Presentation 2006-09-13
Re-Encryption Schemes with Applications to Data Storage : Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve
Hirokazu OUGI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A method of managing encrypted file system using Re-encryption Scheme allows to transform a ciphertext computed under Alice's public key into one that can be opened by Bob's secret key. There are many useful applications of this primitive. This paper presents new Re-Encryption Scheme that a set of colluding delegatees provided with re-encryption key can not re-delegate decryption rights. This Scheme operates over the torsion subgroup in an elliptic curve.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Re-Encryption / Public-key / Collusion / Elliptic-curve
Paper # ISEC2006-81
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/9/6(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Re-Encryption Schemes with Applications to Data Storage : Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve
Sub Title (in English)
Keyword(1) Re-Encryption
Keyword(2) Public-key
Keyword(3) Collusion
Keyword(4) Elliptic-curve
1st Author's Name Hirokazu OUGI
1st Author's Affiliation Mebius Corporation()
Date 2006-09-13
Paper # ISEC2006-81
Volume (vol) vol.106
Number (no) 235
Page pp.pp.-
#Pages 8
Date of Issue