WEKO3
アイテム
Using Auxiliary Helper Key in Key Insulated Public Key Encryption
http://hdl.handle.net/2261/28808
http://hdl.handle.net/2261/28808d4ccbf1d-f22f-4477-a04d-a0e66459cdbc
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学位論文 / Thesis or Dissertation(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2011-08-08 | |||||
タイトル | ||||||
タイトル | Using Auxiliary Helper Key in Key Insulated Public Key Encryption | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Key Insulated Public Key Encryption | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Auxiliary Helper Key | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_46ec | |||||
タイプ | thesis | |||||
その他のタイトル | ||||||
その他のタイトル | 補助鍵を用いた鍵隔離公開鍵暗号方式 | |||||
著者 |
Phan, Thi Lan Anh
× Phan, Thi Lan Anh |
|||||
著者別名 | ||||||
識別子Scheme | WEKO | |||||
識別子 | 5726 | |||||
姓名 | ファン, ティランアン | |||||
著者所属 | ||||||
著者所属 | 大学院情報理工学系研究科電子情報学専攻 | |||||
著者所属 | ||||||
著者所属 | Graduate School of Information Science and Technology Department of Information and Communication Engineering The University of Tokyo | |||||
Abstract | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated public key encryption (KIE), which uses the secure helper key to update the secret key more often and helps to minimize the damage overall. We take this idea further in improving the helper key security by introducing an auxiliary helper key besides of the main helper key. The auxiliary helper key is used less than the main helper key and can help the system to reduce the damage even in case of helper key exposure. This thesis give two different schemes of KIE with auxiliary helper key. There are trade-offs between public key length and ciphertext size, as well as between encryption algorithms and decryption algorithms in these two schemes. With these trade-offs, it is flexible to choose an efficient one to implement in reality. We also show concrete constructions with chosen-ciphertext security. The formal security proofs for all schemes are given in this thesis, based on the CBDH assumption in the random oracle model. | |||||
書誌情報 | 発行日 2008-03 | |||||
日本十進分類法 | ||||||
主題Scheme | NDC | |||||
主題 | 548 | |||||
学位名 | ||||||
学位名 | 修士(情報理工学) | |||||
学位 | ||||||
値 | master | |||||
研究科・専攻 | ||||||
情報理工学系研究科電子情報学専攻 | ||||||
学位授与年月日 | ||||||
学位授与年月日 | 2008-03-24 |