic curve cryptography | |
Albahdal et al. | Evaluation of security supporting mechanisms in cloud storage | |
Tanwar et al. | Design and Implementation of Database Security for Various type of Digital Signature |