Monday, March 02, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Jolla Introduces Sailfish OS 2.0
MWC: Fujitsu Develops Smartphone with Iris Authentication
NXP and Freescale Announce $40 Billion Merger
Toshiba Launched TransferJet Adapter for iPhone, iPad and iPod in Europe
Blu-ray Players Could Install Malware
MWC: ARCHOS Announces First 256 GB Android Tablet
New PowerVR G6020 And PowerVR Series5 Video Encoders Targets IoT And Mobile Devices
Qualcomm Previews The Next-Generation of Snapdragon Processor At MWC 2015
Active Discussions
Need serious help!!!!
burning
nvidia 6200 review
Hello
Burning Multimedia in track 0
I'm lazy. Please help.
sanyo e6 camera
need help on some cd burning...
 Home > News > General Computing > NTT and...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, July 28, 2010
NTT and Mitsubishi Electric Develop Advanced Encryption Scheme Cloud Computing Systems


Nippon Telegraph and Telephone Corporation and Mitsubishi Electric today announced that they have developed a new advanced encryption (fine-grained encryption) scheme expected to become a potential solution to the security risks in cloud computing.

The new encryption scheme achieves advanced logic in the encryption-decryption mechanism, which enables sophisticated and fine-grained data transmission/access control.

Cloud computing networks transmit private or confidential information to the server to process, which demands higher security than current systems that use symmetric and public key encryption to maintain network security.

NTT and Mitsubishi Electric have successfully developed a new fine-grained encryption scheme with the most advanced logic as an encryption-decryption mechanism. This scheme, developed using a mathematical approach called the "dual pairing vector spaces," will allow network users to maintain highly confidential information encrypted even in cloud computing environments.

The field of cryptography has recently seen wide use of "bilinear groups" on an elliptic curve, in applications such as ID based encryption, fine-grained encryption and others. By using a direct product of bilinear groups, it is possible to construct "dual pairing vector spaces" with a richer algebraic structure than that of a bilinear group itself. Because of this property, rich cryptographic "trapdoors" can now be realized. NTT and Mitsubishi Electric introduced the concept of "Dual pairing vector spaces" in 2009, and today's new encryption scheme has been constructed by using the vector spaces.

The two companies now plan to study how to efficiently implement and utilize this scheme for various applications.

Main features of the new fine-grained encryption scheme

1. Achieving the most general logic

For the past few years, fine-grained encryption has attracted many researchers in the field of cryptography. The new, fine-grained encryption scheme by the two companies achieves the most advanced logic that comprehends those of the existing fine-grained encryption schemes. This logic can be realized by comprising AND, OR, NOT and threshold gates.

One of the most significant achievements is that the NOT gate is now available, allowing cloud computing systems to manage databases easily and flexibly in cases of change in user attributes and other information.

2. Available to a variety of applications

In fine-grained encryption, a variety of parameters are added to the ciphertext and decryption key in the encryption-decryption logic. In this logic, attributes and predicates on them become the parameter of the ciphertext or decryption key. The newly developed encryption scheme is available to a variety of applications because it is capable of being used in either of the following forms: (1) attributes as the parameter of the decryption key, predicates as that of the ciphertext, and (2) attributes as the parameter of the ciphertext, predicates as that of the decryption key.

In case (1), various access conditions will be set in detail for each encrypted data in a cloud computing database, and a user will be able to decrypt and access the data by using the decryption key when the attributes of the decryption key satisfy the pre-set predicates in the ciphertext. Applications include confidential document management systems in firms, as well as personal information database management by public organizations. For confidential document management systems in firms, for example, each document will be set by a predicate that describes the attributes of users allowed to decrypt the encrypted document. The document and its predicate as a set will then be encrypted and placed in a cloud computing database. The encrypted document will only be able to be decrypted and accessed by an employee who has a decryption key associated with some attributes, when the decryption key?s attributes satisfy the predicate pre-set in the encrypted document.

Meanwhile, in case (2), data and attributes will be encrypted as a set when it is managed by the cloud computing system, and each user can only decrypt and read the data if the attributes of the encrypted data satisfy the predicate in the decryption key. Applications include content distribution as well as database management in finance or medical fields. In the content distribution, for example, content providers will encrypt contents like animation, films and others with its attributes and place the encrypted contents in a cloud computing database. The audience will then view the contents by decrypting it using the decryption key when the contents' attributes satisfy the decryption key?s predicates.


Previous
Next
Roxio Releases Retrospect 8.2 for Mac        All News        Elpida Develops Smallest 2-Gigabit DDR2 Mobile RAM
Roxio Releases Retrospect 8.2 for Mac     General Computing News      EC to Inverstigate IBM's Dominant Market Position

Get RSS feed Easy Print E-Mail this Message

Related News
Mitsubishi Introduces Smart Home Concept
Mitsubishi Develops 3-D Model Reconstruction Technology
Mitsubishi Electric, Ritsumeikan University and JST Develop Security Solution for IoT Devices
Cloud Cryptographic Algorithm Protects Personal Data
Mitsubishi Chemical Files Patent Lawsuit Against Red Phosphors in China
IBM Patents Cloud Privacy Engine
Mitsubishi To Unveil World's Largest High Definition Video Display
IBM and Microsoft to Collaborate on Hybrid Cloud Solutions
Microsoft And Dell Puts Azure In A Box
Mitsubishi Doubles OLED panel's Life Span
OneDrive Now Supports 10 GB files, iCloud Drive Slashes Prices
Microsoft Cloud Service Azure Experienced Global Outage

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .