Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

Abstract : Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.
Type de document :
Communication dans un congrès
Ismail Khalil; Erich Neuhold; A Min Tjoa; Li Da Xu; Ilsun You. 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. Springer, Lecture Notes in Computer Science, LNCS-9357, pp.255-264, 2015, Information and Communication Technology. 〈10.1007/978-3-319-24315-3_26〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01466227
Contributeur : Hal Ifip <>
Soumis le : lundi 13 février 2017 - 14:31:24
Dernière modification le : mardi 14 février 2017 - 01:07:56
Document(s) archivé(s) le : dimanche 14 mai 2017 - 14:13:05

Fichier

978-3-319-24315-3_26_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. Ismail Khalil; Erich Neuhold; A Min Tjoa; Li Da Xu; Ilsun You. 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. Springer, Lecture Notes in Computer Science, LNCS-9357, pp.255-264, 2015, Information and Communication Technology. 〈10.1007/978-3-319-24315-3_26〉. 〈hal-01466227〉

Partager

Métriques

Consultations de la notice

154

Téléchargements de fichiers

7