Movatterモバイル変換


[0]ホーム

URL:


US20040174997A1 - Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus - Google Patents

Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
Download PDF

Info

Publication number
US20040174997A1
US20040174997A1US10/725,208US72520803AUS2004174997A1US 20040174997 A1US20040174997 A1US 20040174997A1US 72520803 AUS72520803 AUS 72520803AUS 2004174997 A1US2004174997 A1US 2004174997A1
Authority
US
United States
Prior art keywords
key
value
shared
decryption
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/725,208
Inventor
Masato Yamamichi
Masami Yamamichi
Yuichi Futa
Motoji Ohomori
Makoto Tatebayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Assigned to MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.reassignmentMATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FUTA, YUICHI, OHMORI, MOTOJI, TATEBAYASHI, MAKOTO, YAMAMICHI, MASAMI (LEGAL REPRESENTATIVE FOR DECEASED INVENTOR MASATO YAMAMICHI)
Publication of US20040174997A1publicationCriticalpatent/US20040174997A1/en
Assigned to MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.reassignmentMATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.CORRECTED ASSIGNMENTAssignors: FUTA, YUICHI, OHMORI, MOTOJI, TATEBAYASHI, MAKOTO, YAMAMICHI, KEIKO (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI), YAMAMICHI, MASAMI (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI), YAMAMICHI, SATOMI (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI)
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Provided is a content distribution system that prevents different keys to be derived between an encryption apparatus and a decryption apparatus. A random-number generating unit112, in an encryption apparatus110, generates a random number s. A first function unit113generates a functional value G(s) of the random number s, and generates a random-number value u and a shared key K from the functional value G(s). An encryption unit114generates a first cipher text c1of the random number s, using a public-key polynomial h and the random-number value u. A decryption unit123, in a decryption apparatus120, decrypts the first cipher text c1using a secret-key polynomial f, to generate a decryption random number s′ A second function unit126generates a functional value G(s′) of the decryption random number s′, and generates a random-number value u′ and a shared key K′from the functional value G(s′ ). A comparison unit127generates a first re-cipher text c1′, using the random-number value u′ and the shared key K′, and outputs the shared key K′ if the first cipher text c1is equal to the first re-cipher text c1′.

Description

Claims (43)

What is claimed is:
1. A key agreement system comprising a shared-key generation apparatus and a shared-key recovery apparatus, each apparatus establishing therein a same shared key in secrecy, wherein
the shared-key generation apparatus includes:
a seed-value generating unit operable to generate a seed value;
a first shared-key generating unit operable to generate a blind value and a shared key, from the seed value;
an encryption unit operable to encrypt the seed value based on the blind value, to generate encryption information; and
a transmitting unit operable to transmit the encryption information, and
the shared-key recovery apparatus includes:
a receiving unit operable to receive the encryption information;
a decryption unit operable to decrypt the encryption information, to generate a decryption seed value;
a second shared-key generating unit operable to generate a decryption blind value and a decryption shared key, using the decryption seed value and according to a same method as used in the first shared-key generating unit;
a re-encryption unit operable to encrypt the decryption seed value based on the decryption blind value, to generate re-encryption information;
a judging unit operable to judge, based on the encryption information and the re-encryption information, whether the decryption shared key should be outputted; and
an outputting unit operable, when the judging unit has judged affirmatively, to output the decryption shared key.
2. The key agreement system ofclaim 1, wherein
the shared-key generation apparatus further includes:
an obtaining unit operable to obtain a content; and
an encryption unit operable to encrypt the obtained content using the shared key, to generate an encrypted content,
the transmitting unit further transmits the encrypted content,
the receiving unit further receives the encrypted content, and the shared-key recovery apparatus further includes:
a decryption unit operable to decrypt the received encrypted content using the decryption shared key, to generate a decrypted content; and
an outputting unit operable to output the decrypted content.
3. A shared-key generation apparatus that notifies a destination apparatus about a shared key in secrecy, the shared-key generation apparatus comprising:
a seed-value generating unit operable to generate a seed value;
a shared-key generating unit operable to generate a blind value and a shared key, from the seed value;
an encryption unit operable to encrypt the seed value based on the blind value, to generate encryption information; and
a transmitting unit operable to transmit the encryption information.
4. The shared-key generation apparatus ofclaim 3, wherein
the shared-key generating unit performs a one-way function on the seed value, to generate a functional value, and generates the blind value and the shared key from the functional value,
the encryption unit includes:
a public-key obtaining subunit operable to obtain a public key; and
a public-key encryption subunit operable to perform a public-key encryption algorithm on the seed value, using the public key and the blind value, to generate an encryption seed value as the encryption information.
5. The shared-key generation apparatus ofclaim 4, wherein
the public-key encryption algorithm conforms to an NTRU cryptosystem,
the public-key obtaining subunit obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key,
the public-key encryption subunit generates a seed-value polynomial from the seed value, generates a blind-value polynomial from the blind value, and encrypts the seed-value polynomial according to an encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the seed-value polynomial, to generate an encryption seed-value polynomial as the encryption seed value, and
the transmitting unit transmits the encryption seed-value polynomial as the encryption seed value.
6. The shared-key generation apparatus ofclaim 3, wherein
the encryption unit includes:
a public-key obtaining subunit operable to obtain a public key;
a public-key encryption subunit operable to generate a blind value, perform the public-key encryption algorithm on the seed value using the public key and the blind value, to generate a public-key cipher text; and
a function subunit operable to perform a second one-way function on at least one of the seed value, the blind value, and the shared key, to generate a second functional value, and
the encryption unit generates the encryption information that includes the public-key cipher text and the second functional value.
7. The shared-key generation apparatus ofclaim 6, wherein
the shared-key generating unit performs a one-way function on the seed value, to generate a functional value, and generates the blind value and the shared key from the functional value.
8. The shared-key generation apparatus ofclaim 6, wherein
the shared-key generating unit performs a first one-way function on the seed value, to generate a first functional value, and generates the shared key from the first functional value, instead of generating the blind value and the shared key.
9. The shared-key generation apparatus ofclaim 6, wherein
the public-key encryption algorithm conforms to an NTRU cryptosystem,
the public-key obtaining subunit obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key,
the public-key encryption subunit generates a seed-value polynomial from the seed value, generates a blind-value polynomial from the blind value, encrypts the seed-value polynomial according to an encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the seed-value polynomial, to generate an encryption seed-value polynomial as the public-key cipher text, and
the encryption unit generates the encryption information that includes the encryption seed-value polynomial as the public-key cipher text and the second functional value.
10. The shared-key generation apparatus ofclaim 3, wherein
the shared-key generating unit performs a one-way function on the seed value, to generate a functional value, and generates a verification value, the blind value, and the shared key, from the functional value,
the encryption unit includes:
a public-key obtaining subunit operable to obtain a public key;
a first encryption subunit operable to perform a public-key encryption algorithm on the verification value, using the public key and the blind value, to generate a first cipher text; and
a second encryption subunit operable to perform, on the seed value, a computation algorithm different from the public-key encryption algorithm, to generate a second cipher text, and
the encryption unit generates the encryption information that includes the first cipher text and the second cipher text.
11. The shared-key generation apparatus ofclaim 10, wherein
the public-key encryption algorithm conforms to an NTRU cryptosystem,
the public-key obtaining subunit obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key,
the first encryption subunit generates a verification-value polynomial from the verification value, generates a blind-value polynomial from the blind value, and encrypts the verification-value polynomial according to an encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the verification-value polynomial, to generate an encryption verification-value polynomial as the first cipher text, and
the encryption unit generates the encryption information that includes the encryption verification-value polynomial as the first cipher text and the second cipher text.
12. The shared-key generation apparatus ofclaim 11, wherein
the different computation algorithm is a symmetric key encryption algorithm, and
the second encryption subunit performs the symmetric key encryption algorithm on the seed value using the verification value as a key, to generate the second cipher text.
13. The shared-key generation apparatus ofclaim 11, wherein
the different computation algorithm is bitwise exclusive-or, and
the second encryption subunit performs the bitwise exclusive-or on the verification value and the seed value, to generate the second cipher text.
14. The shared-key generation apparatus ofclaim 11, wherein
the different computation algorithm is addition, and
the second encryption subunit performs the addition on the verification value and the seed value, to generate the second cipher text.
15. The shared-key generation apparatus ofclaim 11, wherein
the different computation algorithm is multiplication, and
the second encryption subunit performs the multiplication on the verification value and the seed value, to generate the second cipher text.
16. The shared-key generation apparatus ofclaim 3, wherein
the seed-value generating unit generates a random number, as the seed value.
17. The shared-key generation apparatus ofclaim 3, wherein
the shared-key generating unit performs a one-way function on the seed value, to generate a functional value, and generates the blind value and the shared key from the functional value.
18. The shared-key generation apparatus ofclaim 17, wherein
the one-way function is a hash function, and
the shared-key generating unit performs the hash function on the seed value.
19. The shared-key generation apparatus ofclaim 17, wherein
the shared-key generating unit generates the blind value by setting a part of the functional value as the blind value, and generates the shared key by setting another part of the functional value as the shared key.
20. The shared-key generation apparatus ofclaim 3, further comprising:
obtaining unit operable to obtain a content; and
an encryption unit operable to encrypt the obtained content using the shared key, to generate an encrypted content, wherein
the transmitting unit further transmits the encrypted content.
21. A shared-key recovery apparatus that receives a shared key from a shared-key generation apparatus in secrecy, the shared-key generation apparatus generating a seed value, generating a blind value and a shared key from the seed value, encrypting the seed value based on the blind value to generate encryption information, and transmitting the encryption information, the shared-key recovery apparatus comprising:
a receiving unit operable to receive the encryption information;
a decryption unit operable to decrypt the encryption information, to generate a decryption seed value;
a shared-key generating unit operable to generate a decryption blind value and a decryption shared key, using the decryption seed value and according to a same shared-key generating method used in the shared-key generation apparatus;
a re-encryption unit operable to encrypt the decryption seed value based on the decryption blind value, to generate re-encryption information;
a judging unit operable to judge, based on the encryption information and the re-encryption information, whether the decryption shared key should be outputted; and
an outputting unit operable, when the judging unit has judged affirmatively, to output the decryption shared key.
22. The shared-key recovery apparatus ofclaim 21, wherein
the shared-key generation apparatus performs a one-way function on the seed value to generate a functional value, generates the blind value and the shared key from the functional value, obtains a public key, performs a public-key encryption algorithm on the seed value using the public key and the blind value, to generate an encryption seed value as the encryption information, and transmits the encryption seed value,
the receiving unit receives the encryption seed value as the encryption information,
the decryption unit includes:
a secret-key obtaining subunit operable to obtain a secret key that corresponds to the public key; and
a public-key decryption subunit operable to perform, on the received encryption seed value, a public-key decryption algorithm that corresponds to the public-key encryption algorithm, using the obtained secret key, to generate the decryption seed value,
the shared-key generating unit performs the one-way function on the decryption seed value to generate a decryption functional value, and generates the decryption blind value and the decryption shared key from the decryption functional value,
the re-encryption unit includes:
a public-key obtaining subunit operable to obtain the public key; and
a re-encryption subunit operable to perform the public-key encryption algorithm on the decryption seed value using the public key and the decryption blind value, to generate a re-encryption seed value as the re-encryption information, and
the judging unit judges whether the encryption seed value is identical to the re-encryption seed value, and when judging affirmatively, determines that the decryption shared key should be outputted.
23. The shared-key recovery apparatus ofclaim 22, wherein
the public-key encryption algorithm and the public-key decryption algorithm conform to an NTRU cryptosystem,
the shared-key generation apparatus obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key, generates a seed-value polynomial from the seed value, generates a blind-value polynomial from the blind value, encrypts the seed-value polynomial according to an encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the seed-value polynomial, to generate an encryption seed-value polynomial as the encryption seed value, and transmits the encryption seed-value polynomial as the encryption seed value,
the receiving unit receives the encryption seed-value polynomial as the encryption seed value,
the secret-key obtaining subunit obtains a secret-key polynomial generated according to the key-generation algorithm of the NTRU cryptosystem, as the secret key,
the public-key decryption subunit decrypts the received encryption seed-value polynomial according to a decryption algorithm of the NTRU cryptosystem and using the obtained secret-key polynomial as a key, to generate a decryption seed-value polynomial, and generates the decryption seed value from the decryption seed-value polynomial,
the public-key obtaining subunit obtains the public-key polynomial as the public key,
the re-encryption subunit generates a seed-value polynomial from the decryption seed value, generates a blind-value polynomial from the decryption blind value, and encrypts the seed-value polynomial according to the encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the seed-value polynomial, to generate a re-encryption seed-value polynomial, and
the judging unit judges whether the encryption seed-value polynomial is identical to the re-encryption seed-value polynomial.
24. The shared-key recovery apparatus ofclaim 21, wherein
the shared-key generation apparatus obtains a public key, generates a blind value, performs a public-key encryption algorithm on the seed value using the public key and the blind value to generate a public-key cipher text, performs a second one-way function on at least one of the seed value, the blind value, and the shared key to generate a second functional value, generates the encryption information that includes the public-key cipher text and the second functional value, and transmits the encryption information,
the receiving unit receives the encryption information that includes the public-key cipher text and the second functional value,
the decryption unit includes:
a secret-key obtaining subunit operable to obtain a secret key that corresponds to the public key;
a public-key decryption subunit operable to perform, on the public-key cipher text included in the received encryption information, a public-key decryption algorithm that corresponds to the public-key encryption algorithm, to generate a decryption seed value; and
a function subunit operable to perform the second one-way function on at least one of the decryption seed value, the decryption blind value, and the decryption shared key, to generate a decryption second functional value, and
the judging unit judges whether the second functional value included in the received encryption information is identical to the decryption second functional value instead of performing judging based on the encryption information and the re-encryption information and when judging affirmatively, determines that the decryption shared key should be outputted.
25. The shared-key recovery apparatus ofclaim 24, wherein
the shared-key generation apparatus performs a one-way function on the seed value to generate a functional value, and generates the blind value and the shared key from the functional value, and
the shared-key generating unit performs the first one-way function on the decryption seed value to generate a decryption functional value, and generates the decryption blind value and the decryption shared key from the decryption functional value.
26. The shared-key recovery apparatus ofclaim 24, wherein
the shared-key generation apparatus performs a first one-way function on the seed value to generate a first functional value, and generates the shared key from the first functional value, instead of generating the blind value and the shared key, and
the shared-key generating unit performs the first one-way function on the decryption seed value to generate a decryption functional value, and generates the decryption shared key from the decryption functional value, instead of generating the decryption blind value and the decryption shared key.
27. The shared-key recovery apparatus ofclaim 24, wherein the public-key encryption algorithm and the public-key decryption algorithm conform to an NTRU cryptosystem,
the shared-key generation apparatus obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key, generates a seed-value polynomial from the seed value, generates a blind-value polynomial from the blind value, encrypts the seed-value polynomial according to an encryption algorithm of the NTRU cryptosystem using the public-key polynomial as a key and using the blind-value polynomial to randomize the seed-value polynomial, to generate an encryption seed-value polynomial as the public-key cipher text, and generates the encryption information that includes the encryption seed-value polynomial as the public-key cipher text and the second functional value,
the secret-key obtaining subunit obtains a secret-key polynomial generated according to the key-generation algorithm of the NTRU cryptosystem, as the secret key, and
the public-key decryption subunit generates a public-key cipher-text polynomial from the public-key cipher text, decrypts the public-key cipher-text polynomial according to a decryption algorithm of the NTRU cryptosystem using the secret-key polynomial as a key to generate a decryption seed-value polynomial, and generates the decryption seed value from the decryption seed-value polynomial.
28. The shared-key recovery apparatus ofclaim 21, wherein
the shared-key generation apparatus performs a one-way function on the seed value to generate a functional value, generates a verification value, the blind value, and the shared key from the functional value, obtains a public key, performs a public-key encryption algorithm on the verification value using the public key and the blind value to generate a first cipher text, performs, based on the verification value, a computation algorithm different from the public-key encryption algorithm on the seed value, to generate a second cipher text, generates the encryption information that includes the first cipher text and the second cipher text, and transmits the encryption information,
the receiving unit receives the encryption information that includes the first cipher text and the second cipher text,
the decryption unit includes:
a secret-key obtaining subunit operable to obtain a secret key that corresponds to the public key;
a public-key decryption subunit operable to perform, on the first cipher text included in the received encryption information, a public-key decryption algorithm that corresponds to the public-key encryption algorithm, to generate a decryption verification value; and
a computation decryption subunit operable to perform, on the second cipher text included in the received encryption information, a computation algorithm for performing an inverse computation of the different computation algorithm, to generate a decryption seed value,
the shared-key generating unit performs the one-way function on the decryption seed value to generate a decryption functional value, and generates a decryption verification value, the decryption blind value, and the decryption shared key, from the decryption functional value,
the re-encryption unit includes:
a public-key obtaining subunit operable to obtain the public key; and
a re-encryption subunit operable to perform, on the decryption verification value, the public-key encryption algorithm using the public key and the decryption blind value, to generate the re-encryption information, and
the judging unit judges whether the first cipher text included in the encryption information is identical to the re-encryption information, and when judging affirmatively, determines that the decryption shared key should be outputted.
29. The shared-key recovery apparatus ofclaim 28, wherein
the public-key encryption algorithm and the public-key decryption algorithm conform to an NTRU cryptosystem,
the shared-key generation apparatus obtains a public-key polynomial generated according to a key-generation algorithm of the NTRU cryptosystem, as the public key, generates a verification-value polynomial from the verification value, generates a blind-value polynomial from the blind value, encrypts the verification-value polynomial according to an encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the verification-value polynomial, to generate an encryption verification-value polynomial as the first cipher text, generates the encryption information that includes the encryption verification-value polynomial as the first cipher text and the second cipher text, and transmits the encryption information,
the receiving unit receives the encryption information that includes the encryption verification-value polynomial and the second cipher text,
the secret-key obtaining subunit obtains a secret-key polynomial generated according to the key-generation algorithm of the NTRU cryptosystem, as the secret key,
the public-key decryption subunit generates a first cipher-text polynomial from the first cipher text, decrypts the first cipher-text polynomial according to a decryption algorithm of the NTRU cryptosystem using the secret-key polynomial as a key, to generate a decryption verification polynomial, and generates the decryption verification value from the decryption verification-value polynomial,
the public-key obtaining subunit obtains the public-key polynomial,
the re-encryption subunit generates a decryption verification-value polynomial from the decryption verification value, generates a blind-value polynomial from the decryption blind value, and encrypts the decryption verification-value polynomial according to the encryption algorithm of the NTRU cryptosystem, using the public-key polynomial as a key, and using the blind-value polynomial to randomize the decryption verification-value polynomial, to generate a re-encryption verification-value polynomial as the re-encryption information, and
the judging unit judges whether the encryption verification-value polynomial as the first cipher text is identical to the re-encryption verification-value polynomial as the re-encryption information.
30. The shared-key recovery apparatus ofclaim 29, wherein
the different computation algorithm is a symmetric key encryption algorithm, and the computation algorithm for performing the inverse computation is a corresponding symmetric key decryption algorithm, and
the computation decryption subunit performs the symmetric key decryption algorithm on the second cipher text, using the decryption verification value as a key, to generate the decryption seed value.
31. The shared-key recovery apparatus ofclaim 29, wherein
the different computation algorithm and the computation algorithm for performing the inverse computation are bitwise exclusive-or, and
the computation decryption subunit performs the bitwise exclusive-or on the decryption verification value and the second cipher text, to generate the decryption seed value.
32. The shared-key recovery apparatus ofclaim 29, wherein
the different computation algorithm is addition and the computation algorithm for performing the inverse computation is subtraction, and
the computation decryption subunit performs the subtraction on the decryption verification value and the second cipher text, to generate the decryption seed value.
33. The shared-key recovery apparatus ofclaim 29, wherein
the different calculation algorithm is multiplication and the computation algorithm for performing the inverse computation is division, and
the computation decryption subunit performs the division on the decryption verification value and the second cipher text, to generate the decryption seed value.
34. The shared-key recovery apparatus ofclaim 21, wherein
the shared-key generating unit performs a one-way function on the decryption seed value to generate a functional value, and generates the decryption blind value and the decryption shared key from the functional value.
35. The shared-key recovery apparatus ofclaim 34, wherein
the one-way function is a hash function, and the shared-key generating unit performs the hash function on the decryption seed value.
36. The shared-key recovery apparatus ofclaim 34, wherein
the shared-key generating unit generates the decryption blind value by setting a part of the functional value as the decryption blind value, and generates the decryption shared key by setting another part of the functional value as the decryption shared key.
37. The shared-key recovery apparatus ofclaim 21, wherein
the shared-key generation apparatus further obtains a content, encrypts the obtained content using the shared key to generate an encrypted content, and transmits the encrypted content, and
the shared-key recovery apparatus further includes:
a content receiving unit operable to receive the encrypted content;
a decryption unit operable to decrypt the received encrypted content using the outputted decryption shared key, to generate a decrypted content; and
a playback unit operable to playback the decrypted content.
38. A shared-key generating method used in a shared-key generation apparatus that notifies a destination apparatus about a shared key in secrecy, the shared-key generating method comprising:
a seed-value generating step of generating a seed value;
a shared-key generating step of generating a blind value and a shared key, from the seed value;
an encryption step of encrypting the seed value based on the blind value, to generate encryption information; and
a transmitting step of transmitting the encryption information.
39. A shared-key generating program used in a shared-key generation apparatus that notifies a destination apparatus about a shared key in secrecy, the shared-key generating program comprising:
a seed-value generating step of generating a seed value;
a shared-key generating step of generating a blind value and a shared key, from the seed value;
an encryption step of encrypting the seed value based on the blind value, to generate encryption information; and
a transmitting step of transmitting the encryption information.
40. The shared-key generating program ofclaim 39, wherein
the shared-key generating program is recorded in a computer-readable recording medium.
41. A shared-key recovery method used in a shared-key recovery apparatus that receives a shared key from a shared-key generation apparatus in secrecy, the shared-key generation apparatus generating a seed value, generating a blind value and a shared key from the seed value, encrypting the seed value based on the blind value to generate encryption information, and transmitting the encryption information, the shared-key recovery method comprising:
a receiving step of receiving the encryption information;
a decryption step of decrypting the encryption information, to generate a decryption seed value;
a shared-key generating step of generating a decryption blind value and a decryption shared key, using the decryption seed value and according to a same shared-key generating method used in the shared-key generation apparatus;
a re-encryption step of encrypting the decryption seed value based on the decryption blind value, to generate re-encryption information;
a judging step of judging, based on the encryption information and there-encryption information, whether the decryption shared key should be outputted; and
an outputting step, when the judging unit has judged affirmatively, of outputting the decryption shared key.
42. A shared-key recovery program used in a shared-key recovery apparatus that receives a shared key from a shared-key generation apparatus in secrecy, the shared-key generation apparatus generating a seed value, generating a blind value and a shared key from the seed value, encrypting the seed value based on the blind value to generate encryption information, and transmitting the encryption information, the shared-key recovery program comprising:
a receiving step of receiving the encryption information;
a decryption step of decrypting the encryption information, to generate a decryption seed value;
a shared-key generating step of generating a decryption blind value and a decryption shared key, using the decryption seed value and according to a same shared-key generating method used in the shared-key generation apparatus;
a re-encryption step of encrypting the decryption seed value based on the decryption blind value, to generate re-encryption information;
a judging step of judging, based on the encryption information and the re-encryption information, whether the decryption shared key should be outputted; and
an outputting step, when the judging unit has judged affirmatively, of outputting the decryption shared key.
43. The shared-key recovery program ofclaim 42, wherein
The shared-key recovery program is recorded in a computer-readable recording medium.
US10/725,2082002-12-032003-12-02Key agreement system, shared-key generation apparatus, and shared-key recovery apparatusAbandonedUS20040174997A1 (en)

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
JP20023510622002-12-03
JP20023510632002-12-03
JP2002-3510622002-12-03
JP2002-3510632002-12-03

Publications (1)

Publication NumberPublication Date
US20040174997A1true US20040174997A1 (en)2004-09-09

Family

ID=32473683

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/725,102Expired - LifetimeUS7471792B2 (en)2002-12-032003-12-02Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
US10/725,208AbandonedUS20040174997A1 (en)2002-12-032003-12-02Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/725,102Expired - LifetimeUS7471792B2 (en)2002-12-032003-12-02Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus

Country Status (5)

CountryLink
US (2)US7471792B2 (en)
EP (2)EP1569378A4 (en)
KR (2)KR101027199B1 (en)
AU (2)AU2003302544A1 (en)
WO (2)WO2004051920A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070003058A1 (en)*2005-07-012007-01-04Makoto FujiwaraConfidential information implementation system and LSI
US20080144832A1 (en)*2006-12-182008-06-19Sap AgSecure computation of private values
US20090100264A1 (en)*2006-04-282009-04-16Yuichi FutaCommunication device and communication system
US20090285389A1 (en)*2008-05-132009-11-19Panasonic CorporationElectronic certification system and confidential communication system
US20100034383A1 (en)*2005-12-232010-02-11Doughan TurkSystem and method for encrypting traffic on a network
US20100287366A1 (en)*2007-02-022010-11-11Toshinori ArakiDistributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
US20110216901A1 (en)*2005-03-232011-09-08Kddi CorporationKeystream encryption device, method, and program
US20130073850A1 (en)*2011-09-162013-03-21Certicom Corp.Hybrid encryption schemes
US20140223182A1 (en)*2013-02-072014-08-07Qualcomm IncorporatedMethods and devices for authentication and key exchange
EP2996280A4 (en)*2014-07-032016-09-07Huawei Tech Co LtdPublic key encryption communication method and apparatus
US10389533B2 (en)2014-08-292019-08-20Visa International Service AssociationMethods for secure cryptogram generation
US10461933B2 (en)*2015-01-272019-10-29Visa International Service AssociationMethods for secure credential provisioning
US20220321327A1 (en)*2021-03-302022-10-06Visa International Service AssociationSystem, Method, and Computer Program Product for Data Security

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU7584298A (en)*1997-05-211998-12-11E.S.P. Communications, Inc.System, method and apparatus for "caller only" initiated two-way wireless communication with caller generated billing
US7773746B2 (en)*2004-05-122010-08-10Panasonic CorporationEncryption system, encryption device, decryption device, program, and integrated circuit
US20070229350A1 (en)*2005-02-012007-10-04Scalisi Joseph FApparatus and Method for Providing Location Information on Individuals and Objects using Tracking Devices
US7598855B2 (en)2005-02-012009-10-06Location Based Technologies, Inc.Apparatus and method for locating individuals and objects using tracking devices
US8316416B2 (en)*2005-04-042012-11-20Research In Motion LimitedSecurely using a display to exchange information
US9143323B2 (en)2005-04-042015-09-22Blackberry LimitedSecuring a link between two devices
KR101155271B1 (en)*2005-09-292012-06-18엘지전자 주식회사Credit card settlement system
US8842835B2 (en)2005-10-272014-09-23Cisco TechnologyNetwork security system
CN100518374C (en)*2006-02-172009-07-22鸿富锦精密工业(深圳)有限公司 Access point and method for determining pre-shared key
FR2898747A1 (en)*2006-03-152007-09-21Gemplus Sa DECHIFFRABLE CHERCHABLE ENCRYPTION PROCESS, SYSTEM FOR SUCH ENCRYPTION
US20080118009A1 (en)*2006-11-202008-05-22Yu-Min ChuangPseudo-random number demodulation circuit of receiving device of wireless communication system
US8224355B2 (en)2007-11-062012-07-17Location Based Technologies Inc.System and method for improved communication bandwidth utilization when monitoring location information
US8774827B2 (en)2007-04-052014-07-08Location Based Technologies, Inc.Apparatus and method for generating position fix of a tracking device in accordance with a subscriber service usage profile to conserve tracking device power
US8244468B2 (en)*2007-11-062012-08-14Location Based Technology Inc.System and method for creating and managing a personalized web interface for monitoring location information on individuals and objects using tracking devices
US9111189B2 (en)2007-10-312015-08-18Location Based Technologies, Inc.Apparatus and method for manufacturing an electronic package
US8102256B2 (en)2008-01-062012-01-24Location Based Technologies Inc.Apparatus and method for determining location and tracking coordinates of a tracking device
US8497774B2 (en)2007-04-052013-07-30Location Based Technologies Inc.Apparatus and method for adjusting refresh rate of location coordinates of a tracking device
WO2009009868A1 (en)*2007-07-172009-01-22Certicom Corp.Method of compressing a cryptographic value
US8654974B2 (en)*2007-10-182014-02-18Location Based Technologies, Inc.Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
US20090125171A1 (en)*2007-11-082009-05-14Gm Global Technology Operations, Inc.Processor security diagnostics for hybrid vehicle electric motor control system
FR2926651B1 (en)*2008-01-232010-05-21Inside Contactless COUNTERMEASURE METHOD AND DEVICES FOR ASYMMETRIC CRYPTOGRAPHY
EP2120393A1 (en)*2008-05-142009-11-18Nederlandse Centrale Organisatie Voor Toegepast Natuurwetenschappelijk Onderzoek TNOShared secret verification method
JP4666015B2 (en)*2008-07-082011-04-06ソニー株式会社 Content distribution system, content receiving terminal, and content distribution method
KR20100063301A (en)*2008-12-032010-06-11노틸러스효성 주식회사Apparatus for transferring shared key transfer, automatic teller machine and method for controlliing the same
US8731197B2 (en)*2010-03-092014-05-20Ebay Inc.Secure randomized input
WO2011121298A2 (en)*2010-03-312011-10-06British Telecommunications Public Limited CompanySecure data recorder
US8831821B2 (en)2010-12-172014-09-09GM Global Technology Operations LLCController area network message transmission disable testing systems and methods
KR101233254B1 (en)*2011-04-262013-02-14숭실대학교산학협력단Session key sharing method between Wireless Communication devices by using variable length of authentication code
US9122662B2 (en)2011-06-012015-09-01James Mason FaucettProcessor safety test control systems and methods
US8731203B2 (en)*2012-02-132014-05-20Alephcloud Systems, Inc.Securing a secret of a user
US8996869B1 (en)*2012-07-022015-03-31Bae Systems Information And Electronic Systems Integration Inc.Secure mission module
JP5814880B2 (en)*2012-07-312015-11-17三菱電機株式会社 Encryption system, encryption method, encryption program, and decryption device
US9935768B2 (en)2012-08-062018-04-03Samsung Electronics Co., Ltd.Processors including key management circuits and methods of operating key management circuits
KR102013841B1 (en)*2012-08-062019-08-23삼성전자주식회사Method of managing key for secure storage of data, and and apparatus there-of
JP2014068140A (en)2012-09-252014-04-17Sony CorpInformation processor, information processing method and program
CN104982003B (en)*2013-01-072017-05-31恩德斯有限公司Secret recyclability
EP2955897B1 (en)*2013-03-052018-08-01Huawei Technologies Co., Ltd.Key interaction method and device
JP2014192612A (en)*2013-03-262014-10-06Toshiba CorpGeneration apparatus, encryption device, decoder, decoding method and program
JP6067932B2 (en)*2013-08-302017-01-25コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Key sharing device and method
CN105814833B (en)*2013-12-202019-12-13皇家飞利浦有限公司Method and system for secure data transformation
KR102195900B1 (en)*2013-12-202020-12-29삼성전자주식회사Method and apparatus for sending and receiving of encrypted message between devices
US9813243B1 (en)*2015-03-302017-11-07EMC IP Holding Company LLCMethods and apparatus for password-based secret sharing schemes
EP3119031A1 (en)*2015-07-162017-01-18ABB Schweiz AGEncryption scheme using multiple parties
US9853813B2 (en)2016-03-172017-12-26Crater Dog Technologies, LLCMethod for securing a private key
US10917767B2 (en)2016-03-312021-02-09Intel CorporationIOT device selection
US10097948B2 (en)2016-03-312018-10-09Intel CorporationPoint-and-connect bluetooth pairing
KR101924047B1 (en)*2016-05-102019-02-25주식회사 엔젠소프트Encryption method and apparatus using the same, decryption method and appratus using the same
US10505909B2 (en)2016-12-212019-12-10Intel CorporationDual physical channel secure connection
CN107196760B (en)*2017-04-172020-04-14徐智能Sequence encryption method of adjoint random reconstruction key with adjustability
KR101914028B1 (en)*2017-04-282018-11-01삼성에스디에스 주식회사Apparatus and method for performing operation being secure against side channel attack
JP6777816B2 (en)*2017-05-252020-10-28日本電信電話株式会社 Secret tampering detection system, secret tampering detection device, secret tampering detection method, and program
US11038698B2 (en)2018-09-042021-06-15International Business Machines CorporationSecuring a path at a selected node
US11991273B2 (en)2018-09-042024-05-21International Business Machines CorporationStorage device key management for encrypted host data
US11038671B2 (en)2018-09-042021-06-15International Business Machines CorporationShared key processing by a storage device to secure links
US11025413B2 (en)2018-09-042021-06-01International Business Machines CorporationSecuring a storage network using key server authentication
US11088829B2 (en)2018-09-042021-08-10International Business Machines CorporationSecuring a path at a node
US20210400475A1 (en)*2018-11-122021-12-23Telefonaktiebolaget Lm Ericsson (Publ)Authentication of a Communications Device
CN109525385B (en)*2018-11-232022-04-08全链通有限公司Encapsulation method of shared key, first node and second node
US11405203B2 (en)*2020-02-172022-08-02Eclypses, Inc.System and method for securely transferring data using generated encryption keys
CN114095151B (en)*2020-07-312024-08-23马上消费金融股份有限公司Encryption and decryption method, authentication method, device, equipment and storage medium
CN114070549B (en)*2020-07-312024-07-19马上消费金融股份有限公司Key generation method, device, equipment and storage medium
CN114978554B (en)*2022-07-292022-10-18广州匠芯创科技有限公司Software authorization authentication system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5907618A (en)*1997-01-031999-05-25International Business Machines CorporationMethod and apparatus for verifiably providing key recovery information in a cryptographic system
US5937066A (en)*1996-10-021999-08-10International Business Machines CorporationTwo-phase cryptographic key recovery system
US5953420A (en)*1996-10-251999-09-14International Business Machines CorporationMethod and apparatus for establishing an authenticated shared secret value between a pair of users

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA2263588C (en)*1996-08-192005-01-18Ntru Cryptosystems, Inc.Public key cryptosystem method and apparatus
JP2001222218A (en)2000-02-092001-08-17Nippon Telegr & Teleph Corp <Ntt> Encryption device, method, decryption device, method, encryption system, and storage medium storing program
JP2002252611A (en)2000-12-192002-09-06Matsushita Electric Ind Co Ltd Cryptographic communication system, transmitting device and receiving device
US7155610B2 (en)2000-12-192006-12-26Matsushita Electric Industrial Co., Ltd.Cryptocommunication system, transmission apparatus, and reception apparatus
EP1451967A1 (en)*2001-12-072004-09-01NTRU Cryptosystems, Inc.Digital signature and authentication method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5937066A (en)*1996-10-021999-08-10International Business Machines CorporationTwo-phase cryptographic key recovery system
US5953420A (en)*1996-10-251999-09-14International Business Machines CorporationMethod and apparatus for establishing an authenticated shared secret value between a pair of users
US5907618A (en)*1997-01-031999-05-25International Business Machines CorporationMethod and apparatus for verifiably providing key recovery information in a cryptographic system

Cited By (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8654972B2 (en)*2005-03-232014-02-18Kddi CorporationKeystream encryption device, method, and program
US20110216901A1 (en)*2005-03-232011-09-08Kddi CorporationKeystream encryption device, method, and program
US7957526B2 (en)*2005-07-012011-06-07Panasonic CorporationConfidential information implementation system and LSI
EP1739874A3 (en)*2005-07-012009-07-01Panasonic CorporationConfidential Information Implementation System and LSI
US20070003058A1 (en)*2005-07-012007-01-04Makoto FujiwaraConfidential information implementation system and LSI
US9350713B2 (en)2005-12-232016-05-24Bce Inc.System and method for encrypting traffic on a network
US20100034383A1 (en)*2005-12-232010-02-11Doughan TurkSystem and method for encrypting traffic on a network
US20090100264A1 (en)*2006-04-282009-04-16Yuichi FutaCommunication device and communication system
US7860244B2 (en)*2006-12-182010-12-28Sap AgSecure computation of private values
US20110075846A1 (en)*2006-12-182011-03-31Sap AgSecure computation of private values
US8150041B2 (en)*2006-12-182012-04-03Sap AgSecure computation of private values
US20080144832A1 (en)*2006-12-182008-06-19Sap AgSecure computation of private values
US20100287366A1 (en)*2007-02-022010-11-11Toshinori ArakiDistributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
US8300826B2 (en)*2007-02-022012-10-30Nec CorporationDistributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
US20090285389A1 (en)*2008-05-132009-11-19Panasonic CorporationElectronic certification system and confidential communication system
US20130073850A1 (en)*2011-09-162013-03-21Certicom Corp.Hybrid encryption schemes
US9172529B2 (en)*2011-09-162015-10-27Certicom Corp.Hybrid encryption schemes
US20140223182A1 (en)*2013-02-072014-08-07Qualcomm IncorporatedMethods and devices for authentication and key exchange
US9143331B2 (en)*2013-02-072015-09-22Qualcomm IncorporatedMethods and devices for authentication and key exchange
EP2996280A4 (en)*2014-07-032016-09-07Huawei Tech Co LtdPublic key encryption communication method and apparatus
US10389533B2 (en)2014-08-292019-08-20Visa International Service AssociationMethods for secure cryptogram generation
US11032075B2 (en)2014-08-292021-06-08Visa International Service AssociationMethods for secure cryptogram generation
US11588637B2 (en)2014-08-292023-02-21Visa International Service AssociationMethods for secure cryptogram generation
US12021987B2 (en)2014-08-292024-06-25Visa International Service AssociationMethods for secure cryptogram generation
US10461933B2 (en)*2015-01-272019-10-29Visa International Service AssociationMethods for secure credential provisioning
US11201743B2 (en)*2015-01-272021-12-14Visa International Service AssociationMethods for secure credential provisioning
US20220070001A1 (en)*2015-01-272022-03-03Visa International Service AssociationMethods for secure credential provisioning
US11856104B2 (en)*2015-01-272023-12-26Visa International Service AssociationMethods for secure credential provisioning
US20220321327A1 (en)*2021-03-302022-10-06Visa International Service AssociationSystem, Method, and Computer Program Product for Data Security
US11784798B2 (en)*2021-03-302023-10-10Visa International Service AssociationSystem, method, and computer program product for data security
US12348612B2 (en)2021-03-302025-07-01Visa International Service AssociationSystem, method, and computer program product for data security

Also Published As

Publication numberPublication date
KR101027199B1 (en)2011-04-06
EP1475920A4 (en)2005-03-02
WO2004051920A1 (en)2004-06-17
EP1569378A4 (en)2006-08-02
KR20050087815A (en)2005-08-31
WO2004051921A1 (en)2004-06-17
AU2003302544A1 (en)2004-06-23
KR20050083566A (en)2005-08-26
AU2003302545A1 (en)2004-06-23
US20040165726A1 (en)2004-08-26
US7471792B2 (en)2008-12-30
EP1475920A1 (en)2004-11-10
EP1569378A1 (en)2005-08-31

Similar Documents

PublicationPublication DateTitle
US7471792B2 (en)Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
CN113259329B (en)Method and device for data careless transmission, electronic equipment and storage medium
US7813512B2 (en)Encrypted communication system and communication device
US20090100264A1 (en)Communication device and communication system
US7783045B2 (en)Secure approach to send data from one system to another
KR101059344B1 (en) Encrypted communication system
JP3955567B2 (en) Public key cryptosystem using finite noncommutative groups
CN1745537B (en) Key sharing system, shared key generating device, and shared key restoring device
CN109361506B (en)Information processing method
US7155610B2 (en)Cryptocommunication system, transmission apparatus, and reception apparatus
US20110176677A1 (en)Multi-party variance multiplication device, multi-party variance multiplication system and method
US7321658B2 (en)Padding application method ensuring security of cryptosystem and encryptor/decryptor
JP4485175B2 (en) Key sharing system, shared key generating device, and shared key restoring device
US8457309B2 (en)Private key compression
JP2004201293A (en) Key sharing system, shared key generation device, and shared key recovery device
KR101241829B1 (en)Id-based signcryption method including ciphertext unlinkability and ciphertext authentication
JP3592118B2 (en) Encryption device, encryption communication method, encryption communication system, and recording medium
HK1157972A1 (en)Method for generating an encryption/decryption key
HK1157972B (en)Method for generating an encryption/decryption key
JP2005269587A (en)Key sharing system, encryption system and file authentication system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., JAPAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YAMAMICHI, MASAMI (LEGAL REPRESENTATIVE FOR DECEASED INVENTOR MASATO YAMAMICHI);FUTA, YUICHI;OHMORI, MOTOJI;AND OTHERS;REEL/FRAME:015290/0425

Effective date:20040218

ASAssignment

Owner name:MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., JAPAN

Free format text:CORRECTED ASSIGNMENT;ASSIGNORS:YAMAMICHI, MASAMI (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI);YAMAMICHI, SATOMI (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI);YAMAMICHI, KEIKO (HEIR FOR DECEASED INVENTOR MASATO YAMAMICHI);AND OTHERS;REEL/FRAME:017478/0084

Effective date:20050910

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp