Re-encryption method, re-encryption system and re-encryption device

A technology for re-encrypting and encrypting keys, which is applied in transmission systems, electrical components, etc.

Inactive Publication Date: 2019-01-11
HITACHI LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] That is, there is a problem that the following situation cannot be ruled out. Even the administrator of the storage server who does not have the data viewing authority can decrypt the encrypted data using the encryption key stored in the server and browse the plaintext data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Re-encryption method, re-encryption system and re-encryption device
  • Re-encryption method, re-encryption system and re-encryption device
  • Re-encryption method, re-encryption system and re-encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] system structure

[0048] Hereinafter, embodiments of the present invention will be described in detail using the drawings. figure 1 It is a diagram showing an example of the overall configuration of the re-encryption system 1 including the re-encryption device 20 according to this embodiment. In this figure, an example of the functional configuration of each computer constituting the re-encryption system 1 is shown together with the overall configuration. figure 1 The shown re-encryption system 1 is in an environment in which the re-encryption device 20 (predetermined device) saves encrypted data shared among a plurality of users and manages the viewing authority of each user, so that the re-encryption device 20 is definitely avoided. A system where unauthorized persons including administrators can read encrypted data.

[0049] In the re-encryption system 1 of this embodiment, a plurality of user terminals 10 (in this embodiment, in order to distinguish between a plu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a re-encryption method, a re-encryption system and a re-encryption device. The re-encryption system (1) comprise the re-encryption device (20) which receives first encryption data obtained by a first encryption secret key of a data manufacturer from a user terminal of the data manufacturer, receives second encryption data and third encryption data obtained by encryption on the first encryption secret key and predetermined data generated from the first encryption secret key through a predetermined algorithm respectively through commutative encryption algorithms and is capable of using a decryption secret key of a user having a browsing authority to carry out re-encryption on the second encryption data and the third encryption data in a decryption manner; and a user terminal (10) which obtained the first encryption data and the re-encrypted second encryption data and third encryption data from the re-encryption device (20), decodes the first encryption secret key from the re-encrypted second encryption data through a decryption secret key of itself, and decrypts the first encryption data through the first encryption secret key so as to output a plaintext.

Description

technical field [0001] The present invention relates to a re-encryption method, a re-encryption system, and a re-encryption device. Specifically, it relates to an environment in which each user's viewing authority is managed by storing encrypted data shared among a plurality of users by a predetermined device. , A technology that reliably prevents unauthorized persons including device administrators from viewing encrypted data. Background technique [0002] In a situation where encrypted data stored in a server, etc. is shared among multiple users, even if the access right of a certain user is invalidated, if the user still has the decryption key for decrypting the encrypted data, it is possible to allow access from the user. Viewing of encrypted data. In order to prevent browsing by such a user whose access right has expired, it is necessary to re-encrypt encrypted data using another encryption key. [0003] For encryption in this case, for example, the encrypted data is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478
Inventor 坂崎尚生乡尚子
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products