Presentation | 1996/5/20 How to Protect Data and Delegated Keys in Digital Distribution Masahiro MAMBO, Yoshinori YAMANE, Kouichi SAKURAI, Eiji OKAMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A cryptography is quite effective for protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, there should be a method to convert the encrypted information into a form to be read only by an admissible user. Although such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen. In this paper we propose secure digital distribution systems by which encrypted information is directly transformed into a ciphertext of an arbitrary admissible user. We show that techniques of a proxy cryptosystem and a blind decoding system are useful to establish these distribution systems. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Digital Distribution System / Proxy Cryptosystem / Blind Decoding / RSA Cryptosystem / ElGamal Cryptosystem / Secrecy |
Paper # | ISEC96-6 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1996/5/20(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | How to Protect Data and Delegated Keys in Digital Distribution |
Sub Title (in English) | |
Keyword(1) | Digital Distribution System |
Keyword(2) | Proxy Cryptosystem |
Keyword(3) | Blind Decoding |
Keyword(4) | RSA Cryptosystem |
Keyword(5) | ElGamal Cryptosystem |
Keyword(6) | Secrecy |
1st Author's Name | Masahiro MAMBO |
1st Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology() |
2nd Author's Name | Yoshinori YAMANE |
2nd Author's Affiliation | Dept. of Computer and Communication Engineering, Kyushu University |
3rd Author's Name | Kouichi SAKURAI |
3rd Author's Affiliation | Dept. of Computer and Communication Engineering, Kyushu University |
4th Author's Name | Eiji OKAMOTO |
4th Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology |
Date | 1996/5/20 |
Paper # | ISEC96-6 |
Volume (vol) | vol.96 |
Number (no) | 47 |
Page | pp.pp.- |
#Pages | 11 |
Date of Issue |