Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
RE-ENCRYPTED TEXT VERIFICATION PROGRAM, RE-ENCRYPTION DEVICE, AND RE-ENCRYPTION SYSTEM
Document Type and Number:
WIPO Patent Application WO/2013/145796
Kind Code:
A1
Abstract:
In a decryption device of an embodiment according to the present invention, a retaining means pre-retains a portion of re-encrypted text data used in a re-encryption system, as well as a verification formula that holds true if a public key, which is used in encryption processing for encrypted text data prior to re-encryption processing of the re-encrypted text data, and a private key making it possible to decode the re-encrypted text data are plugged in. A determining means plugs the portion of re-encrypted text data received from the re-encryption device, the public key of a re-encryption key generation device fetched from a fourth storing means, and the private key of the decryption device into the verification formula, and performs calculation on the basis of the verification formula fetched from the storing means, and thereby determines whether or not the verification formula holds true. An outputting means outputs a verification success when the result of this determination is that the verification formula holds true.

Inventors:
FUJII YOSHIHIRO (JP)
YOSHIDA TAKUYA (JP)
OKADA KOJI (JP)
Application Number:
PCT/JP2013/050226
Publication Date:
October 03, 2013
Filing Date:
January 09, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TOSHIBA KK (JP)
TOSHIBA SOLUTIONS CORP (JP)
International Classes:
H04L9/08; G09C1/00; H04L9/32
Foreign References:
JP2011147047A2011-07-28
JP2011124853A2011-06-23
JP2011055309A2011-03-17
JP2008172736A2008-07-24
JP2004363779A2004-12-24
JP4010766B22007-11-21
Other References:
M. BLAZE; M. STRAUSS.: "Atomic Proxy Cryptography", AT&T LABS RESEARCH TR98.5.1, 1997
M. BLAZE; G. BLEUMER; M. STRAUSS: "Divertible Protocols and Atomic Proxy Cryptography", EUROCRYPT '98, LNCS, vol. 1403, 1998, pages 127 - 144
G. ATENIESE; K. FU; M. GREEN; S. HOHENBERGER: "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage", NDSS'05, 2005
B. LIBERT; D. VERGNAUD: "Tracing Malicious Proxies in Proxy Re-Encryption", PAIRING 2008, 2008
R. CANETTI; S. HOHENBERGER: "Chosen-Ciphertext Secure Proxy Re-Encryption", ACM CCS'07, 2005
M. GREEN; G. ATENIESE: "Identity-Based Proxy Re-encryption", ACNS '07, 2007
T. MATSUO: "Proxy Re-encryption Systems for Identity-based Encryption", PAIRING 2007, 2007
BENOIT LIBERT; DAMIEN VERGNAUD: "Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption", PUBLIC KEY CRYPTOGRAPHY, 2008, pages 360 - 279
G. ATENIESE; S. HOHENBERGER: "Proxy re-signature: new definitions, algorithm, and applications", ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2005, pages 310 - 319
A. MENEZES; P. VAN OORSCHOT; S. VANSTONE: "Handbook of Applied Cryptography", 1996, CRC PRESS
See also references of EP 2833573A4
Attorney, Agent or Firm:
KURATA, Masatoshi et al. (JP)
Masatoshi Kurata (JP)
Download PDF: