Protection of data and delegated keys in digital distribution

Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A cryptography is quite effective in protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, we need an additional mechanism for converting the encrypted information into a form accessible only to an admissible user. Even though such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen during the re-encryption. In this paper we examine secure digital distribution systems, information storage system and information provider system, in which encrypted information is directly transformed into a ciphertext of an admissible user. We show that the technique of a proxy cryptosystem is useful for establishing these distribution systems. Proposed protocols can be constructed base on the EIGamal cryptosystem or the RSA cryptosystem. Meanwhile, a blind decryption protocol provides privacy protection with respect to the selection of a ciphertext to be decrypted. In terms of digital distribution it also provides a secure information delivery. An information provider system using a blind decryption protocol possesses a problem such that a decrypting person computes exponentiation for a message freely selected by a requesting person. For such an oracle problem, a solution is known with use of a transformable signature. In this paper we show another measure prohibiting the abuse of the blind decryption protocol.

Original languageEnglish
Title of host publicationInformation Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings
EditorsJosef Pieprzyk, Vijay Varadharajan, Yi Mu
PublisherSpringer Verlag
Pages271-282
Number of pages12
ISBN (Print)3540632328, 9783540632320
DOIs
Publication statusPublished - Jan 1 1997
Event2nd Australasian Conference on Information Security and Privacy, ACISP 1997 - Sydney, Australia
Duration: Jul 7 1997Jul 9 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1270
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd Australasian Conference on Information Security and Privacy, ACISP 1997
CountryAustralia
CitySydney
Period7/7/977/9/97

Fingerprint

Cryptography
Encryption
Information Systems
Distribution System
Cryptosystem
Person
RSA Cryptosystem
Privacy Protection
Exponentiation
Storage System
Consecutive
Receiver
Signature
Data storage equipment
Arbitrary

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Mambo, M., Okamoto, E., & Sakurai, K. (1997). Protection of data and delegated keys in digital distribution. In J. Pieprzyk, V. Varadharajan, & Y. Mu (Eds.), Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings (pp. 271-282). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1270). Springer Verlag. https://doi.org/10.1007/BFb0027934

Protection of data and delegated keys in digital distribution. / Mambo, Masahiro; Okamoto, Eiji; Sakurai, Kouichi.

Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. ed. / Josef Pieprzyk; Vijay Varadharajan; Yi Mu. Springer Verlag, 1997. p. 271-282 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mambo, M, Okamoto, E & Sakurai, K 1997, Protection of data and delegated keys in digital distribution. in J Pieprzyk, V Varadharajan & Y Mu (eds), Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1270, Springer Verlag, pp. 271-282, 2nd Australasian Conference on Information Security and Privacy, ACISP 1997, Sydney, Australia, 7/7/97. https://doi.org/10.1007/BFb0027934
Mambo M, Okamoto E, Sakurai K. Protection of data and delegated keys in digital distribution. In Pieprzyk J, Varadharajan V, Mu Y, editors, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Springer Verlag. 1997. p. 271-282. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/BFb0027934
Mambo, Masahiro ; Okamoto, Eiji ; Sakurai, Kouichi. / Protection of data and delegated keys in digital distribution. Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. editor / Josef Pieprzyk ; Vijay Varadharajan ; Yi Mu. Springer Verlag, 1997. pp. 271-282 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{82d3973b0d6c4c98b9786de9265274c4,
title = "Protection of data and delegated keys in digital distribution",
abstract = "A cryptography is quite effective in protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, we need an additional mechanism for converting the encrypted information into a form accessible only to an admissible user. Even though such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen during the re-encryption. In this paper we examine secure digital distribution systems, information storage system and information provider system, in which encrypted information is directly transformed into a ciphertext of an admissible user. We show that the technique of a proxy cryptosystem is useful for establishing these distribution systems. Proposed protocols can be constructed base on the EIGamal cryptosystem or the RSA cryptosystem. Meanwhile, a blind decryption protocol provides privacy protection with respect to the selection of a ciphertext to be decrypted. In terms of digital distribution it also provides a secure information delivery. An information provider system using a blind decryption protocol possesses a problem such that a decrypting person computes exponentiation for a message freely selected by a requesting person. For such an oracle problem, a solution is known with use of a transformable signature. In this paper we show another measure prohibiting the abuse of the blind decryption protocol.",
author = "Masahiro Mambo and Eiji Okamoto and Kouichi Sakurai",
year = "1997",
month = "1",
day = "1",
doi = "10.1007/BFb0027934",
language = "English",
isbn = "3540632328",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "271--282",
editor = "Josef Pieprzyk and Vijay Varadharajan and Yi Mu",
booktitle = "Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Protection of data and delegated keys in digital distribution

AU - Mambo, Masahiro

AU - Okamoto, Eiji

AU - Sakurai, Kouichi

PY - 1997/1/1

Y1 - 1997/1/1

N2 - A cryptography is quite effective in protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, we need an additional mechanism for converting the encrypted information into a form accessible only to an admissible user. Even though such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen during the re-encryption. In this paper we examine secure digital distribution systems, information storage system and information provider system, in which encrypted information is directly transformed into a ciphertext of an admissible user. We show that the technique of a proxy cryptosystem is useful for establishing these distribution systems. Proposed protocols can be constructed base on the EIGamal cryptosystem or the RSA cryptosystem. Meanwhile, a blind decryption protocol provides privacy protection with respect to the selection of a ciphertext to be decrypted. In terms of digital distribution it also provides a secure information delivery. An information provider system using a blind decryption protocol possesses a problem such that a decrypting person computes exponentiation for a message freely selected by a requesting person. For such an oracle problem, a solution is known with use of a transformable signature. In this paper we show another measure prohibiting the abuse of the blind decryption protocol.

AB - A cryptography is quite effective in protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, we need an additional mechanism for converting the encrypted information into a form accessible only to an admissible user. Even though such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen during the re-encryption. In this paper we examine secure digital distribution systems, information storage system and information provider system, in which encrypted information is directly transformed into a ciphertext of an admissible user. We show that the technique of a proxy cryptosystem is useful for establishing these distribution systems. Proposed protocols can be constructed base on the EIGamal cryptosystem or the RSA cryptosystem. Meanwhile, a blind decryption protocol provides privacy protection with respect to the selection of a ciphertext to be decrypted. In terms of digital distribution it also provides a secure information delivery. An information provider system using a blind decryption protocol possesses a problem such that a decrypting person computes exponentiation for a message freely selected by a requesting person. For such an oracle problem, a solution is known with use of a transformable signature. In this paper we show another measure prohibiting the abuse of the blind decryption protocol.

UR - http://www.scopus.com/inward/record.url?scp=84957916742&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84957916742&partnerID=8YFLogxK

U2 - 10.1007/BFb0027934

DO - 10.1007/BFb0027934

M3 - Conference contribution

AN - SCOPUS:84957916742

SN - 3540632328

SN - 9783540632320

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 271

EP - 282

BT - Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings

A2 - Pieprzyk, Josef

A2 - Varadharajan, Vijay

A2 - Mu, Yi

PB - Springer Verlag

ER -