Mitsubishi Electric Corporation (20240323009). ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM simplified abstract

From WikiPatents
Jump to navigation Jump to search

ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM

Organization Name

Mitsubishi Electric Corporation

Inventor(s)

Yutaka Kawai of Tokyo (JP)

ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240323009 titled 'ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM

Simplified Explanation

The patent application describes an encryption unit within an encryption apparatus that generates a key and ciphertext based on a user secret key and a set of attributes. It encrypts a decryption-possible condition using a combination of attribute-based encryption and post-quantum cryptography, creating decryption-possible verification parameters for the user secret key.

  • An encryption unit within an encryption apparatus generates a key and ciphertext based on a user secret key and attributes.
  • It combines attribute-based encryption and post-quantum cryptography to encrypt a decryption-possible condition.
  • Decryption-possible verification parameters are created for the user secret key.

Potential Applications

This technology could be used in secure communication systems, data protection tools, and access control mechanisms where strong encryption and decryption verification are required.

Problems Solved

This technology addresses the need for secure encryption and decryption processes, especially in scenarios where sensitive information must be protected from unauthorized access.

Benefits

The benefits of this technology include enhanced data security, improved privacy protection, and robust encryption methods that can withstand potential attacks.

Commercial Applications

  • Secure messaging applications
  • Data storage solutions
  • Access control systems

Questions about Encryption Technology

How does this encryption technology differ from traditional encryption methods?

This encryption technology combines attribute-based encryption and post-quantum cryptography to enhance security and create decryption-possible verification parameters for user secret keys.

What are the potential implications of using post-quantum cryptography in encryption processes?

Post-quantum cryptography offers enhanced security against potential quantum computing threats, making encryption more robust and future-proof.


Original Abstract Submitted

an encryption unit () that an encryption apparatus () includes, when a user secret key sk� is generated using a secret key msk of attribute based encryption and a set of attributes � corresponding to a decryption-possible condition l, generates a key k and a ciphertext p corresponding to the key k by encrypting the decryption-possible condition l using, as an encryption key of the attribute based encryption, a key pk consisting of a public key mpk corresponding to the secret key msk and a public key pqcpk of post quantum cryptography, regards a part of the ciphertext p where the decryption-possible condition l is encrypted based on a secret value as p-d, regards a part of the ciphertext p where the secret value that is shared is encrypted as p-ss, and generates k′ and p′-d by randomizing each of the key k and the p-d using a random number r, and generates a ciphertext c by encrypting data consisting of the p-d and the random number r using the public key pqcpk. here, the p-ss, the p′-d, and the k′ are decryption-possible verification parameters corresponding to the user secret key sk�.