TY - GEN
T1 - Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse
AU - Chen, Chunlu
AU - Anada, Hiroaki
AU - Kawamoto, Junpei
AU - Sakurai, Kouichi
N1 - Funding Information:
The second author is partially supported by Grants-in-Aid for Scientific Research of Japan Society for the Promotion of Science; Research Project Number:15K00029.
Funding Information:
The fourth author is partially supported by Grants-in-Aid for Scientific Research of Japan Society for the Promotion of Science; Research Project Number: 15H02711.
Publisher Copyright:
© IFIP International Federation for Information Processing 2015.
PY - 2015
Y1 - 2015
N2 - Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.
AB - Internet services make sharing digital contents faster and easier but raise an issue of illegal copying and distribution of those digital contents at the same time. A lot of public key encryption schemes solve this issue. However, the secret key is not completely protected i.e. these kinds of encryption methods do not prevent illegal copying and distribution of secret keys. In this paper, we propose a hybrid encryption scheme that employ terminal fingerprints. This scheme is a template to avoid such misuse of secret keys, and can be applied to, for example, attribute-based encryption schemes. There terminal fingerprint information is used to create a second encryption key and secret key. Since the terminal fingerprint is assumed to be unchangeable and unknowable, we ensure that our secret keys are valid in the terminal where such secret keys were created.
UR - http://www.scopus.com/inward/record.url?scp=84951039147&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84951039147&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-24315-3_26
DO - 10.1007/978-3-319-24315-3_26
M3 - Conference contribution
AN - SCOPUS:84951039147
SN - 9783319243146
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 255
EP - 264
BT - Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings
A2 - You, Ilsun
A2 - Xu, Li Da
A2 - Neuhold, Erich
A2 - Tjoa, A. Min
A2 - Khalil, Ismail
PB - Springer Verlag
T2 - 3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015
Y2 - 4 October 2015 through 7 October 2015
ER -