ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 124 情報理工学系研究科
  2. 40 電子情報学専攻
  3. 1244020 博士論文(電子情報学専攻)
  1. 0 資料タイプ別
  2. 20 学位論文
  3. 021 博士論文

Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities

https://doi.org/10.15083/00002390
https://doi.org/10.15083/00002390
c77685f6-8a07-47a5-8af7-b736c9fa1c07
名前 / ファイル ライセンス アクション
nuttapong.pdf nuttapong.pdf (1.2 MB)
Item type 学位論文 / Thesis or Dissertation(1)
公開日 2012-03-01
タイトル
タイトル Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities
言語
言語 eng
キーワード
主題Scheme Other
主題 Cryptography
キーワード
主題Scheme Other
主題 Encryption
資源タイプ
資源 http://purl.org/coar/resource_type/c_46ec
タイプ thesis
ID登録
ID登録 10.15083/00002390
ID登録タイプ JaLC
その他のタイトル
その他のタイトル 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究
著者 Nuttapong, Attrapadung

× Nuttapong, Attrapadung

WEKO 6634

Nuttapong, Attrapadung

Search repository
著者別名
識別子Scheme WEKO
識別子 6635
姓名 ナッタポン, アッタラパドゥン
著者所属
著者所属 大学院情報理工学系研究科電子情報学専攻
Abstract
内容記述タイプ Abstract
内容記述 In this thesis, we study encryption schemes with various “high functionalities” including one specific focus on broadcast encryption. As for the main contributions, we propose a framework for constructing practical broadcast encryption schemes and a unified framework for public-key encryption with various functionalities. The first focus of the thesis is on a special but important kind of encryption schemes, namely broadcast encryption. Such a scheme has many useful applications; the most important one to be mentioned is the digital right management. More precisely, broadcast encryption enables the protection of digital contents such as copyrighted DVD. Such a technology is “inevitable” nowadays as modern advancements in communication infrastructure and digital storage technologies have, on one hand, enabled pervasive digital media distribution, but on the other hand, also allowed the spread of “pirate” contents to be done easier than ever before. There are some broadcast encryption schemes available in the literature; however, as the number of all users in the system tends to be increased, these existing solutions tend to be quite inefficient, and eventually cannot be used in the real-world application. Our focus is then to construct practical broadcast encryption schemes, which can be “scalable”, in the sense that the efficiency of scheme will not be affected by the increasing number of users. As a result of the research, we achieve this goal by constructing the first schemes whose the main two parameters, namely the ciphertext size and the private key size, are independent of the number of all users, while the computational cost is semi-scalable (namely, the cost is increasing but slowly as logarithmically). Behind this scheme, we proposed a theoretical framework that can be used to construct efficient schemes in a systematical way. The second topic shifts the research focus from the practical point of views to more theoretical ones and looked beyond to more general encryption schemes with “high functionalities”. The motivation came from the fact that in recent years, there have been many cryptographic primitives which extend the normal public-key encryption to achieve useful functionalities such as ID-based encryption, Key-insulated encryption, Forward-secure encryption, Certificate-less encryption, and many more. Each functionality is proved to be useful in different scenarios and applications thereof. Although being seemingly related primitives, there was no unified framework for defining or constructing them. In this work, we proposed a unified framework called Directed Acyclic Graph Encryption (DAGE) that unifies these highly-functional encryption primitives into a unified syntax, a unified security notion, and unified generic/specific constructions. More precisely, we reduce a specification of such a primitive to its necessary and sufficient information, which is turned out to be its underlying graph: by specifying a graph, the definition and constructions will be automatically induced by the framework. We also give a primitive implication theorem which gives a simple criterion whether a primitive implies another. In the theoretical point of view, the merits of the proposed framework are direct. It helps understanding the theoretical essences of the encryption schemes with high-functionalities from our unified characterization. This result simplifies the previous complicated researches into one piece. The result on the primitive implication theorem gives an automated verification of relations among primitives. This reduces the proof of relations which has to be performed based on complexity-theoretic approaches in the previous individual researches, which is quite complicated and can be verified only by human, to the logical-based approach, which is much simpler and can be verified automatedly by computer. The proposed generic construction implies the possibility result for arbitrary graphs. This has merits not only in the theoretical point of view but also in the practical point of view where the protocol designer can just specify a “tailor-made” graph for the on-purposed application and the implementation of the scheme will be prompted to use. Furthermore, any esoteric scheme featured with many combined functionalities can be directly implemented; for example, a forward-secure certificate-less public-key encryption with keyword-searchability. This is also something that previous works cannot achieve, particularly since there was no unified framework to cope with. For the third main topic, we focus on the combination of the above-mentioned two previous results: public-key broadcast encryption schemes that are simultaneously practical and feature high functionalities. To be able to attain such practical broadcast schemes, it is unavoidable to focus on more specific functionalities (not generic as in the second topic above). We focused on some most useful functionalities, namely forward-security and keyword-searchability. Forward-security enables the private-key updating and guarantees the security of the previously-encrypted ciphertexts even when the present-time private key is exposed. We presents the most practical and scalable forward-secure broadcast encryption so far in the literature. Keyword-searchability enables the search over encrypted data. It has a killer application of encrypted file sharing systems over public database. We presented the first such scheme in the literature.
書誌情報 発行日 2007-03-22
日本十進分類法
主題Scheme NDC
主題 007
学位名
学位名 博士(情報理工学)
学位
値 doctoral
学位分野
Information Science and Technology (情報理工学)
学位授与機関
学位授与機関名 University of Tokyo (東京大学)
研究科・専攻
Department of Information and Communication Engineering, Graduate School of Information Science and Technology (情報理工学系研究科電子情報学専攻)
学位授与年月日
学位授与年月日 2007-03-22
学位授与番号
学位授与番号 甲第22811号
学位記番号
博情第141号
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 19:58:34.681833
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3