Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.

Original languageEnglish
Title of host publicationInformation and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings
EditorsIlsun You, Li Da Xu, Erich Neuhold, A. Min Tjoa, Ismail Khalil
PublisherSpringer Verlag
Pages255-264
Number of pages10
ISBN (Print)9783319243146
DOIs
Publication statusPublished - 2015
Event3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015 - Daejeon, Korea, Republic of
Duration: Oct 4 2015Oct 7 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9357
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015
CountryKorea, Republic of
CityDaejeon
Period10/4/1510/7/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse'. Together they form a unique fingerprint.

  • Cite this

    Chen, C., Anada, H., Kawamoto, J., & Sakurai, K. (2015). Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse. In I. You, L. D. Xu, E. Neuhold, A. M. Tjoa, & I. Khalil (Eds.), Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings (pp. 255-264). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9357). Springer Verlag. https://doi.org/10.1007/978-3-319-24315-3_26