Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ENCRYPTION COMMUNICATION SYSTEM, ENCRYPTION COMMUNICATION METHOD, PROGRAM
Document Type and Number:
Japanese Patent JP2015126332
Kind Code:
A
Abstract:
PROBLEM TO BE SOLVED: To provide an encryption communication system for realizing a RKA-KDM-CCA secure public key encryption method.SOLUTION: The encryption communication system includes a parameter device, a key generation device, an encryption device, and a decryption device. The parameter device outputs a condition parameter and a common parameter. The key generation device outputs a secret key and a public key with the common parameter as an input. The encryption device outputs an encrypted text with the common parameter, the public key, and a message as inputs. The decryption device outputs a rejection symbol or a message with the common parameter, an interpolation secret key, and the encrypted text as inputs.

Inventors:
KUSAKAWA KEITA
Application Number:
JP2013268708A
Publication Date:
July 06, 2015
Filing Date:
December 26, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NIPPON TELEGRAPH & TELEPHONE
International Classes:
H04L9/08; G06F21/62
Other References:
JPN6016050307; Hofheinz, D.: 'Circular chosen-ciphertext security with compact ciphertexts' Cryptology ePrint Archive Report 2012/150, 20130119, [online]
JPN6016050308; Bohl, H., Davies G. T. and Hofheinz, D.: 'RKA-KDM secure encryption from public-key encryption' Cryptology ePrint Archive Report 2013/653, 20131203, [online]
JPN6015043592; Bellare, M., Paterson, G. and Thomson, S.: 'RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures' Cryptology ePrint Archive Report 2012/514, 201209, [online]
JPN6015043594; Wee, H.: 'Public Key Encryption against Related Key Attacks' Lecture Notes in Computer Science Vol,7293, 201205, p.262-279
JPN6015043597; Applebaum, B., Harnik, D. and Ishai, Y.: 'Semantic Security Under Related-Key Attacks and Applications' Cryptology ePrint Archive Report 2010/544, 201010, [online]
JPN6015043598; Bellare, M. and Cash, D.: 'Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks' Lecture Notes in Computer Science Vol.6223, 201008, p.666-684
Attorney, Agent or Firm:
Naoki Nakao
Yukio Nakamura
Yoshimura Munehiro