Presentation 1996/5/20
How to Protect Data and Delegated Keys in Digital Distribution
Masahiro MAMBO, Yoshinori YAMANE, Kouichi SAKURAI, Eiji OKAMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A cryptography is quite effective for protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, there should be a method to convert the encrypted information into a form to be read only by an admissible user. Although such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen. In this paper we propose secure digital distribution systems by which encrypted information is directly transformed into a ciphertext of an arbitrary admissible user. We show that techniques of a proxy cryptosystem and a blind decoding system are useful to establish these distribution systems.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Digital Distribution System / Proxy Cryptosystem / Blind Decoding / RSA Cryptosystem / ElGamal Cryptosystem / Secrecy
Paper # ISEC96-6
Date of Issue

Conference Information
Committee ISEC
Conference Date 1996/5/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) How to Protect Data and Delegated Keys in Digital Distribution
Sub Title (in English)
Keyword(1) Digital Distribution System
Keyword(2) Proxy Cryptosystem
Keyword(3) Blind Decoding
Keyword(4) RSA Cryptosystem
Keyword(5) ElGamal Cryptosystem
Keyword(6) Secrecy
1st Author's Name Masahiro MAMBO
1st Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology()
2nd Author's Name Yoshinori YAMANE
2nd Author's Affiliation Dept. of Computer and Communication Engineering, Kyushu University
3rd Author's Name Kouichi SAKURAI
3rd Author's Affiliation Dept. of Computer and Communication Engineering, Kyushu University
4th Author's Name Eiji OKAMOTO
4th Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology
Date 1996/5/20
Paper # ISEC96-6
Volume (vol) vol.96
Number (no) 47
Page pp.pp.-
#Pages 11
Date of Issue