DocumentCode
564694
Title
Shared Database Access using Composed Encryption Functions
Author
Wagner, Neal R.
Author_Institution
Drexel University
fYear
1982
fDate
26-28 April 1982
Firstpage
104
Lastpage
104
Abstract
This article presents a two-stage encryption method for sharing access to a database where no single agency or device can ever encrypt or decrypt the data directly. Thus an attack by an opponent would have to succeed at two separate points. The main tool needed is a secure cryptosystem closed under composition: encrypting and re-encrypting using two successive keys is equivalent to a single encryption using some third key. An example cryptosystem satisfying this condition is exponentiation modulo a fixed prime.
Keywords
Databases; Encryption; Equations; Mathematical model; Zinc;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1982 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0410-7
Type
conf
DOI
10.1109/SP.1982.10009
Filename
6234458
Link To Document