Presentation | 2013-07-18 A Content Protection Method Using Secret Sharing and Attribute-Based Encryption Katsuma TAKIMOTO, Masaaki FUJIYOSHI, Shoko IMAIZUMI, Hitoshi KIYA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In a secret sharing scheme, a secret is once transformed to multiple meaningless information referred to as shares where shares are is managed by different parties. Parties gather to recover the secret, whereas there is no guarantee that a party bringing a share is the one who directly received the share from the dealer. This paper, thus, overcomes this problem by introducing attribute-based encryption where a trusted key issuer authenticates a user to issue a secret key for the user. The proposed method introduces share ID to the user attibute which is satisfied to decrypt a secret message. This makes a user holding his/her own share authenticated, and it simultaneously requires a collaboration of multiple users to decrypt encrypted content whereas this is not allowed in attribute-based encryption. This paper studies a flexible content management system which keeps the advantages of secret sharing and attibute-based encryption. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Public Key Encryption / Access Control / (k,n)-threshold / collusion |
Paper # | ISEC2013-27,SITE2013-22,ICSS2013-32,EMM2013-29 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2013/7/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Content Protection Method Using Secret Sharing and Attribute-Based Encryption |
Sub Title (in English) | |
Keyword(1) | Public Key Encryption |
Keyword(2) | Access Control |
Keyword(3) | (k,n)-threshold |
Keyword(4) | collusion |
1st Author's Name | Katsuma TAKIMOTO |
1st Author's Affiliation | Graduate School of System Design, Tokyo Metropolitan University() |
2nd Author's Name | Masaaki FUJIYOSHI |
2nd Author's Affiliation | Graduate School of System Design, Tokyo Metropolitan University |
3rd Author's Name | Shoko IMAIZUMI |
3rd Author's Affiliation | Graduate School of Advanced Integration Science, Chiba University |
4th Author's Name | Hitoshi KIYA |
4th Author's Affiliation | Graduate School of System Design, Tokyo Metropolitan University |
Date | 2013-07-18 |
Paper # | ISEC2013-27,SITE2013-22,ICSS2013-32,EMM2013-29 |
Volume (vol) | vol.113 |
Number (no) | 136 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |