Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM
Document Type and Number:
WIPO Patent Application WO/2014/184894
Kind Code:
A1
Abstract:
The purpose of the present invention is to provide predicate encryption that can keep attribute information set in encrypted text and predicate information set in a decryption key secret even with public key settings. An encryption device (200) generates encrypted text (ctx) in which attribute information (x) is set as a coefficient for a base vector for a base (D). A mediation device (300) generates encrypted text (CTx) by converting the base (D) for the encrypted text (ctx) generated by the encryption device (200) to a base (B) using conversion information (W). A decryption device (400) decrypts the encrypted text (CTx) generated by the mediation device (300) by a token (tkv) that sets predicate information (v) as a base vector coefficient for a base (B*) corresponding to the base (B).

Inventors:
TAKASHIMA KATSUYUKI (JP)
KAWAI YUTAKA (JP)
Application Number:
PCT/JP2013/063538
Publication Date:
November 20, 2014
Filing Date:
May 15, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MITSUBISHI ELECTRIC CORP (JP)
International Classes:
G09C1/00
Other References:
KATSUYUKI TAKASHIMA ET AL.: "Functional Encryption : the Latest Technology for Controlling Access Privilege", NIKKEI ELECTRONICS, vol. 1087, 23 July 2012 (2012-07-23), pages 87 - 95, XP008180973
TATSUAKI OKAMOTO ET AL.: "Adaptively Attribute- Hiding (Hierarchical) Inner Product Encryption", 3 October 2011 (2011-10-03), XP047328725, Retrieved from the Internet [retrieved on 20130612]
SACHIHIRO ICHIKAWA ET AL.: "Shikko o Koryo shita Kansugata Ango System", 2012 DAI 29 KAI SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY YOKOSHU (CD-ROM), 30 January 2012 (2012-01-30), pages 3D1 - 3, XP008180847
NORI MATSUDA ET AL.: "Kansugata Ango ni Okeru IC Card-jo no Fukugo Enzan no Koritsuka ni Kansuru Kosatsu", 2013 NEN SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY GAIYOSHU CD-ROM, 22 January 2013 (2013-01-22), pages 3F3 - 5
YUTAKA KAWAI ET AL.: "Fully-Anonymous Functional Proxy-Re-Encryption", 2 June 2013 (2013-06-02), XP061008268, Retrieved from the Internet [retrieved on 20130612]
EMILY SHEN; ELAINE SHI; BRENT WATERS: "Predicate privacy in encryption systems", vol. 5444, 2009, SPRINGER, pages: 457 - 473
ALLISON B. LEWKO; TATSUAKI OKAMOTO; AMIT SAHAI; KATSUYUKI TAKASHIMA; BRENT WATERS: "EUROCRYPT 2010, volume 6110 of LNCS", vol. 6110, 2010, SPRINGER, article "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption", pages: 62.91
OKAMOTO, T.; TAKASHIMA, K.: "CANS 2011, LNCS", vol. 7092, 2011, SPRINGER HEIDELBERG, article "Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption", pages: 138 - 159
OKAMOTO, T; TAKASHIMA, K., FULLY SECURE UNBOUNDED INNER-PRODUCT AND ATTRIBUTE-BASED ENCRYPTION, Retrieved from the Internet
See also references of EP 2998948A4
Attorney, Agent or Firm:
MIZOI, Shoji et al. (JP)
Shoji Mizoi (JP)
Download PDF: