Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.

Original languageEnglish
Title of host publicationInformation and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings
EditorsIlsun You, Li Da Xu, Erich Neuhold, A. Min Tjoa, Ismail Khalil
PublisherSpringer Verlag
Pages255-264
Number of pages10
ISBN (Print)9783319243146
DOIs
Publication statusPublished - Jan 1 2015
Event3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015 - Daejeon, Korea, Republic of
Duration: Oct 4 2015Oct 7 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9357
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015
CountryKorea, Republic of
CityDaejeon
Period10/4/1510/7/15

Fingerprint

Computer terminals
Fingerprint
Encryption
Cryptography
Attribute
Copying
Public Key Encryption
Internet
Template
Sharing
Valid

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Chen, C., Anada, H., Kawamoto, J., & Sakurai, K. (2015). Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. In I. You, L. D. Xu, E. Neuhold, A. M. Tjoa, & I. Khalil (Eds.), Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings (pp. 255-264). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9357). Springer Verlag. https://doi.org/10.1007/978-3-319-24315-3_26

Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. / Chen, Chunlu; Anada, Hiroaki; Kawamoto, Junpei; Sakurai, Kouichi.

Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. ed. / Ilsun You; Li Da Xu; Erich Neuhold; A. Min Tjoa; Ismail Khalil. Springer Verlag, 2015. p. 255-264 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9357).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chen, C, Anada, H, Kawamoto, J & Sakurai, K 2015, Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. in I You, LD Xu, E Neuhold, AM Tjoa & I Khalil (eds), Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9357, Springer Verlag, pp. 255-264, 3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, Daejeon, Korea, Republic of, 10/4/15. https://doi.org/10.1007/978-3-319-24315-3_26
Chen C, Anada H, Kawamoto J, Sakurai K. Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. In You I, Xu LD, Neuhold E, Tjoa AM, Khalil I, editors, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. Springer Verlag. 2015. p. 255-264. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-24315-3_26
Chen, Chunlu ; Anada, Hiroaki ; Kawamoto, Junpei ; Sakurai, Kouichi. / Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. editor / Ilsun You ; Li Da Xu ; Erich Neuhold ; A. Min Tjoa ; Ismail Khalil. Springer Verlag, 2015. pp. 255-264 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{4a2c1145cfb14af086e7120e8b1c7e1c,
title = "Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse",
abstract = "Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.",
author = "Chunlu Chen and Hiroaki Anada and Junpei Kawamoto and Kouichi Sakurai",
year = "2015",
month = "1",
day = "1",
doi = "10.1007/978-3-319-24315-3_26",
language = "English",
isbn = "9783319243146",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "255--264",
editor = "Ilsun You and Xu, {Li Da} and Erich Neuhold and Tjoa, {A. Min} and Ismail Khalil",
booktitle = "Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

AU - Chen, Chunlu

AU - Anada, Hiroaki

AU - Kawamoto, Junpei

AU - Sakurai, Kouichi

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.

AB - Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.

UR - http://www.scopus.com/inward/record.url?scp=84951039147&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84951039147&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-24315-3_26

DO - 10.1007/978-3-319-24315-3_26

M3 - Conference contribution

SN - 9783319243146

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 255

EP - 264

BT - Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings

A2 - You, Ilsun

A2 - Xu, Li Da

A2 - Neuhold, Erich

A2 - Tjoa, A. Min

A2 - Khalil, Ismail

PB - Springer Verlag

ER -