JP2005311648A - Encryption attribute certificate issuing method, attribute verification method, attribute verification support method, attribute authentication device, attribute verification device, attribute verification support device, encryption attribute certificate issuing program, attribute verification program, and attribute verification support program - Google Patents

Encryption attribute certificate issuing method, attribute verification method, attribute verification support method, attribute authentication device, attribute verification device, attribute verification support device, encryption attribute certificate issuing program, attribute verification program, and attribute verification support program Download PDF

Info

Publication number
JP2005311648A
JP2005311648A JP2004125057A JP2004125057A JP2005311648A JP 2005311648 A JP2005311648 A JP 2005311648A JP 2004125057 A JP2004125057 A JP 2004125057A JP 2004125057 A JP2004125057 A JP 2004125057A JP 2005311648 A JP2005311648 A JP 2005311648A
Authority
JP
Japan
Prior art keywords
attribute
information
verifier
encrypted
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2004125057A
Other languages
Japanese (ja)
Other versions
JP4615889B2 (en
Inventor
Takeshi Nagayoshi
剛 永吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP2004125057A priority Critical patent/JP4615889B2/en
Publication of JP2005311648A publication Critical patent/JP2005311648A/en
Application granted granted Critical
Publication of JP4615889B2 publication Critical patent/JP4615889B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To cope with the situation when there are many attribute verifiers and the attribute verifiers can not be individually specified in issuing an attribute certificate. <P>SOLUTION: An attribute authentication station issues an encryption attribute certificate on which the encryption attribute information of an attribute possessor generated with a public key of an attribute decryption organization, the attribute information of the verifier, and the public key of the attribute decryption organization are put. An attribute verification device authenticates the attribute decryption organization by using the public key of the attribute decryption organization to be put on the encryption attribute certificate, and requests the disclosure of the encryption attribute information by designating the verifier attribute certificate and the encryption attribute certificate. The attribute decryption organization authenticates the attribute verifier by using the two certificates, decrypts the encryption attribute information to be put on the encryption attribute certificate by using a secret key of its own device, and replies to the attribute verification device after re-encrypting by using the public key of the attribute verifier. The attribute verification device acquires the attribute information of the attribute possessor by decrypting the re-encryption information by using the secret key of its own device. <P>COPYRIGHT: (C)2006,JPO&NCIPI

Description

本発明は、属性認証システムで用いられる属性認証装置、属性検証装置および属性検証支援装置と、その属性認証装置で実行される暗号化属性証明書発行方法と、その属性検証装置で実行される属性検証方法と、その属性検証支援装置で実行される属性検証支援方法と、その暗号化属性証明書発行方法の実現に用いられる暗号化属性証明書発行プログラムと、その属性検証方法の実現に用いられる属性検証プログラムと、その属性検証支援方法の実現に用いられる属性検証支援プログラムとに関する。   The present invention relates to an attribute authentication device, an attribute verification device and an attribute verification support device used in an attribute authentication system, an encrypted attribute certificate issuance method executed by the attribute authentication device, and an attribute executed by the attribute verification device Used for realizing the verification method, the attribute verification support method executed by the attribute verification support device, the encrypted attribute certificate issuing program used for realizing the encrypted attribute certificate issuing method, and the attribute verification method The present invention relates to an attribute verification program and an attribute verification support program used for realizing the attribute verification support method.

本発明は、特に、属性検証者が多数存在する場合や、属性情報を暗号化した属性証明書を発行する時点で属性検証者を個別に特定できない場合に、それに対処できるようにする属性認証技術に関するものである。   In particular, the present invention provides an attribute authentication technique that can cope with a case where there are a large number of attribute verifiers or when an attribute verifier cannot be individually identified at the time of issuing an attribute certificate in which attribute information is encrypted. It is about.

属性情報を暗号化する属性証明書の標準化がなされている(例えば、非特許文献1,2参照)。   An attribute certificate for encrypting attribute information has been standardized (for example, see Non-Patent Documents 1 and 2).

次に、図4を使って、従来の属性暗号化方法について概説する。   Next, a conventional attribute encryption method will be outlined with reference to FIG.

ここで、この図4では、属性認証局をAA、属性認証局AAの秘密鍵をSK−AA、属性認証局AAの公開鍵をPK−AA、属性所有者をX、属性所有者Xの属性をAT−X、属性所有者Xの秘密鍵をSK−X、属性所有者Xの公開鍵をPK−X、属性検証者をY、属性検証者Yの秘密鍵をSK−Y、属性検証者Yの公開鍵をPK−Yで示している。   Here, in FIG. 4, the attribute certificate authority is AA, the attribute certificate authority AA's private key is SK-AA, the attribute certificate authority AA's public key is PK-AA, the attribute owner is X, and the attribute owner's attribute is X AT-X, attribute owner X's private key SK-X, attribute owner X's public key PK-X, attribute verifier Y, attribute verifier Y's secret key SK-Y, attribute verifier Y's public key is indicated by PK-Y.

また、以下では、情報Pを鍵Kで暗号化した情報をE[K,P]と表し、情報Pに対する秘密鍵SKによるデジタル署名をS[SK,P]と表し、秘密鍵SKによるデジタル署名をS[SK]と表す。   Hereinafter, information obtained by encrypting the information P with the key K is represented as E [K, P], a digital signature with the secret key SK for the information P is represented with S [SK, P], and the digital signature with the secret key SK is represented. Is represented as S [SK].

従来技術では、この図4に示すように、属性認証局AAは、属性所有者Xの属性情報AT−Xについて、その閲覧を許可する属性検証者Yの公開鍵PK−Yを用いて暗号化した暗号化属性“E[PK−Y,AT−X]”を含む暗号化属性証明書を発行するようにしている。ここで、この暗号化属性証明書には、属性検証者Yの公開鍵PK−Yを特定する情報も含まれる。   In the prior art, as shown in FIG. 4, the attribute authority AA encrypts the attribute information AT-X of the attribute owner X by using the public key PK-Y of the attribute verifier Y who permits the browsing. The encrypted attribute certificate including the encrypted attribute “E [PK-Y, AT-X]” is issued. Here, the encrypted attribute certificate also includes information for specifying the public key PK-Y of the attribute verifier Y.

この暗号化属性証明書により、属性検証者Yのみが属性所有者Xの属性情報AT−Xを検証することができるようになる。   With this encrypted attribute certificate, only the attribute verifier Y can verify the attribute information AT-X of the attribute owner X.

また、従来技術では、属性検証者が“Y1,Y2,・・・”というように複数存在する場合には、それぞれの公開鍵“PK−Y1,PK−Y2,・・・”を用いた暗号化属性“E[PK−Y1,AT−X],E[PK−Y2,AT−X],・・・”を作成して、これらのすべてを属性情報とする暗号化属性証明書を発行するようにしている。
ITU−T X.509 IETF RFC3281
Further, in the prior art, when there are a plurality of attribute verifiers such as “Y1, Y2,...”, Encryption using the respective public keys “PK-Y1, PK-Y2,. Creation attributes “E [PK-Y1, AT-X], E [PK-Y2, AT-X],...” And issue an encryption attribute certificate having all of them as attribute information I am doing so.
ITU-T X. 509 IETF RFC 3281

しかしながら、従来技術では、下記のケースで問題がある。   However, the prior art has problems in the following cases.

(i)属性検証者が多数存在する場合
従来技術では、属性検証者が多数存在する場合には、暗号化属性証明書に掲載する暗号化属性“E[PK−Y1,AT−X],E[PK−Y2,AT−X],・・・”も多数となることで、暗号化属性証明書のサイズが大きくなり取り扱いが困難となる。それと同時に、属性認証局の発行処理の負荷も増大する。
(I) When there are a large number of attribute verifiers In the prior art, when there are a large number of attribute verifiers, the encrypted attributes “E [PK-Y1, AT-X], E The number of [PK-Y2, AT-X],... "Is also large, which increases the size of the encryption attribute certificate and makes it difficult to handle. At the same time, the load of the attribute certificate authority issuance process also increases.

(ii)属性証明書を発行する時点で属性検証者を個別に特定できない場合
暗号化属性証明書を発行する時点では属性検証者を個別に特定できないが、属性検証者の持つべき属性は決っている場合が存在する。
(Ii) When an attribute verifier cannot be specified individually when issuing an attribute certificate When an encrypted attribute certificate is issued, an attribute verifier cannot be specified individually, but the attributes that the attribute verifier should have are determined. There is a case.

このような場合、従来技術では、暗号化に用いる公開鍵が特定できないため、暗号化属性証明書を発行できない。   In such a case, according to the conventional technique, since the public key used for encryption cannot be specified, the encryption attribute certificate cannot be issued.

例えば、「すべての医師に閲覧を許可する属性情報」に関しては、上記(i)(ii)の両方に該当する。   For example, “attribute information that allows all doctors to browse” corresponds to both (i) and (ii) above.

すなわち、医師は多数おり、すべての医師の公開鍵で別々に暗号化した属性情報を掲載する暗号化属性証明書については、発行することも取り扱うことも困難である。   In other words, there are many doctors, and it is difficult to issue and handle an encrypted attribute certificate that includes attribute information separately encrypted with the public keys of all doctors.

また、暗号化属性証明書発行以後に医師になる人の公開鍵については、暗号化属性証明書発行時点では特定できないため、そのような医師でも検証できる暗号化属性証明書を発行することは不可能である。   In addition, since the public key of a person who becomes a doctor after issuing an encrypted attribute certificate cannot be specified at the time of issuing the encrypted attribute certificate, it is not possible to issue an encrypted attribute certificate that can be verified by such a doctor. Is possible.

本発明はかかる事情に鑑みてなされたものであって、属性検証者が多数存在する場合や、属性情報を暗号化した属性証明書を発行する時点で属性検証者を個別に特定できない場合に、それに対処できるようにする新たな属性認証技術の提供を目的とする。   The present invention has been made in view of such circumstances, and when there are a large number of attribute verifiers or when attribute verifiers cannot be individually identified at the time of issuing an attribute certificate in which attribute information is encrypted, The purpose is to provide a new attribute authentication technology that can cope with this.

この目的を達成するために、本発明を具備する属性認証システムでは、次の構成を採る属性認証装置と属性検証装置と属性検証支援装置とを備える。   In order to achieve this object, an attribute authentication system according to the present invention includes an attribute authentication device, an attribute verification device, and an attribute verification support device having the following configuration.

(1)本発明の属性認証装置の構成
本発明の属性認証装置は、属性認証局を構築すべく動作するものであって、(イ)属性検証者の属性を識別する情報である検証者属性情報を取得する第1の取得手段と、(ロ)属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報を取得する第2の取得手段と、(ハ)属性復号機関の公開鍵を用いて属性所有者の属性情報を暗号化することで属性所有者の暗号化属性情報を生成する生成手段と、(ニ)生成手段の生成した暗号化属性情報と、第1の取得手段の取得した検証者属性情報と、第2の取得手段の取得した復号鍵所有者情報とを掲載した暗号化属性証明書を発行する発行手段とを備える。
(1) Configuration of Attribute Authentication Device of the Present Invention An attribute authentication device of the present invention operates to construct an attribute authority, and (a) a verifier attribute that is information for identifying an attribute verifier attribute. A first obtaining means for obtaining information; and (b) second obtaining decryption key owner information, which is information for identifying the public key of the attribute decryption organization that owns the decryption key of the encrypted attribute information of the attribute owner. (C) generating means for generating attribute owner encrypted attribute information by encrypting attribute owner attribute information using the public key of the attribute decryption organization, and (d) An issuing means for issuing an encrypted attribute certificate in which the generated encrypted attribute information, the verifier attribute information acquired by the first acquiring means, and the decryption key owner information acquired by the second acquiring means are posted; Is provided.

以上の各処理手段が動作することで実現される本発明の暗号化属性証明書発行方法はコンピュータプログラムで実現できるものであり、このコンピュータプログラムは、半導体メモリなどのような適当な記録媒体に記録して提供されたり、ネットワークを介して提供され、本発明を実施する際にインストールされてCPUなどの制御手段上で動作することにより本発明を実現することになる。   The encrypted attribute certificate issuance method of the present invention realized by the operation of each of the above processing means can be realized by a computer program, and this computer program is recorded on an appropriate recording medium such as a semiconductor memory. Or provided via a network, installed when the present invention is carried out, and operated on a control means such as a CPU, thereby realizing the present invention.

(2)本発明の属性検証装置
本発明の属性検証装置は、属性検証者の操作する装置として動作するものであって、(イ)上述のように構成される本発明の属性認証装置が発行する暗号化属性証明書(暗号化属性情報と検証者属性情報と復号鍵所有者情報とを掲載する)を取得する取得手段と、(ロ)取得手段の取得した暗号化属性証明書に掲載される復号鍵所有者情報を使って属性復号機関を認証する認証手段と、(ハ)認証手段により属性復号機関を認証できる場合に、属性検証者の属性情報について証明した検証者属性証明書と、取得手段の取得した暗号化属性証明書とを指定して、その暗号化属性証明書に掲載される暗号化属性情報の開示を依頼する依頼手段と、(ニ)依頼手段による開示依頼に応答して返信されてくる自装置の公開鍵で再暗号化された暗号化属性情報についての再暗号化情報を復号することで、属性所有者の属性情報を復号する復号手段とを備える。
(2) Attribute verification apparatus of the present invention The attribute verification apparatus of the present invention operates as an apparatus operated by an attribute verifier, and (b) issued by the attribute authentication apparatus of the present invention configured as described above. And (b) an encrypted attribute certificate acquired by the acquiring means, which obtains an encrypted attribute certificate (which includes encrypted attribute information, verifier attribute information, and decryption key owner information). Authentication means that authenticates the attribute decryption authority using the decryption key owner information, and (c) a verifier attribute certificate that proves the attribute information of the attribute verifier when the attribute decryption authority can be authenticated by the authentication means, Specify the encrypted attribute certificate acquired by the acquiring means, request the disclosure of the encrypted attribute information posted in the encrypted attribute certificate, and (d) respond to the disclosure request by the requesting means Publish your own device And decrypting means for decrypting the attribute information of the attribute owner by decrypting the re-encrypted information on the encrypted attribute information re-encrypted with the key.

この構成を採るときにあって、認証手段は、例えば、属性復号機関にチャレンジ情報を送信し、それに応答して返信されてくる属性復号機関の秘密鍵で暗号化されたそのチャレンジ情報を、暗号化属性証明書に掲載される復号鍵所有者情報により特定される属性復号機関の公開鍵で復号することで、属性復号機関を認証する。   When adopting this configuration, the authentication means, for example, transmits challenge information to the attribute decryption authority, and encrypts the challenge information encrypted with the private key of the attribute decryption authority returned in response to the challenge information. The attribute decryption authority is authenticated by decrypting with the public key of the attribute decryption authority specified by the decryption key owner information posted in the generalized attribute certificate.

以上の各処理手段が動作することで実現される本発明の属性検証方法はコンピュータプログラムで実現できるものであり、このコンピュータプログラムは、半導体メモリなどのような適当な記録媒体に記録して提供されたり、ネットワークを介して提供され、本発明を実施する際にインストールされてCPUなどの制御手段上で動作することにより本発明を実現することになる。   The attribute verification method of the present invention realized by the operation of each of the above processing means can be realized by a computer program, and this computer program is provided by being recorded on an appropriate recording medium such as a semiconductor memory. Alternatively, the present invention is realized by being provided via a network, installed when the present invention is carried out, and operating on a control means such as a CPU.

(3)本発明の属性検証支援装置
本発明の属性検証支援装置は、本発明で新たに設けられる属性復号機関を構築すべく動作するものであって、(イ)上述のように構成される本発明の属性検証装置が発行する開示依頼(検証者属性証明書と暗号化属性証明書とを指定して発行される)を受け取る受取手段と、(ロ)受取手段の受け取った暗号化属性証明書に掲載される検証者属性情報と、受取手段の受け取った検証者属性証明書とを使って属性検証者を認証する認証手段と、(ハ)認証手段により属性検証者を認証できる場合に、受取手段の受け取った暗号化属性証明書に掲載される暗号化属性情報を復号可能な形で属性検証者に開示する開示手段とを備える。
(3) Attribute verification support apparatus of the present invention The attribute verification support apparatus of the present invention operates to construct an attribute decoding engine newly provided in the present invention, and is configured as described above. Receiving means for receiving a disclosure request (issued by designating a verifier attribute certificate and an encrypted attribute certificate) issued by the attribute verification apparatus of the present invention; and (b) an encrypted attribute certificate received by the receiving means. When the verifier attribute information included in the certificate and the verifier attribute certificate received by the receiving means are used to authenticate the attribute verifier, and (c) the attribute verifier can be authenticated by the authentication means, Disclosing means for disclosing to the attribute verifier the encrypted attribute information posted in the encrypted attribute certificate received by the receiving means in a decryptable form.

この構成を採るときにあって、認証手段は、例えば、検証者属性証明書をそれを発行した属性認証局の公開鍵で認証して、その認証が得られる場合に、暗号化属性証明書に掲載される検証者属性情報の記述する属性検証者の属性情報と、検証者属性証明書の記述する属性検証者の属性情報とが一致するのか否かを判断することで、属性検証者を認証する。   When adopting this configuration, the authentication means, for example, authenticates the verifier attribute certificate with the public key of the attribute authority that issued it, and if the authentication is obtained, The attribute verifier is authenticated by judging whether or not the attribute information of the attribute verifier described in the verifier attribute information to be posted matches the attribute information of the attribute verifier described in the verifier attribute certificate. To do.

また、開示手段は、例えば、暗号化属性証明書に掲載される暗号化属性情報を復号し、属性検証者の公開鍵を用いてそれを再暗号して属性検証者に開示する。   Further, for example, the disclosure means decrypts the encrypted attribute information posted in the encrypted attribute certificate, re-encrypts it using the attribute verifier's public key, and discloses it to the attribute verifier.

以上の各処理手段が動作することで実現される本発明の属性検証支援方法はコンピュータプログラムで実現できるものであり、このコンピュータプログラムは、半導体メモリなどのような適当な記録媒体に記録して提供されたり、ネットワークを介して提供され、本発明を実施する際にインストールされてCPUなどの制御手段上で動作することにより本発明を実現することになる。   The attribute verification support method of the present invention realized by the operation of each of the above processing means can be realized by a computer program, and this computer program is recorded on an appropriate recording medium such as a semiconductor memory and provided. Or provided via a network, installed when implementing the present invention, and operated on a control means such as a CPU, thereby realizing the present invention.

(4)本発明の属性検証処理
このように構成される本発明を具備する認証システムでは、本発明の属性認証装置は、本発明で新たに設ける属性復号機関の公開鍵を用いて、属性所有者の属性情報を暗号化することで属性所有者の暗号化属性情報を生成して、属性所有者に対して、その暗号化属性情報と検証者の属性情報と属性復号機関の公開鍵とを掲載した暗号化属性証明書を発行する。
(4) Attribute verification process of the present invention In the authentication system having the present invention configured as described above, the attribute authentication apparatus of the present invention uses the public key of the attribute decryption organization newly provided in the present invention to own the attribute. By encrypting the attribute information of the user, the encrypted attribute information of the attribute owner is generated, and the encrypted attribute information, the verifier attribute information, and the public key of the attribute decryption organization are transmitted to the attribute owner. Issue the listed encryption attribute certificate.

この暗号化属性証明書の発行を受けて、本発明の属性検証装置は、属性所有者から暗号化属性証明書を受け取ると、属性復号機関として動作する本発明の属性検証支援装置に対して、チャレンジ情報を送信し、それに応答して返信されてくる属性復号機関の秘密鍵で暗号化されたそのチャレンジ情報を、その受け取った暗号化属性証明書に掲載される属性復号機関の公開鍵で復号することで、属性復号機関を認証する。   Upon receiving the issue of the encrypted attribute certificate, the attribute verification apparatus of the present invention receives the encrypted attribute certificate from the attribute owner, the attribute verification support apparatus of the present invention that operates as an attribute decryption authority, The challenge information is sent and the response information encrypted in response to the attribute decryption authority's private key is decrypted with the attribute decryption authority's public key posted on the received encrypted attribute certificate. By doing so, the attribute decryption authority is authenticated.

そして、本発明の属性検証装置は、このようにして属性復号機関を認証すると、属性復号機関として動作する本発明の属性検証支援装置に対して、本発明の属性認証装置により構築される属性認証局などから取得した検証者属性証明書と、属性所有者から受け取った暗号化属性証明書とを指定して、その暗号化属性証明書に掲載される暗号化属性情報の開示を依頼する。   Then, when the attribute verification apparatus of the present invention authenticates the attribute decryption authority in this way, the attribute verification apparatus constructed by the attribute authentication apparatus of the present invention for the attribute verification support apparatus of the present invention that operates as the attribute decryption authority. A verifier attribute certificate obtained from a station or the like and an encrypted attribute certificate received from the attribute owner are specified, and a request is made to disclose the encrypted attribute information posted on the encrypted attribute certificate.

この暗号化属性情報の開示依頼を受けて、本発明の属性検証支援装置は、その開示依頼で指定される検証者属性証明書を属性認証局の公開鍵で認証して、その認証が得られる場合に、その開示依頼で指定される暗号化属性証明書に掲載される検証者属性情報の記述する属性検証者の属性情報と、その開示依頼で指定される検証者属性証明書の記述する属性検証者の属性情報とが一致するのか否かを判断することで、属性検証者を認証する。   Upon receiving the request for disclosure of the encrypted attribute information, the attribute verification support apparatus of the present invention authenticates the verifier attribute certificate specified in the request for disclosure with the public key of the attribute certification authority, thereby obtaining the authentication. The attribute information of the attribute verifier described in the verifier attribute information listed in the encrypted attribute certificate specified in the disclosure request and the attribute described in the verifier attribute certificate specified in the disclosure request. The attribute verifier is authenticated by determining whether or not the attribute information of the verifier matches.

そして、本発明の属性検証支援装置は、このようにして属性検証者を認証すると、その開示依頼で指定される暗号化属性証明書に掲載される暗号化属性情報を自装置の秘密鍵で復号し、続いて、属性検証者の公開鍵を用いて、その復号した情報を再暗号して、本発明の属性検証装置に返信する。   When the attribute verification support apparatus of the present invention authenticates the attribute verifier in this way, the encrypted attribute information posted in the encrypted attribute certificate specified in the request for disclosure is decrypted with the private key of the own apparatus. Subsequently, using the public key of the attribute verifier, the decrypted information is re-encrypted and returned to the attribute verification apparatus of the present invention.

この再暗号化された属性所有者の属性情報を受けて、本発明の属性検証装置は、自装置の秘密鍵を用いてその再暗号化情報を復号することで、属性所有者の属性情報を復号することで取得する。   Upon receiving this re-encrypted attribute owner attribute information, the attribute verification apparatus of the present invention decrypts the re-encrypted information using its own secret key, thereby obtaining the attribute owner attribute information. Obtained by decryption.

このようにして、本発明では、属性所有者の属性情報については、属性認証局が信頼できる属性復号機関の公開鍵を用いて暗号化するという構成を採る。   In this way, the present invention adopts a configuration in which the attribute information of the attribute owner is encrypted using the public key of the attribute decryption authority that the attribute authority can trust.

これにより、本発明によれば、暗号化属性証明書に記載する暗号化属性は一つで済み、上記(i)の問題が解決できる。   Thus, according to the present invention, only one encryption attribute is required to be described in the encryption attribute certificate, and the problem (i) can be solved.

また、本発明では、属性検証者のみが所有する検証者属性情報(たとえば「医師」というような属性情報)を暗号化属性証明書に記載するという構成を採る。   Further, the present invention adopts a configuration in which verifier attribute information (for example, attribute information such as “doctor”) owned by only the attribute verifier is described in the encrypted attribute certificate.

これにより、本発明によれば、暗号化属性証明書を発行する時点で属性検証者を個別に特定できなくとも、属性検証者の属性情報が決っていれば、その検証者属性情報を所有する者のみが検証できる暗号化属性証明書を発行でき、上記(ii)の問題が解決できる。   Thus, according to the present invention, even if the attribute verifier cannot be individually identified at the time of issuing the encrypted attribute certificate, if the attribute information of the attribute verifier is determined, the verifier attribute information is owned. Encrypted attribute certificates that can be verified only by the user can be issued, and the problem (ii) can be solved.

このようにして、本発明によれば、属性検証者が多数存在する場合や、属性情報を暗号化した属性証明書を発行する時点で属性検証者を個別に特定できない場合に、それに対処できるようになる。   In this way, according to the present invention, when there are a large number of attribute verifiers, or when the attribute verifiers cannot be individually identified at the time of issuing the attribute certificate in which the attribute information is encrypted, it can be dealt with. become.

以下、実施の形態に従って本発明を詳細に説明する。   Hereinafter, the present invention will be described in detail according to embodiments.

図1に、本発明を具備する認証システムのシステム構成を図示する。   FIG. 1 illustrates a system configuration of an authentication system including the present invention.

この図に示すように、本発明を具備する認証システムは、属性所有者の暗号化属性証明書を発行する属性認証局1と、属性所有者の操作する属性所有者端末2と、属性検証者の操作する属性検証者端末3と、属性検証者を支援する属性復号機関4とを備える。   As shown in this figure, an authentication system comprising the present invention includes an attribute authority 1 that issues an attribute attribute encrypted attribute certificate, an attribute owner terminal 2 that is operated by the attribute owner, and an attribute verifier. Are provided with an attribute verifier terminal 3 and an attribute decryption organization 4 that supports the attribute verifier.

以下、属性認証局1を識別する記号としてAAを用い、属性所有者を識別する記号としてXを用い、属性検証者を識別する記号としてYを用い、属性復号機関4を識別する記号としてDAを用い、属性所有者Xに対して発行する暗号化属性証明書を識別する記号としてAC−Xを用いている。   Hereinafter, AA is used as a symbol for identifying the attribute authority 1, X is used as a symbol for identifying the attribute owner, Y is used as a symbol for identifying the attribute verifier, and DA is used as a symbol for identifying the attribute decryption organization 4. AC-X is used as a symbol for identifying the encrypted attribute certificate issued to the attribute owner X.

また、属性認証局1の秘密鍵をSK−AA、属性認証局1の公開鍵をPK−AA、属性所有者Xの属性をAT−X、属性所有者Xの秘密鍵をSK−X、属性所有者Xの公開鍵をPK−X、属性検証者Yの属性をAT−Y、属性検証者Yの秘密鍵をSK−Y、属性検証者Yの公開鍵をPK−Yで示している。   Further, the secret key of the attribute certification authority 1 is SK-AA, the public key of the attribute certification authority 1 is PK-AA, the attribute of the attribute owner X is AT-X, the secret key of the attribute owner X is SK-X, the attribute The owner X's public key is PK-X, the attribute verifier Y's attribute is AT-Y, the attribute verifier Y's private key is SK-Y, and the attribute verifier Y's public key is PK-Y.

本実施形態例では、すべてのエンティティは各自の公開鍵方式の秘密鍵を有しているものとする。また、これに対応する各自の公開鍵は、すべてのエンティティに公開されており、個別の通信やリポジトリによってアクセス可能であるものとする。   In the present embodiment example, it is assumed that all entities have their own public key private keys. In addition, each public key corresponding to this is open to all entities and can be accessed by individual communication or repository.

一般的には、公開鍵は公開鍵証明書の形で各エンティティの識別名と対応付けられているが、本実施形態例では説明を簡単にするために公開鍵証明書は用いない。しかし、公開鍵を公開鍵証明書に置き換え、属性証明書に記載される所有者を識別名に置き換え、適切な認証局ドメインを想定すれば、本実施形態例を公開鍵証明書ベースとすることは容易である。   In general, the public key is associated with the identification name of each entity in the form of a public key certificate. However, in this embodiment, the public key certificate is not used to simplify the description. However, if the public key is replaced with a public key certificate, the owner described in the attribute certificate is replaced with a distinguished name, and an appropriate certificate authority domain is assumed, this embodiment is based on the public key certificate. Is easy.

また、本実施形態例では、属性検証者Yは、鍵ペアの他に、図1中に示すように、Yが属性検証者の資格を有することを証明する属性認証局1が発行した検証者属性証明書(以下、AC−Yと記載することがある)を所有しているものとする。   In this embodiment, the attribute verifier Y is a verifier issued by the attribute certification authority 1 that proves that Y has the attribute verifier qualification, as shown in FIG. 1, in addition to the key pair. Assume that you have an attribute certificate (hereinafter sometimes referred to as AC-Y).

この検証者属性証明書AC−Yは、暗号化属性証明書AC−Xを発行した後に発行されてもよい。また、検証者属性証明書AC−Yを発行する属性認証局は必ずしも本実施形態例の属性認証局1である必要はないが、この属性認証局1が信頼する属性認証局でなければならない。   The verifier attribute certificate AC-Y may be issued after the encryption attribute certificate AC-X is issued. The attribute authority that issues the verifier attribute certificate AC-Y does not necessarily need to be the attribute authority 1 of the present embodiment, but it must be an attribute authority that the attribute authority 1 trusts.

本実施形態例を構成するプロセスは下記の3つである。   There are the following three processes constituting the present embodiment.

〔1〕暗号化属性証明書AC−Xの発行
属性認証局1は、属性所有者Xに対して、暗号化属性証明書AC−Xを発行する。この暗号化属性証明書AC−Xは、属性所有者Xが属性AT−Xを所有しているということを、属性認証局1が証明するものである。
[1] Issuance of Encrypted Attribute Certificate AC-X The attribute authority 1 issues an encrypted attribute certificate AC-X to the attribute owner X. In the encrypted attribute certificate AC-X, the attribute certificate authority 1 proves that the attribute owner X owns the attribute AT-X.

この暗号化属性証明書AC−Xに記載されている属性AT−Xは、AT−Yという属性を所有する者(属性検証者Y)しか閲覧できないものである。   The attribute AT-X described in the encrypted attribute certificate AC-X can be browsed only by a person who has the attribute AT-Y (attribute verifier Y).

〔2〕暗号化属性の証明/検証
属性所有者Xは、暗号化属性証明書AC−Xを用いて、Xが属性AT−Xを所有しているということを、属性検証者Yに対して証明する。
[2] Encryption attribute proof / verification The attribute owner X uses the encrypted attribute certificate AC-X to inform the attribute verifier Y that X owns the attribute AT-X. Prove it.

この暗号化属性証明書AC−Xの記載する属性情報(属性所有者Xの属性AT−X)については、属性復号機関4の公開鍵で暗号化されており、そのままでは属性検証者Yはこれを検証できないため、属性検証者Yは、下記のプロセスにより属性復号機関4に対して暗号化属性の開示を依頼する。   The attribute information described in the encrypted attribute certificate AC-X (the attribute AT-X of the attribute owner X) is encrypted with the public key of the attribute decryption organization 4, and the attribute verifier Y does not change this. Therefore, the attribute verifier Y requests the attribute decryption agency 4 to disclose the encrypted attribute by the following process.

〔3〕属性情報の開示
属性検証者Yは、属性復号機関4に対して、検証対象である暗号化属性証明書AC−Xと、Yの検証者属性証明書AC−Yとを提示し、暗号化属性の開示を依頼する。
[3] Disclosure of attribute information The attribute verifier Y presents the encrypted attribute certificate AC-X to be verified and the Y verifier attribute certificate AC-Y to the attribute decryption authority 4, Request disclosure of encryption attributes.

ここでは、まず、属性検証者Yと属性復号機関4とは、双方が属性認証局1が定めた正当な属性検証者と属性復号機関であるということを、相互に認証する。その後、属性復号機関4は、自機関の秘密鍵SK−DAで暗号化属性を復号して、属性検証者Yの公開鍵PK−Yで再度暗号化し、これを属性検証者Yに送付することにより、属性検証者Yは暗号化属性の内容(属性所有者Xの属性AT−X)を閲覧することが可能になる。   Here, first, the attribute verifier Y and the attribute decryption authority 4 mutually authenticate that they are both a valid attribute verifier and an attribute decryption authority defined by the attribute certification authority 1. Thereafter, the attribute decryption organization 4 decrypts the encrypted attribute with the private key SK-DA of the organization, encrypts it again with the public key PK-Y of the attribute verifier Y, and sends this to the attribute verifier Y. Thus, the attribute verifier Y can browse the contents of the encrypted attribute (attribute AT-X attribute AT-X).

図2に、本発明を実現すべく属性認証局1が発行する暗号化属性証明書AC−Xの基本的な構成の一例を示す。   FIG. 2 shows an example of the basic configuration of the encrypted attribute certificate AC-X issued by the attribute authority 1 to realize the present invention.

この図に示すように、暗号化属性証明書AC−Xの発行者は属性認証局1である。また、暗号化属性証明書AC−Xの所有者は所有者Xである。一般的に、属性証明書の所有者要素は所有者の公開鍵証明書の識別名を用いることが多いが、本実施形態例では属性所有者Xの公開鍵を用いている。   As shown in this figure, the issuer of the encrypted attribute certificate AC-X is the attribute certificate authority 1. The owner of the encryption attribute certificate AC-X is the owner X. In general, the owner element of the attribute certificate often uses the identification name of the owner's public key certificate, but in this embodiment, the public key of the attribute owner X is used.

暗号化属性証明書AC−Xは、以下の3つの情報を含む。   The encryption attribute certificate AC-X includes the following three pieces of information.

〔イ〕属性検証者Yの属性AT−Y
本実施形態例では、一例として属性検証者Yの属性AT−Yそのものを用いているが、これについて属性AT−Yの識別ID等、属性検証者Yの属性AT−Yを特定できる情報であればよい。
[I] Attribute AT-Y of attribute verifier Y
In the present embodiment example, the attribute AT-Y of the attribute verifier Y itself is used as an example. However, for this, information that can identify the attribute AT-Y of the attribute verifier Y such as the identification ID of the attribute AT-Y. That's fine.

〔ロ〕属性復号機関4の公開鍵PK−DA
本実施形態例では、一例として属性復号機関4の公開鍵PK−DAを用いているが、これについては属性復号機関4の公開証明書の識別名等、属性復号機関4の公開鍵PK−DAを特定できる情報であればよい。
[B] Public key PK-DA of attribute decryption organization 4
In the present embodiment example, the public key PK-DA of the attribute decryption authority 4 is used as an example. For this, the public key PK-DA of the attribute decryption authority 4 such as the identification name of the public certificate of the attribute decryption authority 4 is used. Any information can be used as long as it can be identified.

〔ハ〕暗号化属性情報E[PK−DA,AT−X]
属性復号機関4の公開鍵PK−DAで暗号化した属性所有者Xの属性AT−Xを付与する。この暗号化属性情報E[PK−DA,AT−X]はPK−DAに対応する秘密鍵SK−DAでなければ復号できず、SK−DAについては属性復号機関のみが持っているため、この暗号化属性情報については属性復号機関4のみが復号・閲覧可能となる。
[C] Encryption attribute information E [PK-DA, AT-X]
The attribute AT-X of the attribute owner X encrypted with the public key PK-DA of the attribute decryption organization 4 is assigned. This encrypted attribute information E [PK-DA, AT-X] can be decrypted only by the secret key SK-DA corresponding to PK-DA, and only the attribute decryption organization has SK-DA. Only the attribute decryption organization 4 can decrypt and view the encrypted attribute information.

図3に、本発明に係る暗号化属性の証明と属性情報開示のプロトコルについて示す。この図は、属性所有者Xが属性検証者Yに所有者属性を証明するにあたり、属性検証者Yが属性復号機関4に所有者属性の開示を依頼する一連のプロトコルを示している。   FIG. 3 shows the encryption attribute proof and attribute information disclosure protocol according to the present invention. This figure shows a series of protocols in which the attribute verifier Y requests the attribute decryption organization 4 to disclose the owner attribute when the attribute owner X proves the owner attribute to the attribute verifier Y.

本発明では、属性認証局1は、属性所有者Xの属性AT−Xを取得すると、予め取得してある属性復号機関4の公開鍵PK−DAを用いて、この属性AT−Xを暗号化することで属性所有者Xの暗号化属性情報E[PK−DA,AT−X]を生成して、この生成した暗号化属性情報E[PK−DA,AT−X]と、その暗号化に用いた属性復号機関4の公開鍵PK−DAと、属性検証者Yの属性AT−Yとを掲載する暗号化属性証明書AC−Xを作成して、それを属性所有者Xに発行する。   In the present invention, when the attribute authority 1 acquires the attribute AT-X of the attribute owner X, the attribute AT-X is encrypted using the public key PK-DA of the attribute decryption organization 4 acquired in advance. As a result, encrypted attribute information E [PK-DA, AT-X] of the attribute owner X is generated, and the generated encrypted attribute information E [PK-DA, AT-X] and its encryption are used. An encrypted attribute certificate AC-X in which the public key PK-DA of the used attribute decryption organization 4 and the attribute AT-Y of the attribute verifier Y are posted is generated and issued to the attribute owner X.

この暗号化属性証明書AC−Xの発行を受けて、図3に示すように、属性所有者Xは、属性検証者Yに対して、暗号化属性証明書AC−Xと、秘密鍵SK−Xで作成した署名S[SK−X]とを送信する(図3の(1))。   Upon receiving the issuance of the encrypted attribute certificate AC-X, the attribute owner X sends the encrypted attribute certificate AC-X and the secret key SK- to the attribute verifier Y as shown in FIG. The signature S [SK-X] created by X is transmitted ((1) in FIG. 3).

その後、以下のステップにより、属性検証者Yは、その署名S[SK−X]の作成者が属性AT−Xを所有していることを検証する。   Thereafter, the attribute verifier Y verifies that the creator of the signature S [SK-X] owns the attribute AT-X by the following steps.

すなわち、属性検証者Yは、暗号化属性証明書AC−Xと署名S[SK−X]とを受信すると(図3の(2))、最初に、属性認証局1の公開鍵PK−AAにより、暗号化属性証明書AC−Xに付与された属性認証局1の署名(図2中に示す“S[SK−AA]”)を検証する(図3の(3))。このとき必要となる公開鍵PK−AAについては例えばリポジトリ等から入手可能である。   That is, when the attribute verifier Y receives the encrypted attribute certificate AC-X and the signature S [SK-X] ((2) in FIG. 3), first, the attribute verifier 1 public key PK-AA Thus, the signature (“S [SK-AA]” shown in FIG. 2) of the attribute certificate authority 1 attached to the encrypted attribute certificate AC-X is verified ((3) in FIG. 3). The public key PK-AA required at this time can be obtained from, for example, a repository.

暗号化属性証明書AC−Xの署名検証結果が正当であれば、その暗号化属性証明書AC−Xは属性認証局1が発行したものであり、暗号化属性証明書AC−Xに記載される公開鍵PK−Xと暗号化属性情報E[PK−DA,AT−X]との対応関係が証明される。   If the signature verification result of the encrypted attribute certificate AC-X is valid, the encrypted attribute certificate AC-X is issued by the attribute authority 1, and is described in the encrypted attribute certificate AC-X. The corresponding relationship between the public key PK-X and the encrypted attribute information E [PK-DA, AT-X] is proved.

続いて、属性所有者Xの公開鍵PK−Xにより、暗号化属性証明書AC−Xに対応付けて送られてきた署名S[SK−X]を検証する(図3の(3))。   Subsequently, the signature S [SK-X] sent in association with the encrypted attribute certificate AC-X is verified by the public key PK-X of the attribute owner X ((3) in FIG. 3).

S[SK−X]の署名検証結果が正当であれば、暗号化属性証明書AC−Xの検証結果とあわせて、S[SK−X]は、暗号化属性証明書AC−Xの暗号化属性情報E[PK−DA,AT−X]を所有する者が作成した署名であると確認できる。   If the signature verification result of S [SK-X] is valid, along with the verification result of the encrypted attribute certificate AC-X, S [SK-X] encrypts the encrypted attribute certificate AC-X. It can be confirmed that the signature is created by a person who owns the attribute information E [PK-DA, AT-X].

しかし、この段階では属性検証者Yは暗号化属性情報を復号できないため、属性所有者Xの属性の内容を知ることはできない。   However, since the attribute verifier Y cannot decrypt the encrypted attribute information at this stage, the attribute verifier Y cannot know the contents of the attribute of the attribute owner X.

次に、属性検証者Yは属性復号機関4と通信を行う。   Next, the attribute verifier Y communicates with the attribute decryption organization 4.

まず、属性検証者Yは、属性復号機関4に対して、乱数などのチャレンジ情報C1を送信し(図3の(4))、これを受けて、属性復号機関4は、チャレンジ情報C1を受信すると(図3の(5))、属性検証者Yに対して、チャレンジ情報C1に対する秘密鍵SK−DAによる署名S[SK−DA,C1]と、乱数などのチャレンジ情報C2とを返信する(図3の(6))。   First, the attribute verifier Y transmits challenge information C1 such as a random number to the attribute decryption organization 4 ((4) in FIG. 3), and the attribute decryption organization 4 receives the challenge information C1. Then ((5) in FIG. 3), the signature verifier S [SK-DA, C1] with the secret key SK-DA for the challenge information C1 and the challenge information C2 such as a random number are returned to the attribute verifier Y ( (6) of FIG.

属性検証者Yは、これらの情報を受信すると(図3の(7))、受信した署名S[SK−DA,C1]を、暗号化属性証明書AC−Xに記載される公開鍵PK−DAで検証する(図3の(8))。   Upon receiving these pieces of information ((7) in FIG. 3), the attribute verifier Y uses the received signature S [SK-DA, C1] as the public key PK- described in the encrypted attribute certificate AC-X. It verifies with DA ((8) of FIG. 3).

この検証結果が正当であれば、属性検証者Yは、暗号化属性証明書AC−Xで指定された属性復号機関4と接続したことを確認したことになり、この通信のサーバ認証が完了する。   If the verification result is valid, the attribute verifier Y has confirmed that he has connected to the attribute decryption authority 4 specified by the encrypted attribute certificate AC-X, and server authentication for this communication is completed. .

続いて、属性検証者Yは、属性復号機関4に対して、チャレンジ情報C2に対する秘密鍵SK−Yによる署名S[SK−Y,C2]と、復号依頼対象である暗号化属性証明書AC−Xと、属性検証者Yの属性を証明する検証者属性証明書AC−Yとを送信する(図3の(9))。   Subsequently, the attribute verifier Y sends the signature S [SK-Y, C2] with the secret key SK-Y to the challenge information C2 and the encrypted attribute certificate AC- that is the decryption request target to the attribute decryption authority 4. X and a verifier attribute certificate AC-Y certifying the attribute of the attribute verifier Y are transmitted ((9) in FIG. 3).

これを受けて、属性復号機関4は、これらの情報を受信する(図3の(10))。そして、受信した検証者属性証明書AC−Yを属性認証局1の公開鍵PK−AAで検証し、さらに、受信した署名S[SK−Y,C2]を検証者属性証明書AC−Yに付与された公開鍵PK−Yで検証し、さらに、検証者属性証明書AC−Yに記載される属性検証者Yの属性AT−Yと、暗号化属性証明書AC−Xに記載される属性検証者Yの属性AT−Yとが一致するのか否かを検証する(図3の(11))。   In response to this, the attribute decryption organization 4 receives these pieces of information ((10) in FIG. 3). Then, the received verifier attribute certificate AC-Y is verified with the public key PK-AA of the attribute certificate authority 1, and the received signature S [SK-Y, C2] is further added to the verifier attribute certificate AC-Y. The attribute AT-Y of the attribute verifier Y described in the verifier attribute certificate AC-Y and the attribute described in the encrypted attribute certificate AC-X are verified using the given public key PK-Y. It is verified whether or not the attribute AT-Y of the verifier Y matches ((11) in FIG. 3).

いずれの検証結果も正当であれば、属性復号機関4は、通信中の属性検証者Yが属性AT−Yを所有していることを確認できる。この時点で属性検証者Yの認証が完了する。   If any verification result is valid, the attribute decryption organization 4 can confirm that the attribute verifier Y in communication possesses the attribute AT-Y. At this point, authentication of the attribute verifier Y is completed.

続いて、属性復号機関4は、暗号化属性証明書AC−Xに記載される暗号化属性情報E[PK−DA,AT−X]を秘密鍵SK−DAを用いて復号して、属性所有者Xの属性AT−Xを取り出す(図3の(12))。   Subsequently, the attribute decryption authority 4 decrypts the encrypted attribute information E [PK-DA, AT-X] described in the encrypted attribute certificate AC-X using the secret key SK-DA, and owns the attribute. The attribute AT-X of the person X is extracted ((12) in FIG. 3).

続いて、属性復号機関4は、属性所有者Xの属性AT−Xを属性検証者Yの公開鍵PK−Yで再暗号化することで再暗号化属性E[PK−Y,AT−X]を生成して、それを属性検証Yに送信する(図3の(13))。   Subsequently, the attribute decryption authority 4 re-encrypts the attribute AT-X of the attribute owner X with the public key PK-Y of the attribute verifier Y, thereby re-encrypting the attribute E [PK-Y, AT-X]. Is transmitted to the attribute verification Y ((13) in FIG. 3).

これを受けて、属性検証者Yは、再暗号化属性E[PK−Y,AT−X]を受信し(図3の(14))、この受信した再暗号化属性E[PK−Y,AT−X]を秘密鍵SK−Yで復号して、属性所有者Xの属性AT−Xを取り出す(図3の(15))。   In response to this, the attribute verifier Y receives the re-encrypted attribute E [PK-Y, AT-X] ((14) in FIG. 3), and receives the received re-encrypted attribute E [PK-Y, AT-X] is decrypted with the secret key SK-Y, and the attribute AT-X of the attribute owner X is extracted ((15) in FIG. 3).

以上により、属性検証者Yは、最初に受信した署名S[SK−X]の作成者が属性AT−Xを所有していることを確認できる(図3の(16))。   As described above, the attribute verifier Y can confirm that the creator of the signature S [SK-X] received first possesses the attribute AT-X ((16) in FIG. 3).

最後に、属性検証者Yは、上記の確認が成功したことを属性所有者Xに対して通知する(図3の(17))。   Finally, the attribute verifier Y notifies the attribute owner X that the above confirmation has been successful ((17) in FIG. 3).

このようにして、本発明では、属性所有者Xの属性AT−Xについては、属性認証局1が信頼できる属性復号機関4の公開鍵PK−DAを用いて暗号化するという構成を採る。これにより、本発明によれば、属性認証局1の発行する暗号化属性証明書に記載する暗号化属性は一つで済むようになる。   Thus, the present invention adopts a configuration in which the attribute AT-X of the attribute owner X is encrypted using the public key PK-DA of the attribute decryption authority 4 that the attribute certification authority 1 can trust. As a result, according to the present invention, only one encrypted attribute is required to be described in the encrypted attribute certificate issued by the attribute authority 1.

そして、本発明では、例えば「医師」というような属性検証者Yのみが所有する属性AT−Yを暗号化属性証明書に記載するという構成を採る。これにより、本発明によれば、暗号化属性証明書を発行する時点で属性検証者を個別に特定できなくとも、暗号化属性証明書を発行できるようになる。   In the present invention, for example, the attribute AT-Y owned by only the attribute verifier Y such as “doctor” is described in the encrypted attribute certificate. Thus, according to the present invention, the encrypted attribute certificate can be issued even if the attribute verifier cannot be individually specified at the time of issuing the encrypted attribute certificate.

このようにして、本発明によれば、属性検証者が多数存在する場合や、属性情報を暗号化した属性証明書を発行する時点で属性検証者を個別に特定できない場合に、それに対処できるようになる。   In this way, according to the present invention, when there are a large number of attribute verifiers, or when the attribute verifiers cannot be individually identified at the time of issuing the attribute certificate in which the attribute information is encrypted, it can be dealt with. become.

本発明を具備する認証システムのシステム構成図である。It is a system configuration figure of an authentication system which comprises the present invention. 暗号化属性証明書の一例を示す図である。It is a figure which shows an example of an encryption attribute certificate. 本発明の処理の説明図である。It is explanatory drawing of the process of this invention. 従来技術の説明図である。It is explanatory drawing of a prior art.

符号の説明Explanation of symbols

1 属性認証局
2 属性所有者端末
3 属性検証者端末
4 属性復号機関
1 Attribute Certification Authority 2 Attribute Owner Terminal 3 Attribute Verifier Terminal 4 Attribute Decryption Authority

Claims (14)

属性所有者の暗号化属性証明書を発行する暗号化属性証明書発行方法であって、
属性検証者の属性を識別する情報である検証者属性情報を取得する過程と、
属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報を取得する過程と、
上記属性復号機関の公開鍵を用いて属性所有者の属性情報を暗号化することで属性所有者の暗号化属性情報を生成する過程と、
上記暗号化属性情報と上記検証者属性情報と上記復号鍵所有者情報とを掲載した暗号化属性証明書を発行する過程とを備えることを、
特徴とする暗号化属性証明書発行方法。
An encryption attribute certificate issuing method for issuing an attribute owner's encryption attribute certificate,
A process of obtaining verifier attribute information which is information for identifying an attribute verifier attribute;
A process of obtaining decryption key owner information, which is information for identifying the public key of the attribute decryption organization that owns the decryption key of the attribute owner's encrypted attribute information;
Generating encrypted attribute information of the attribute owner by encrypting the attribute information of the attribute owner using the public key of the attribute decryption authority;
Issuing an encrypted attribute certificate in which the encrypted attribute information, the verifier attribute information, and the decryption key owner information are posted.
An encryption attribute certificate issuing method as a feature.
属性所有者の属性情報を検証する属性検証方法であって、
属性検証者の属性を識別する情報である検証者属性情報と、属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報と、該属性復号機関の公開鍵を用いて生成された属性所有者の暗号化属性情報とについて掲載した暗号化属性証明書を取得する過程と、
上記復号鍵所有者情報を使って上記属性復号機関を認証する過程と、
上記属性復号機関を認証できる場合に、属性検証者の属性情報について証明した検証者属性証明書と上記暗号化属性証明書とを指定して上記暗号化属性情報の開示を依頼する過程とを備えることを、
特徴とする属性検証方法。
An attribute verification method for verifying attribute information of an attribute owner,
Verifier attribute information that is information for identifying an attribute verifier attribute, decryption key owner information that is information for identifying a public key of an attribute decryption authority that owns the decryption key of the attribute owner's encrypted attribute information, Obtaining an encrypted attribute certificate listing the attribute owner's encrypted attribute information generated using the public key of the attribute decryption authority;
Authenticating the attribute decryption authority using the decryption key owner information;
A step of requesting the disclosure of the encrypted attribute information by designating the verifier attribute certificate certified for the attribute information of the attribute verifier and the encrypted attribute certificate when the attribute decryption authority can be authenticated. That
Feature attribute verification method.
請求項2に記載の属性検証方法において、
上記属性復号機関を認証する過程では、上記属性復号機関にチャレンジ情報を送信し、それに応答して返信されてくる上記属性復号機関の秘密鍵で暗号化された該チャレンジ情報を、上記復号鍵所有者情報により特定される上記属性復号機関の公開鍵で復号することで、上記属性復号機関を認証することを、
特徴とする属性検証方法。
The attribute verification method according to claim 2,
In the process of authenticating the attribute decryption authority, challenge information is transmitted to the attribute decryption authority, and the challenge information encrypted in response to the secret key of the attribute decryption authority returned in response to the challenge information Authenticating the attribute decryption authority by decrypting with the public key of the attribute decryption authority specified by the person information,
Feature attribute verification method.
請求項2又は3に記載の属性検証方法において、
上記開示依頼に応答して返信されてくる自装置の公開鍵で再暗号化された上記暗号化属性情報についての再暗号化情報を復号することで、属性所有者の属性情報を取得する過程を備えることを、
特徴とする属性検証方法。
In the attribute verification method according to claim 2 or 3,
A process of acquiring attribute information of the attribute owner by decrypting the re-encrypted information on the encrypted attribute information re-encrypted with the public key of the own device returned in response to the disclosure request. To prepare,
Feature attribute verification method.
属性所有者の属性情報の検証を支援する属性検証支援方法であって、
属性検証者の属性を識別する情報である検証者属性情報と、属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報と、該属性復号機関の公開鍵を用いて生成された属性所有者の暗号化属性情報とについて掲載した暗号化属性証明書と、属性検証者の属性情報について証明した検証者属性証明書とを指定する開示依頼を受け取る過程と、
上記検証者属性情報と上記検証者属性証明書とを使って属性検証者を認証する過程と、
属性検証者を認証できる場合に、上記暗号化属性情報を復号可能な形で属性検証者に開示する過程とを備えることを、
特徴とする属性検証支援方法。
An attribute verification support method for supporting verification of attribute information of an attribute owner,
Verifier attribute information that is information for identifying an attribute verifier attribute, decryption key owner information that is information for identifying a public key of an attribute decryption authority that owns the decryption key of the attribute owner's encrypted attribute information, Designate the encrypted attribute certificate posted for the attribute owner's encrypted attribute information generated using the public key of the attribute decryption authority, and the verifier attribute certificate certified for the attribute verifier's attribute information The process of receiving a disclosure request;
Authenticating the attribute verifier using the verifier attribute information and the verifier attribute certificate;
Including the step of disclosing the encrypted attribute information to the attribute verifier in a form that can be decrypted when the attribute verifier can be authenticated.
A feature attribute verification support method.
請求項5に記載の属性検証支援方法において、
上記属性検証者を認証する過程では、上記検証者属性証明書をそれを発行した属性認証局の公開鍵で認証して、その認証が得られる場合に、上記検証者属性情報の記述する属性検証者の属性情報と上記検証者属性証明書の記述する属性検証者の属性情報とが一致するのか否かを判断することで、属性検証者を認証することを、
特徴とする属性検証支援方法。
The attribute verification support method according to claim 5,
In the process of authenticating the attribute verifier, the attribute verification described in the verifier attribute information is obtained when the verifier attribute certificate is authenticated with the public key of the attribute certification authority that issued the certificate. Authenticating the attribute verifier by determining whether or not the attribute information of the verifier and the attribute information of the attribute verifier described in the verifier attribute certificate match.
A feature attribute verification support method.
請求項5又は6に記載の属性検証支援方法において、
上記開示する過程では、上記暗号化属性情報を復号し、属性検証者の公開鍵を用いてそれを再暗号して属性検証者に開示することを、
特徴とする属性検証支援方法。
In the attribute verification support method according to claim 5 or 6,
In the process of disclosing, decrypting the encrypted attribute information, re-encrypting it using the public key of the attribute verifier, and disclosing it to the attribute verifier,
A feature attribute verification support method.
属性所有者の属性情報を認証する属性認証装置であって、
属性検証者の属性を識別する情報である検証者属性情報を取得する手段と、
属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報を取得する手段と、
上記属性復号機関の公開鍵を用いて属性所有者の属性情報を暗号化することで属性所有者の暗号化属性情報を生成する手段と、
上記暗号化属性情報と上記検証者属性情報と上記復号鍵所有者情報とを掲載した暗号化属性証明書を発行する手段とを備えることを、
特徴とする属性認証装置。
An attribute authentication device for authenticating attribute information of an attribute owner,
Means for obtaining verifier attribute information which is information for identifying an attribute verifier attribute;
Means for obtaining decryption key owner information, which is information for identifying the public key of the attribute decryption organization that owns the decryption key of the encrypted attribute information of the attribute owner;
Means for generating attribute owner encrypted attribute information by encrypting the attribute information of the attribute owner using the public key of the attribute decryption authority;
Means for issuing an encrypted attribute certificate in which the encrypted attribute information, the verifier attribute information, and the decryption key owner information are posted;
Feature attribute authentication device.
属性検証者の操作する属性検証装置であって、
属性検証者の属性を識別する情報である検証者属性情報と、属性所有者の暗号化属性情報の復号鍵を所有する属性復号機関の公開鍵を識別する情報である復号鍵所有者情報と、該属性復号機関の公開鍵を用いて生成された属性所有者の暗号化属性情報とについて掲載した暗号化属性証明書を取得する手段と、
上記復号鍵所有者情報を使って上記属性復号機関を認証する手段と、
上記属性復号機関を認証できる場合に、属性検証者の属性情報について証明した検証者属性証明書と上記暗号化属性証明書とを指定して上記暗号化属性情報の開示を依頼する手段とを備えることを、
特徴とする属性検証装置。
An attribute verification device operated by an attribute verifier,
Verifier attribute information that is information for identifying an attribute verifier attribute, decryption key owner information that is information for identifying a public key of an attribute decryption authority that owns the decryption key of the attribute owner's encrypted attribute information, Means for obtaining an encrypted attribute certificate posted about the attribute owner's encrypted attribute information generated using the public key of the attribute decryption authority;
Means for authenticating the attribute decryption authority using the decryption key owner information;
And a means for requesting disclosure of the encrypted attribute information by designating the verifier attribute certificate certified for the attribute information of the attribute verifier and the encrypted attribute certificate when the attribute decryption authority can be authenticated. That
Feature attribute verification device.
請求項9に記載の属性検証装置において、
上記開示依頼に応答して返信されてくる自装置の公開鍵で再暗号化された上記暗号化属性情報についての再暗号化情報を復号することで、属性所有者の属性情報を復号する手段を備えることを、
特徴とする属性検証装置。
The attribute verification device according to claim 9,
Means for decrypting the attribute information of the attribute owner by decrypting the re-encrypted information on the encrypted attribute information re-encrypted with the public key of the own device returned in response to the disclosure request; To prepare,
Feature attribute verification device.
属性検証者の検証を支援する属性検証支援装置であって、
属性検証者の属性を識別する情報である検証者属性情報と、自装置の公開鍵を識別する情報である復号鍵所有者情報と、自装置の公開鍵を用いて生成された属性所有者の暗号化属性情報とについて掲載した暗号化属性証明書と、属性検証者の属性情報について証明した検証者属性証明書とを指定する開示依頼を受け取る手段と、
上記検証者属性情報と上記検証者属性証明書とを使って属性検証者を認証する手段と、
属性検証者を認証できる場合に、上記暗号化属性情報を復号可能な形で属性検証者に開示する手段とを備えることを、
特徴とする属性検証支援装置。
An attribute verification support device that supports verification of an attribute verifier,
Verifier attribute information, which is information for identifying the attribute verifier attribute, decryption key owner information, which is information for identifying the public key of the own device, and the attribute owner generated using the public key of the own device Means for receiving a disclosure request specifying the encrypted attribute certificate posted for the encrypted attribute information and the verifier attribute certificate certified for the attribute information of the attribute verifier;
Means for authenticating the attribute verifier using the verifier attribute information and the verifier attribute certificate;
When the attribute verifier can be authenticated, the encrypted attribute information is disclosed to the attribute verifier in a decryptable form.
A feature verification support device.
請求項1に記載の暗号化属性証明書発行方法の実現に用いられる処理をコンピュータに実行させるための暗号化属性証明書発行プログラム。   An encrypted attribute certificate issuing program for causing a computer to execute processing used to realize the encrypted attribute certificate issuing method according to claim 1. 請求項2ないし4のいずれか1項に記載の属性検証方法の実現に用いられる処理をコンピュータに実行させるための属性検証プログラム。   An attribute verification program for causing a computer to execute processing used to realize the attribute verification method according to claim 2. 請求項5ないし7のいずれか1項に記載の属性検証支援方法の実現に用いられる処理をコンピュータに実行させるための属性検証支援プログラム。   An attribute verification support program for causing a computer to execute processing used to realize the attribute verification support method according to claim 5.
JP2004125057A 2004-04-21 2004-04-21 Attribute verification method, attribute authentication system, and program for attribute authentication system Expired - Fee Related JP4615889B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004125057A JP4615889B2 (en) 2004-04-21 2004-04-21 Attribute verification method, attribute authentication system, and program for attribute authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004125057A JP4615889B2 (en) 2004-04-21 2004-04-21 Attribute verification method, attribute authentication system, and program for attribute authentication system

Publications (2)

Publication Number Publication Date
JP2005311648A true JP2005311648A (en) 2005-11-04
JP4615889B2 JP4615889B2 (en) 2011-01-19

Family

ID=35439915

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004125057A Expired - Fee Related JP4615889B2 (en) 2004-04-21 2004-04-21 Attribute verification method, attribute authentication system, and program for attribute authentication system

Country Status (1)

Country Link
JP (1) JP4615889B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013175040A (en) * 2012-02-24 2013-09-05 Nippon Telegr & Teleph Corp <Ntt> Authentication authority transfer system, information terminal, token issuing station, service providing device, authentication authority transfer method, and program

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0946335A (en) * 1995-05-19 1997-02-14 Hitachi Software Eng Co Ltd Method and system for exchanging electronic message, and storage medium for electronic message exchanging processing
JP2001209313A (en) * 2000-01-25 2001-08-03 Canon Inc Certificate issuing device, information processor, information communication system, attribute certifying method and storage medium
JP2002342167A (en) * 2001-05-14 2002-11-29 Nippon Telegr & Teleph Corp <Ntt> Device for managing entity information
JP2003345931A (en) * 2002-05-28 2003-12-05 Nippon Telegr & Teleph Corp <Ntt> Private information distribution management method, private information identification device in private information distribution management system, private information using environment identification device, private information providing device, private information using device, disclosure use rule determination program. and program for each device.
JP2003348077A (en) * 2002-05-27 2003-12-05 Hitachi Ltd Method and device for verifying attribute certificate
JP2004118455A (en) * 2002-09-25 2004-04-15 Sony Corp Data exchange system, data exchange method, data exchange program, and storage medium recording data exchange program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0946335A (en) * 1995-05-19 1997-02-14 Hitachi Software Eng Co Ltd Method and system for exchanging electronic message, and storage medium for electronic message exchanging processing
JP2001209313A (en) * 2000-01-25 2001-08-03 Canon Inc Certificate issuing device, information processor, information communication system, attribute certifying method and storage medium
JP2002342167A (en) * 2001-05-14 2002-11-29 Nippon Telegr & Teleph Corp <Ntt> Device for managing entity information
JP2003348077A (en) * 2002-05-27 2003-12-05 Hitachi Ltd Method and device for verifying attribute certificate
JP2003345931A (en) * 2002-05-28 2003-12-05 Nippon Telegr & Teleph Corp <Ntt> Private information distribution management method, private information identification device in private information distribution management system, private information using environment identification device, private information providing device, private information using device, disclosure use rule determination program. and program for each device.
JP2004118455A (en) * 2002-09-25 2004-04-15 Sony Corp Data exchange system, data exchange method, data exchange program, and storage medium recording data exchange program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013175040A (en) * 2012-02-24 2013-09-05 Nippon Telegr & Teleph Corp <Ntt> Authentication authority transfer system, information terminal, token issuing station, service providing device, authentication authority transfer method, and program

Also Published As

Publication number Publication date
JP4615889B2 (en) 2011-01-19

Similar Documents

Publication Publication Date Title
US8051297B2 (en) Method for binding a security element to a mobile device
KR101054970B1 (en) A system, apparatus, method, and computer readable recording medium for authenticating a communication party using an electronic certificate containing personal information
US10567370B2 (en) Certificate authority
JP4907895B2 (en) Method and system for recovering password-protected private data over a communication network without exposing the private data
RU2352985C2 (en) Method and device for authorisation of operations with content
JP4861423B2 (en) Information processing apparatus and information management method
US20100042848A1 (en) Personalized I/O Device as Trusted Data Source
JP4790574B2 (en) Apparatus and method for managing a plurality of certificates
JP5668191B2 (en) ENCRYPTED DATA MANAGEMENT DEVICE, ENCRYPTED DATA MANAGEMENT METHOD, AND ENCRYPTED DATA MANAGEMENT PROGRAM
JP2004533194A (en) Device configured to exchange data and method of authentication
CN108604985A (en) The method and encryption device that data transferring method, control data use
US20110162053A1 (en) Service assisted secret provisioning
JP2006229948A (en) Method and system which authenticate certainly service specialized user of remote service interface to storage medium
KR20090084545A (en) Ce device management server, method for issuing drm key using ce device management server, and computer readable medium
KR20040029155A (en) Method and apparatus for constructing digital certificates
JP6182080B2 (en) Authentication system, program
CA2553081C (en) A method for binding a security element to a mobile device
JP2004248220A (en) Public key certificate issuing apparatus, public key certificate recording medium, certification terminal equipment, public key certificate issuing method, and program
JP2009212689A (en) Automatic common key distribution system, client, third-person certification body side server, and automatic common key sharing method
JP2006311425A (en) Method and system for user authentication
JP2008005090A (en) System for issuing and verifying certificates of several open keys, and method for issuing and verifying certificates of several open keys
JP2004140636A (en) System, server, and program for sign entrustment of electronic document
JP2008234143A (en) Subject limited mail opening system using biometrics, method therefor, and program therefor
JP4541740B2 (en) Authentication key update system and authentication key update method
JP2010028689A (en) Server, method, and program for providing open parameter, apparatus, method, and program for performing encoding process, and apparatus, method, and program for executing signature process

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20060808

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20091203

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20100209

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20100331

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20100412

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20100412

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20101019

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20101021

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20131029

Year of fee payment: 3

LAPS Cancellation because of no payment of annual fees