Improved encrypted/decrypted content, and method and apparatus for issuing encrypted content

A content key, content technology, applied in encryption device with shift register/memory, key distribution

Active Publication Date: 2015-06-03
HONG KONG APPLIED SCI & TECH RES INST
View PDF3 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, sharing a content key with a content consumer increases the likelihood that the content consumer will be able to decrypt other content that the content creator has encrypted, or allows the content consumer to access information that the content creator does not want the content consumer to see. Content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved encrypted/decrypted content, and method and apparatus for issuing encrypted content
  • Improved encrypted/decrypted content, and method and apparatus for issuing encrypted content
  • Improved encrypted/decrypted content, and method and apparatus for issuing encrypted content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 is a ladder diagram of a system 100 for encrypting content and storing the encrypted content of one embodiment. Such as figure 1 As shown, the system 100 includes a first device 110 and a second device 120 . In one embodiment, the first device 110 and the second device 120 may be communicatively connected through wired or wireless links provided by one or more wired and / or wireless networks. The first device 110 may use proxy re-encryption (PRE) and double hash chaining techniques to generate and encrypt content, and store the encrypted content in the second device 120, which will be described in more detail below. In addition, the first device 110 can also verify the figure 1 not shown in ) request to access the encrypted content stored on the second device 120, and generate an authorization certificate, allowing another device to fine-grained access (fine grained access) to the specific encrypted content stored in the second device 120 , please refer to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses improved encrypted / decrypted contents, and a method and apparatus for issuing encrypted contents. In one embodiment, a first device encrypts contents by using a dual hash chain technology. The first device maintains forward hash chains. A second device maintains reverse hash chains. A content key for encrypting contents is guided out through forward and reverse hash chain values. The second device dose not know seeds used for generating forward hash chains and thus a content key cannot be produced, therefore, encrypted contents are less liable to leak. Moreover, the invention provides a technology for re-encrypting contents through a proxy re-encryption (PRE) technology. In this way, encrypted contents can be provided to a request device for decryption with need of forward and reverse hash chains. Furthermore, the invention provides a technology, having a fine-grained access control function, for issuing encrypted contents to the request device.

Description

【Technical field】 [0001] The present invention relates to content encryption technology. More specifically, the present invention relates to encryption techniques using dual hash chains and proxy re-encryption for sharing encrypted content. 【Background technique】 [0002] Content encryption technology has been widely used for secure storage and distribution or sharing of content between content creators and content consumers. As the application of encryption continues to grow, the complexity of various encryption techniques also increases, and thus the computing resources required to encrypt and / or decrypt content also increase, and the computational cost of encrypting and / or decrypting content also increases. Furthermore, when content encrypted by a content creator is distributed to or shared with a content consumer, the content consumer must be provided with a content key that allows the content consumer to decrypt the content. However, sharing a content key with a conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0819H04L9/0861H04L9/088H04L9/0891H04L2209/601H04L2209/76H04L9/3247H04L9/50
Inventor 陈镇辉韩文明
Owner HONG KONG APPLIED SCI & TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products