Presentation | 2006-09-13 Re-Encryption Schemes with Applications to Data Storage : Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve Hirokazu OUGI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A method of managing encrypted file system using Re-encryption Scheme allows to transform a ciphertext computed under Alice's public key into one that can be opened by Bob's secret key. There are many useful applications of this primitive. This paper presents new Re-Encryption Scheme that a set of colluding delegatees provided with re-encryption key can not re-delegate decryption rights. This Scheme operates over the torsion subgroup in an elliptic curve. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Re-Encryption / Public-key / Collusion / Elliptic-curve |
Paper # | ISEC2006-81 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2006/9/6(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Re-Encryption Schemes with Applications to Data Storage : Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve |
Sub Title (in English) | |
Keyword(1) | Re-Encryption |
Keyword(2) | Public-key |
Keyword(3) | Collusion |
Keyword(4) | Elliptic-curve |
1st Author's Name | Hirokazu OUGI |
1st Author's Affiliation | Mebius Corporation() |
Date | 2006-09-13 |
Paper # | ISEC2006-81 |
Volume (vol) | vol.106 |
Number (no) | 235 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |