CN103155480B - 认证装置和认证方法 - Google Patents

认证装置和认证方法 Download PDF

Info

Publication number
CN103155480B
CN103155480B CN201180035779.5A CN201180035779A CN103155480B CN 103155480 B CN103155480 B CN 103155480B CN 201180035779 A CN201180035779 A CN 201180035779A CN 103155480 B CN103155480 B CN 103155480B
Authority
CN
China
Prior art keywords
algorithm
verifier
prover
key
cmt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201180035779.5A
Other languages
English (en)
Chinese (zh)
Other versions
CN103155480A (zh
Inventor
作本紘一
白井太三
樋渡玄良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of CN103155480A publication Critical patent/CN103155480A/zh
Application granted granted Critical
Publication of CN103155480B publication Critical patent/CN103155480B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Computing Systems (AREA)
  • Algebra (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Communication Control (AREA)
  • Computer And Data Communications (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
CN201180035779.5A 2010-07-30 2011-07-12 认证装置和认证方法 Expired - Fee Related CN103155480B (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2010-171940 2010-07-30
JP2010171940 2010-07-30
JP2010224752A JP5594034B2 (ja) 2010-07-30 2010-10-04 認証装置、認証方法、及びプログラム
JP2010-224752 2010-10-04
PCT/JP2011/065872 WO2012014669A1 (ja) 2010-07-30 2011-07-12 認証装置、認証方法、及びプログラム

Publications (2)

Publication Number Publication Date
CN103155480A CN103155480A (zh) 2013-06-12
CN103155480B true CN103155480B (zh) 2015-11-25

Family

ID=45529885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201180035779.5A Expired - Fee Related CN103155480B (zh) 2010-07-30 2011-07-12 认证装置和认证方法

Country Status (13)

Country Link
US (2) US9076000B2 (cg-RX-API-DMAC7.html)
EP (1) EP2600563A4 (cg-RX-API-DMAC7.html)
JP (1) JP5594034B2 (cg-RX-API-DMAC7.html)
KR (1) KR101808363B1 (cg-RX-API-DMAC7.html)
CN (1) CN103155480B (cg-RX-API-DMAC7.html)
AU (1) AU2011283888B2 (cg-RX-API-DMAC7.html)
BR (1) BR112013001733A2 (cg-RX-API-DMAC7.html)
CA (2) CA3000137A1 (cg-RX-API-DMAC7.html)
MY (1) MY181936A (cg-RX-API-DMAC7.html)
RU (1) RU2573772C2 (cg-RX-API-DMAC7.html)
SG (1) SG187039A1 (cg-RX-API-DMAC7.html)
TW (1) TWI455555B (cg-RX-API-DMAC7.html)
WO (1) WO2012014669A1 (cg-RX-API-DMAC7.html)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5790289B2 (ja) * 2011-08-12 2015-10-07 ソニー株式会社 情報処理装置、情報処理方法、プログラム、及び記録媒体
JP5790287B2 (ja) * 2011-08-12 2015-10-07 ソニー株式会社 情報処理装置、情報処理方法、プログラム、及び記録媒体
TW201351195A (zh) 2012-03-02 2013-12-16 Sony Corp 演算裝置、控制方法、及程式
CN104137469A (zh) 2012-12-05 2014-11-05 索尼公司 信息处理装置、验证处理装置、信息处理方法、验证处理方法和程序
US10447475B1 (en) * 2018-11-08 2019-10-15 Bar Ilan University System and method for managing backup of cryptographic keys
CN110650160B (zh) * 2019-10-29 2022-01-04 北京天威诚信电子商务服务有限公司 一种身份认证方法及系统
JP7273742B2 (ja) * 2020-02-07 2023-05-15 株式会社東芝 暗号化装置、復号装置、暗号方法、復号方法、暗号化プログラム及び復号プログラム
JP7768872B2 (ja) * 2022-12-06 2025-11-12 株式会社東芝 暗号化装置、復号装置、鍵生成装置、暗号方法、復号方法、鍵生成方法、暗号化プログラム、復号プログラム及び鍵生成プログラム

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1433609A (zh) * 1999-10-01 2003-07-30 法国电信公司 验证实体真实性或消息完整性的方法、系统、设备
CN1467670A (zh) * 2002-06-26 2004-01-14 带质询的垃圾邮件检测器
CN1910851A (zh) * 2004-01-23 2007-02-07 法国电信公司 零知识检验加密方法与设备
CN101410847A (zh) * 2006-06-30 2009-04-15 国际商业机器公司 在移动设备处的消息处理

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5375170A (en) * 1992-11-13 1994-12-20 Yeda Research & Development Co., Ltd. Efficient signature scheme based on birational permutations
FR2737370B1 (fr) 1995-07-27 1997-08-22 Bull Cp8 Procede de communication cryptographique
US5710814A (en) * 1996-07-23 1998-01-20 Cheyenne Property Trust Cryptographic unit touch point logic
JPH1165439A (ja) * 1996-08-09 1999-03-05 Nippon Telegr & Teleph Corp <Ntt> N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体
US6307936B1 (en) * 1997-09-16 2001-10-23 Safenet, Inc. Cryptographic key management scheme
US6076163A (en) * 1997-10-20 2000-06-13 Rsa Security Inc. Secure user identification based on constrained polynomials
US6411715B1 (en) * 1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
US6959085B1 (en) * 1999-05-03 2005-10-25 Ntru Cryptosystems, Inc. Secure user identification based on ring homomorphisms
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US20020136401A1 (en) * 2000-07-25 2002-09-26 Jeffrey Hoffstein Digital signature and authentication method and apparatus
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US7114178B2 (en) * 2001-05-22 2006-09-26 Ericsson Inc. Security system
JP2005515659A (ja) * 2001-12-07 2005-05-26 エヌティーアールユー・クリプトシステムズ・インコーポレーテッド ディジタル署名、認証方法及び装置
DE60303018T2 (de) * 2002-03-13 2006-08-24 Koninklijke Philips Electronics N.V. Mehrbenutzerschlüsselerzeugung auf polynombasis und Authentisierungsverfahren uns System
JP4457651B2 (ja) * 2003-11-27 2010-04-28 日本電気株式会社 証明装置及び証明方法並びにプログラム
JP4282546B2 (ja) * 2004-05-19 2009-06-24 株式会社東芝 暗号装置、復号装置、鍵生成装置、プログラム及び方法
US20060083370A1 (en) * 2004-07-02 2006-04-20 Jing-Jang Hwang RSA with personalized secret
EP1797668B1 (en) 2004-09-30 2016-08-03 Koninklijke Philips N.V. Method of authentication based on polynomials
US20060245587A1 (en) * 2005-04-28 2006-11-02 Binyamin Pinkas System and method for private information matching
US7958362B2 (en) * 2005-10-11 2011-06-07 Chang Gung University User authentication based on asymmetric cryptography utilizing RSA with personalized secret
US20080013721A1 (en) * 2005-11-30 2008-01-17 Jing-Jang Hwang Asymmetric cryptography with discretionary private key
JP4197710B2 (ja) * 2006-07-19 2008-12-17 株式会社東芝 暗号装置、復号装置、プログラム及び方法
US8006300B2 (en) * 2006-10-24 2011-08-23 Authernative, Inc. Two-channel challenge-response authentication method in random partial shared secret recognition system
WO2009083109A1 (en) * 2008-01-02 2009-07-09 National University Of Ireland, Galway A method and apparatus for authenticating a user
US8713655B2 (en) * 2008-04-21 2014-04-29 Indian Institute Of Technology Method and system for using personal devices for authentication and service access at service outlets
JP2010049215A (ja) * 2008-08-25 2010-03-04 Toshiba Corp パラメータ生成装置、暗号処理システム、方法およびプログラム
JP4756067B2 (ja) 2008-11-27 2011-08-24 株式会社サンセイアールアンドディ 遊技機

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1433609A (zh) * 1999-10-01 2003-07-30 法国电信公司 验证实体真实性或消息完整性的方法、系统、设备
CN1467670A (zh) * 2002-06-26 2004-01-14 带质询的垃圾邮件检测器
CN1910851A (zh) * 2004-01-23 2007-02-07 法国电信公司 零知识检验加密方法与设备
CN101410847A (zh) * 2006-06-30 2009-04-15 国际商业机器公司 在移动设备处的消息处理
JP2009543414A (ja) * 2006-06-30 2009-12-03 インターナショナル・ビジネス・マシーンズ・コーポレーション モバイル・デバイスにおけるメッセージ処理

Also Published As

Publication number Publication date
US20150256342A1 (en) 2015-09-10
SG187039A1 (en) 2013-02-28
AU2011283888B2 (en) 2015-10-29
KR20130100959A (ko) 2013-09-12
EP2600563A1 (en) 2013-06-05
BR112013001733A2 (pt) 2016-05-31
AU2011283888A1 (en) 2012-12-13
RU2573772C2 (ru) 2016-01-27
JP2012050053A (ja) 2012-03-08
JP5594034B2 (ja) 2014-09-24
US20130089201A1 (en) 2013-04-11
TWI455555B (zh) 2014-10-01
CA2804394C (en) 2018-05-22
EP2600563A4 (en) 2016-10-19
TW201215069A (en) 2012-04-01
RU2013103035A (ru) 2014-07-27
US9076000B2 (en) 2015-07-07
CN103155480A (zh) 2013-06-12
CA2804394A1 (en) 2012-02-02
WO2012014669A1 (ja) 2012-02-02
MY181936A (en) 2021-01-14
CA3000137A1 (en) 2012-02-02
US9602285B2 (en) 2017-03-21
KR101808363B1 (ko) 2017-12-12

Similar Documents

Publication Publication Date Title
CN102263638B (zh) 认证设备、认证方法和签名生成设备
CN102263639B (zh) 认证装置、认证方法和签名生成装置
CN103155480B (zh) 认证装置和认证方法
US20130042116A1 (en) Information processing apparatus and information processing method
JP2009526411A (ja) 装置またはネットワークによって相互接続された2当事者間の交換の方法、信号伝送媒体、および装置(チャレンジ・レスポンス署名および高性能で安全なDiffie−Hellmanプロトコルに関する方法および構造)
CN103718501B (zh) 信息处理设备和信息处理方法
CN103718502B (zh) 信息处理设备和信息处理方法
CN103748830A (zh) 信息处理设备、签名提供方法、签名验证方法、程序和记录介质
CN103733563A (zh) 信息处理设备、签名产生设备、信息处理方法、签名产生方法和程序
EP2752836A1 (en) Information processing device, signature generation device, signature verification device, information processing method, signature generation method, and signature verification method
CN103718228B (zh) 信息处理设备和信息处理方法
CN103733562A (zh) 信息处理设备和信息处理方法
CN103782332A (zh) 信息处理设备、信息处理方法、程序以及记录介质
Al-Saidi et al. A new idea in zero knowledge protocols based on iterated function systems
HK1193232A (en) Information processing device and information processing method
HK1192983A (en) Information processing device, signature-provision method, signature-verification method, program, and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151125