A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques

被引:0
作者
Hatano, Yasuo [1 ,2 ]
Miyazaki, Kunihiko [1 ]
Kaneko, Toshinobu [2 ]
机构
[1] Hitachi Ltd, Syst Dev Lab, Totsuka Ku, 292 Yoshida Cho, Yokohama, Kanagawa 2440817, Japan
[2] Tokyo Univ Sci, Fac Sci & Technol, Chiba 2788510, Japan
来源
2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009) | 2009年
关键词
SANITIZABLE SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sensitive information, e.g., privacy information or company secret, should be carefully managed and it is desired that only privileged users can read and edit these kinds of information. For these needs, this paper proposes cryptographic schemes for a proper use of digital document and a concrete construction for the proposed schemes. Note that the proposed schemes are called "Content Protection Schemes(CPSs)" in this paper The proposed schemes enable a sender to decide an access control, i.e., read-write protection, on a document by public keys of recipients and a recipient can read or edit a part of the document according to the access control without any help of neither the sender nor any trusted entity. The concrete construction proposed in this paper consists of only standard cryptographic techniques. This means that the proposed construction can be easily implemented by a standard cryptographic library and that users do not need to prepare a special key set for the proposed schemes. Since the proposed schemes control the read-write protection on a digital document by private keys of recipients, they can promote proper use of digital document even if we could not manage them on a server.
引用
收藏
页码:945 / 952
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2007CSEC039 IPSJ SIG
[2]  
[Anonymous], 1803312005 ISOIEC
[3]  
[Anonymous], FED INF PRO IN PRESS
[4]  
[Anonymous], FED INF PROC STAND P
[5]  
[Anonymous], FED INF PROC STAND P
[6]  
[Anonymous], PKCS 1 RSA CRYPT STA
[7]  
[Anonymous], ISEC200788 IEICE
[8]  
[Anonymous], NIST SPEC PUBL
[9]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
[10]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718