Showing papers on "Attribute-based encryption published in 1984"
•
31 May 1984TL;DR: In an encryption scheme based on the use of a public key having secret factors p and q, additional requirements on p and Q are invoked in order to ensure a high level of security as mentioned in this paper.
Abstract: In an encryption scheme based on the use of a public key having secret factors p and q, additional requirements on p and q are invoked in order to ensure a high level of security. In particular, it is additionally required that a value p+1 have a large prime factor r and that the value r-1 also have a large prime factor r'.
63 citations
••
01 Jan 1984TL;DR: This paper proposes a solution to the security problems of field based protection, which allows projections to be performed and individual data elements decrypted or authenticated at the field level.
Abstract: Database encryption and authentication at the field level is attractive because it allows projections to be performed and individual data elements decrypted or authenticated. But field based protection is not usually recommended for security reasons: using encryption to hide individual data elements is vulnerable to ciphertext searching; using cryptographic checksums to authenticate individual data elements is vulnerable to plaintext or ciphertext substitution. Solutions to the security problems of field based protection are proposed.
39 citations
•
27 Mar 1984
TL;DR: A data processing system that provides for the public encryption and decryption of software programs while simultaneously protecting against the public decryption and piracy of those programs is proposed in this paper, where each microprocessor has a unique and publicly accessible encryption key for decrypting software programs in a unique fashion for that microprocessor.
Abstract: A data processing system that provides for the public en
cryption of software programs while simultaneously protecting
against the public decryption and piracy of those programs is
comprised of a plurality of microprocessors: each micropro
cessor has a unique and publicly accessible encryption key for
encrypting software programs in a unique fashion for that mi
croprocessor; each microprocessor further has a unique de
cryption key for decrypting programs that have been encrypt
ed with the microprocessor's unique encryption key; the de
cryption key in each microprocessor is imbedded therein in a
fashion which makes the decryption key humanly impercepti
ble, and is of a type that is not determinable from the publicly
accessible encryption key.
15 citations
••
TL;DR: An implementation of a technique, based on the Data Encryption Standard (DES), is described for user-controlled encryption of files that is adaptible for use on both time-sharing systems and personal computer systems.
2 citations