Information delivery system

A technology for information release and information generation, which is applied in the field of information release methods and programs, and can solve problems such as being unable to see confidential data content

Inactive Publication Date: 2016-07-06
MITSUBISHI ELECTRIC CORP
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the administrator of the server cannot see the contents of the confidential data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information delivery system
  • Information delivery system
  • Information delivery system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0048] In Embodiment 1, an information distribution system 500 (information distribution method) will be described as the most secure method: In addition to the fact that the server cannot obtain the user's private key, the server cannot impersonate the PKG and forge the master public key at will. Key and user secret key are sent to the user.

[0049] First, as a premise for describing the functional configuration of the information distribution system 500 of this embodiment, the configuration of the information distribution system 500, functional encryption, and searchable encryption will be described.

[0050] figure 1 It is a figure which shows an example of the structure of the information delivery system 500 of this Embodiment 1.

[0051] like figure 1 As shown, the information distribution system 500 has: a PKG104 (information generation device) that generates information such as a public key, a secret key, a master public key, a master secret key, and a user secret ke...

Embodiment approach 2

[0215] In this embodiment, differences from Embodiment 1 will be mainly described.

[0216]In this embodiment, an information distribution system 500a that is partially different from the information distribution system 500 described in Embodiment 1 will be described.

[0217] Portions having the same functions and operations as those described in Embodiment 1 may be denoted by the same reference numerals, and description thereof will be omitted.

[0218] In this embodiment, a method is disclosed in which the server 103 restricts illegal activities such as key forgery and storage data theft by the server administrator's agreement, capabilities, or intentions in some form. , compared with Embodiment 1, the server 103 is prevented from obtaining the user's private key more efficiently in terms of the number of steps or the number of data.

[0219] Figure 13 It is a flowchart showing the procedure of the system startup process in the information distribution system 500a of thi...

Embodiment approach 3

[0269] In this embodiment, differences from Embodiments 1 and 2 will be mainly described.

[0270] In this embodiment, an information distribution system 500b that is partially different from the information distribution systems 500 and 500a described in Embodiments 1 and 2 will be described.

[0271] Parts having the same functions and operations as those of the constituent parts described in Embodiments 1 and 2 are sometimes assigned the same reference numerals, and their descriptions are omitted.

[0272] In this embodiment, a method is disclosed in which the server 103 cannot obtain the user's private key more efficiently by using the user's password.

[0273] In addition, as a premise of this embodiment, in a general system, it is necessary to understand the fact that, when authentication of a password is performed, authentication is performed by comparing the hash value of the password, not the password itself. That is, the hash value of the password is stored on the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A user terminal (102) comprises a common key storage unit that stores a common key into a terminal-side storage device. A PKG (104) receives the common key and encrypts, by use of the received common key, and transmits information as encrypted information to a server (103). The server (103) comprises an encrypted information storage unit that stores, into a server -side storage device, the encrypted information received from the PKG (104). The server (103) further comprises an information transmission unit that, upon reception of an information delivery request from the user terminal (102), transmits, to the user terminal (102), the encrypted information stored in the server-side storage device. The user terminal (102) further comprises a decryption unit that decrypts, by use of the common key stored in the terminal-side storage device, the received encrypted information, thereby acquiring the information.

Description

technical field [0001] The present invention relates to an information distribution system, a server device, an information generation device, a terminal device, an information distribution method, and a program, and more particularly, to an information distribution system, a server device, an information generation device, a terminal device, an information distribution method, and a program capable of safely distributing information . Background technique [0002] As a new encryption technology in the field of public key encryption, an encryption method called functional encryption is attracting attention. Functional encryption is an encryption scheme characterized by the ability to flexibly set conditions for decrypting ciphertext. Depending on how conditions are attached, functional encryption includes ID-based encryption, attribute-based encryption, and inner-product predicate encryption. Also, searchable encryption is known as an application of functional encryption, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/3226H04L9/0822H04L9/0825H04L9/0894H04L9/006H04L9/0863H04L9/14H04L9/3263H04L9/302H04L63/0428H04L63/06H04L63/0823H04L63/083
Inventor 服部充洋松田规小宫崇木幡康博滨田刚
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products