JPH09244531A - Anonymity registration method - Google Patents

Anonymity registration method

Info

Publication number
JPH09244531A
JPH09244531A JP5753696A JP5753696A JPH09244531A JP H09244531 A JPH09244531 A JP H09244531A JP 5753696 A JP5753696 A JP 5753696A JP 5753696 A JP5753696 A JP 5753696A JP H09244531 A JPH09244531 A JP H09244531A
Authority
JP
Japan
Prior art keywords
trust
user
agency
organs
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP5753696A
Other languages
Japanese (ja)
Other versions
JP3104904B2 (en
Inventor
Eiichiro Fujisaki
英一郎 藤▲崎▼
Tatsuaki Okamoto
龍明 岡本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP5753696A priority Critical patent/JP3104904B2/en
Priority to US08/744,856 priority patent/US5901229A/en
Priority to EP96117686A priority patent/EP0772165B1/en
Priority to DE69633217T priority patent/DE69633217T2/en
Publication of JPH09244531A publication Critical patent/JPH09244531A/en
Application granted granted Critical
Publication of JP3104904B2 publication Critical patent/JP3104904B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

PROBLEM TO BE SOLVED: To enable trust organs to return a receipt while maintaining an anony mous characteristic when a user anonymously registers data to the trust organs. SOLUTION: The user forms cipher keys k1 ,..., k4 corresponding to the respective organs T1 ,..., T4 for cipher communication in a reply and inserts the information respectively in such a manner that only the respective organs Ti know ki at the time of forming the information for registration. The user U inserts the authentication code IDU of the user U as well to the information that only the trust organs Ti know in such a manner that in the final the trust organs Ti are able to send the information to the user U.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【発明の属する技術分野】この発明は、電気通信システ
ムを利用して匿名にデータを登録する方法に関する。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for anonymously registering data using a telecommunication system.

【0002】[0002]

【従来の技術】利用者が匿名にあるデータを登録する方
式としては、文献Chaum,D.,“Untrace
able Electronic Mail,Retu
rnAddress,and Digital Pse
udonyms”,Comm.of the ACM,
24,2,pp.84−88(1981).が存在する
が、登録機関が、匿名の利用者に対して、秘密データ
(受取証)を送り返す実現方式は今まで知られていなか
った。
2. Description of the Related Art As a method for a user to register anonymous data, the method described in Chaum, D. et al. , "Untrace
Able Electronic Mail, Retu
rnAddress, and Digital Pse
udonyms ", Comm. of the ACM,
24, 2, pp. 84-88 (1981). However, the method by which the registration agency sends back confidential data (receipt of receipt) to an anonymous user has not been known until now.

【0003】このような方式が必要とする例としては、
電子投票と電子現金が考えられる。電子投票において
は、利用者は有権者となり、信託機関に秘密投票を行な
う。信託機関は、匿名の利用者に対して、投票を受けと
った証拠を送り返す。電子現金方式においては、「エス
クロー電子現金」と呼ばれる方式への適用が可能であ
る。
An example of the need for such a system is:
Electronic voting and electronic cash can be considered. In electronic voting, users become voters and hold secret votes in trust institutions. The trust institution sends back the evidence that it received the vote to the anonymous user. The electronic cash system can be applied to a system called “escrow electronic cash”.

【0004】ここで、「エスクロー電子現金」とは利用
者の秘密情報を幾つかの信頼できる機関(信託機関)に
強制的に登録させることで、利用者がシステムに対する
不正行為、すなわち、電子現金の偽造や二重使用等を行
なわなくても、裁判所の許可などで信託機関が協力し合
えば、利用者を特定することが可能な方式をいう。
Here, "escrow electronic cash" means that the user's secret information is forcibly registered in some reliable institution (trust agency), so that the user acts illegally on the system, that is, electronic cash. A method in which users can be identified if the trust institutions cooperate with each other without permission of the court without forging or double use.

【0005】[0005]

【発明が解決しようとする課題】この発明は、Chau
m氏等の従来方式で実現されていない次のような機能を
実現することを可能とする方法を提供するものである。
利用者があるデータを匿名で登録し、かつ登録者がその
受取証をその利用者に匿名性を保持したまま送り返す。
この時、登録者が複数の機関に分散されており、全機関
が協力しない場合に限り匿名性が保持される。逆に、全
機関が協力すれば、利用者と登録データの関係を特定で
きる。
The present invention is based on Chau.
It provides a method that enables the following functions, which are not realized by the conventional method of Mr. M., to be realized.
The user registers some data anonymously, and the registrant returns the receipt to the user while maintaining anonymity.
At this time, the registrants are distributed to multiple institutions, and anonymity is maintained only when all the institutions do not cooperate. Conversely, if all institutions cooperate, the relationship between users and registration data can be specified.

【0006】[0006]

【課題を解決するための手段】この発明は、多重に公開
鍵暗号を用いるという基本的な考え方は、Chaum氏
の方式と同じであるが、この発明では、さらに返信に対
しても匿名性を必要とするため、独自の方法が必要とな
る。そこで、この発明では、利用者は登録用の情報を作
成時に、返信時の暗号通信用に各機関T1 ,…,Tt
対応した暗号鍵k1 ,…,kt を作成し、それらをそれ
ぞれ各機関Ti のみがki を知るように情報を挿入す
る。また、利用者Uは、最終的に信託機関T1 が利用者
Uへ情報を送れるように信託機関T1 のみが知る情報に
利用者Uの認証子IDU も挿入する。
In the present invention, the basic idea that multiple public key cryptography is used is the same as in the method of Chaum. However, in the present invention, anonymity is also provided for a reply. You need your own method of doing so. Therefore, in this invention, at the time of creating the information for the registered user, each agency T 1 for encrypted communication at the time of reply, ..., encryption key k 1 corresponding to T t, ..., to create a k t, they Information is inserted so that only each institution T i knows k i . Further, the user U will eventually trustee T 1 is also inserted authenticator ID U of the user U to the trustee T 1 only knows the information to send the information to the user U.

【0007】[0007]

【発明の実施の形態】図1はこの発明の原理構成図であ
る。登録機関100、利用者端末200、及び、裁判所
300は例えば通信回線を介して接続されているが、情
報を記録できるICカード等を介しての接続であっても
よい。実施例の署名方式と公開鍵暗号は全てRSA法に
のっとったが、この発明方法は、任意の一方向性関数
g、ディジタル署名方式、公開鍵暗号方式により実現出
来る(一方向性関数、ディジタル署名方式、公開鍵暗号
については、岡本栄司著「暗号理論入門」(共立出版)
を参照されたい)。準備 公開の一方向性関数としてgを定める。また、手順公開
の秘密鍵暗号方式として(ε,Д)を公開しておく(こ
れらの計算を行なう装置を、それぞれ、g計算器、暗号
器ε、復号器Дと呼ぶ)。
1 is a block diagram showing the principle of the present invention. The registration agency 100, the user terminal 200, and the court 300 are connected via, for example, a communication line, but may be connected via an IC card or the like capable of recording information. Although the signature method and the public key encryption of the embodiment are all based on the RSA method, the method of the present invention can be realized by an arbitrary one-way function g, digital signature method, and public key encryption method (one-way function, digital signature). Eiji Okamoto, "Introduction to Cryptographic Theory" (Kyoritsu Shuppan)
See). Determine the g as of preparation published one-way function. Further, (ε, Д) is disclosed as a secret key cryptosystem for public disclosure of the procedure (devices for performing these calculations are called a g calculator, an encryptor ε, and a decryptor Д, respectively).

【0008】登録機関Ti の署名アルゴリズム及び公開
鍵暗号は全てRSA方式とし、それぞれの秘密鍵と公開
鍵は、(dTi,nTi),(eTi,nTi)とする。登録処理 利用者Uは、データNを登録機関Tに登録する(ここで
は、T=(T1 ,…,Tt )を表す)。この手順は、以
下の通りである(図2、3、4参照)。
The signature algorithm and public key cryptography of the registration authority T i are all RSA systems, and their private key and public key are (d Ti , n Ti ) and (e Ti , n Ti ). The registration processing user U registers the data N in the registration agency T (here, T = (T 1 , ..., T t )). This procedure is as follows (see FIGS. 2, 3, and 4).

【0009】ステップ1 利用者Uは鍵生成器201
(図2)から登録機関Ti の数と同数の鍵(k1 ,…,
t )を生成する。登録機関Ti の公開鍵(eTi
Ti)と公開鍵暗号器E2021 〜202t を用いて、
帰納的にci =Ei (ki ‖ci-1)(ただし、co
利用者Uの認証子IDU とする)を計算し、ct を得
る。さらに、登録機関Ti の公開鍵(eTi,nTi)と公
開鍵暗号器E2031 〜203 t を用いて、帰納的に、 C1 =E1 o…oEt (N‖ct ) を計算し(ここで、Ei oEj (x):=Ei (E
j (x))を意味する)、このC1 を登録機関T1 に送
信する。
Step 1 The user U uses the key generator 201
(Fig. 2) to registration agency TiAs many keys (k1,…,
kt). Registration agency TiPublic key (eTi,
nTi) And public key cryptographic device E2021~ 202tUsing,
Inductively ci= Ei(Ki‖Ci-1) (However, coIs
User U authenticator IDUIs calculated) and ctGet
You. Furthermore, the registration agency TiPublic key (eTi, NTi) And public
Open key encryption device E2031~ 203 tAnd inductively, C1= E1o ... oEt(N | ct) Is calculated (where EioEj(X): = Ei(E
j(X))), this C1The registration agency T1Sent to
I believe.

【0010】ステップ2 登録機関T1 は秘密鍵
(dT1,nT1)と公開鍵復号器D101(図3)を用い
て、C2 =D1 (C1 )を計算し、これを登録機関T2
に送信する。 ステップ3 登録機関Ti は秘密鍵(dT1,nT1)と公
開鍵復号器D101を用いて、Ci+1 =Di (Ci )を
計算して、次の登録機関Ti+1 に送信するということを
繰り返し、最後に登録機関Tt がCt を得る。
Step 2 The registration authority T 1 calculates C 2 = D 1 (C 1 ) using the private key (d T1 , n T1 ) and the public key decryption device D 101 (FIG. 3), and calculates this C 2 = D 1 (C 1 ). T 2
Send to Step 3 The registration authority T i calculates C i + 1 = D i (C i ) by using the private key (d T1 , n T1 ) and the public key decryption device D101, and the next registration authority T i + 1. And the registration authority T t finally obtains C t .

【0011】ステップ4 登録機関Tt は秘密鍵
(dTt,nTt)と公開鍵復号器D102tを用いて、
(N‖ct )=Dt (Ct )、(kt ‖ct-1 )=Dt
(ct )を求める。N,ct-1 ,kt を得た後、秘密鍵
(dT ,nT )、g計算器103、ディジタル署名生成
器sig104を用いて、Nに対するディジタル署名L
=g(N)dTmod nT を生成する。さらに、kt を秘密
鍵としてkt と暗号器ε105 t を用いて、署名LをЭ
t =εkt(L)と暗号化し、(ct-1 ,Эt )を直前の
登録機関Tt-1 に送信する。
Step 4 Registration authority TtIs the private key
(DTt, NTt) And public key decryptor D102tUsing,
(N | ct) = Dt(Ct), (Kt‖Ct-1) = Dt
(Ct). N, ct-1, KtAfter getting the private key
(DT, NT), G calculator 103, digital signature generation
Digital signature L for N by using the device sig104
= G (N)dTmod nTGenerate Furthermore, ktThe secret
K as a keytAnd encryption device ε105 tTo sign the signature L
t= ΕktEncrypt with (L), (ct-1, Эt) Just before
Registration agency Tt-1Send to

【0012】ステップ5 登録機関Ti は秘密鍵
(dTi,nTi)と公開鍵復号器D102iを用いて、
(ki ‖ci-1 )=Di (ci )を計算し、さらにki
を秘密鍵として、ki と暗号器ε105i を用いてЭi
=εki(Эt+1 )を求める。(ci-1,Эi )を直前の
登録機関Ti-1 に送信する。この繰り返しにより、最後
に登録機関T2 が公開鍵暗号器ε1052 から(c1
Э2 )を得る。
Step 5 The registration authority T i uses the private key (d Ti , n Ti ) and the public key decryption device D102 i to
(K i ‖c i-1 ) = D i (c i ) is calculated, and k i
Э i using k i and the cipher ε 105 i as the secret key
= Ε kit + 1 ) is calculated. (C i-1 , Φ i ) is transmitted to the immediately preceding registration authority T i-1 . By repeating this, the last registration authority T 2 is the public key encryption unit Ipushiron105 2 from (c 1,
Э 2 ) get.

【0013】ステップ6 登録機関T1 は秘密鍵
(dT1,nTi)と公開鍵復号器D1021を用いて、
(ki ‖IDU )=D1 (c1 )を計算する。認証子I
U から利用者Uを特定する。ki と暗号器εt 105
1 を用いて、Э1 =εk1(Э2 )を求めた後、Э1 を利
用者Uに送信する。 ステップ7 利用者Uは、(k1 ,…,kt )と復号器
Д2041 〜204tを用いて、受取証L L=Дkto…oДk1(Э1 )=g(N)dTmod nT ステップ8 登録機関T1 は対応関係(IDU ,Э2
Э1 )(図4)を、T t は対応関係(N,L,Э1
を、それ以外のTi は、対応関係(Эi+1 ,Эi)を、
それぞれ秘密にci −データベース106i に管理す
る。登録情報から利用者の特定及びその逆 (N,L)→利用者 信頼できる第三者(例えば裁判所)からの要請により、
登録機関T1 ,…,T t は、ci −データベースを用い
て、(N,L)から利用者Uを捜し出す処理は以下の通
りである(図4参照)。
Step 6 Registration authority T1Is the private key
(DT1, NTi) And public key decryptor D1021Using,
(Ki‖IDU) = D1(C1) Is calculated. Authenticator I
DUThe user U is specified from. kiAnd cipher εt105
1Using1= Εk1Two), Then Э1Profit
Send to user U. Step 7 User U uses (k1,…, Kt) And the decoder
Д2041~ 204tUsing the receipt LL = Дkto ... oДk11) = G (N)dTmod nT Step 8 Registration agency T1Is the correspondence (IDU, ЭTwo,
Э1) (Fig. 4) tIs the correspondence (N, L, Э1)
Other than TiIs the correspondence (Эi + 1, Эi),
Each secret ci-Database 106iManage
You.Identification of user from registered information and vice versa (N, L) → user At the request of a trusted third party (eg court),
Registration agency T1, ..., T tIs ci-Using a database
The process for finding the user U from (N, L) is as follows.
(See FIG. 4).

【0014】ステップ1 信頼できる第三者(例えば裁
判所)は(N,L)を登録機関Ttに送信する。 ステップ2 登録機関Tt は受取証Lを用いて、ct
データベース106tから(N,L,Эt )を検索し、
Эt を直前登録機関Tt-1 に送信する。 ステップ3 登録機関Ti はЭi+1 を用いて、ci −デ
ータベース106i から(Эi+1 ,Эi )を検索し、Э
i をその直前登録機関Ti-1 に送信する(i=t−1,
…,2)。
Step 1 A trusted third party (eg a court) sends (N, L) to the registration authority T t . Step 2 The registration agency T t uses the receipt L to obtain ct
Search (N, L, Э t ) from the database 106 t ,
Э t is sent to the last registration agency T t-1 . Step 3 RA T i by using the Э i + 1, c i - retrieves from the database 106 i a (Э i + 1, Э i ), Э
i is transmitted to the immediately preceding registration authority T i−1 (i = t−1,
…, 2).

【0015】ステップ4 登録機関T1 はЭ2 を用い
て、c1 −データベース1051 から(IDU ,Э2
Э1 )を検索し、そのIDU から利用者Uを特定し、信
頼できる第三者(例えば裁判所)機関にこれを伝える。 利用者→(N,L) 信頼できる第三者(例えば裁判所)からの要請により、
信託機関T1 ,…,T t は、ci −データベースを用い
て不正者Uの支払履歴Hを捜し出す処理は以下の通りで
ある(図4参照)。
Step 4 Registration authority T1Is ЭTwoUsing
, C1-Database 1051From (IDU, ЭTwo,
Э1) Is searched and its IDUUser U is identified from
Communicate this to a trusted third party (eg court). User → (N, L) At the request of a reliable third party (eg court),
Trust organization T1, ..., T tIs ci-Using a database
The process of finding out the payment history H of the fraudulent U is as follows.
Yes (see FIG. 4).

【0016】ステップ1 信頼できる第三者(例えば裁
判所)は不正者の認証子IDU を登録機関T1 に送信す
る。 ステップ2 T1 はIDU を用いて、c1 −データベー
ス1061 から(ID U ,Э2 ,Э1 )を検索し、Э2
を次の登録機関T2 に送信する。 ステップ3 登録機関Ti はЭi を用いて、ci −デー
タベース106i から(Эi+1 ,Эi )を検索し、Э
i+1 を次の登録機関Ti+1 に送信する(i=2,…,t
−1)。
Step 1 A trusted third party (eg
Court) is the certifier ID of the illicit personUThe registration agency T1Send to
You. Step 2 T1Is the IDUUsing c1-Database
Space 1061From (ID U, ЭTwo, Э1) Search for ЭTwo
The next registration agency TTwoSend to Step 3 Registration agency TiIs ЭiUsing ci-Day
Database 106iFrom (Эi + 1, Эi) Search for Э
i + 1The next registration agency Ti + 1To (i = 2, ..., t
-1).

【0017】ステップ4 登録機関Tt はЭt を用い
て、ct −データベース106t から(N,L,Эt
t )を検索し、受取証Lを特定し、信頼できる第三者
(例えば裁判所)機関にこれを伝える。
[0017] Step 4 RA T t by using the Э t, c t - from the database 106 t (N, L, Э t,
Search for k t), identifies the recipient certificate L, tell it to the trusted third party (for example, the court) institutions.

【0018】[0018]

【発明の効果】この発明の効果は以下のとおりである。
全信託機関が結託しないかぎり、利用者Uと(N,L)
との関係を秘密にできる。一方、信託機関T1 ,…,T
t の協力により、(N,L)から利用者の追跡も、利用
者から(N,L)の追跡も出来る。この追跡は容易でか
つこの利用者以外の他の人のプライバシを侵すこともな
い。
The effects of the present invention are as follows.
Unless all trust institutions collude, with user U and (N, L)
You can keep your relationship with. On the other hand, the trust institutions T 1 , ..., T
With the cooperation of t , the user can be traced from (N, L) and (N, L) can be traced from the user. This tracking is easy and does not compromise the privacy of anyone other than this user.

【図面の簡単な説明】[Brief description of drawings]

【図1】この発明が適用されるシステム構成図を示すブ
ロック図。
FIG. 1 is a block diagram showing a system configuration diagram to which the present invention is applied.

【図2】端末利用許可証発行時における利用者端末20
0の処理を示す機能構成図。
FIG. 2 is a user terminal 20 when a terminal usage permit is issued.
The functional block diagram which shows the process of 0.

【図3】利用許可証発行時における登録機関100の処
理を示す機能構成図。
FIG. 3 is a functional configuration diagram showing a process of a registration agency 100 when a usage permit is issued.

【図4】(N,L)から利用者を追跡する処理、及び、
利用者から(N,L)を追跡する処理を説明するための
図。
FIG. 4 is a process of tracking a user from (N, L), and
The figure for demonstrating the process which tracks (N, L) from a user.

───────────────────────────────────────────────────── フロントページの続き (51)Int.Cl.6 識別記号 庁内整理番号 FI 技術表示箇所 G06F 19/00 G06F 15/30 Z H04L 9/30 H04L 9/00 663B 9/32 675B ─────────────────────────────────────────────────── ─── Continuation of the front page (51) Int.Cl. 6 Identification code Internal reference number FI Technical display location G06F 19/00 G06F 15/30 Z H04L 9/30 H04L 9/00 663B 9/32 675B

Claims (1)

【特許請求の範囲】[Claims] 【請求項1】 利用者Uは、データNを信託機関T=
(T1 ,…,Tt )に登録する際に、 信託機関T1 ,…,Tt に対して、(k1 ,…,kt
を選び、 Ti の公開鍵暗号関数Ei を用いて、 帰納的に1tに対してci =Ei (ki
i-1 )(ただし、c0 は利用者Uの認証子IDU とす
る)を計算し、最後にct を得、 さらに、帰納的に、 C1 =E1 o…oEt (N‖ct ) を計算し(ここで、Ei oEj (x):=Ei (E
j (x)を意味する)、 このC1 を信託機関T1 に送信し、 信託機関T1 は公開鍵復号関数D1 を用いて、 C2 =D1 (C1 )を計算し、これを信託機関T2 に送
信し、 次にi=1,…,t−1として、 信託機関Ti は公開鍵復号関数Di を用いて、 Ci+1 =Di (Ci )を信託機関Ti+1 に送信し、 この繰り返しにより、最後に信託機関Tt がCt を得、 信託機関Tt はCt より、公開鍵復号関数Dt を用い
て、 (N‖ct )=Dt (Ct )を求め、さらにct から
(kt ‖ct-1 )=Dt(ct )を求め、 結局、(N,ct-1 ,kt )を得、 信託機関Tt は受取証Lを生成し、 kt を秘密鍵として受取証LをЭt=εkt(L)と暗号
化し、(ct-1 ,Эt)を信託機関Tt-1 に送信し、 信託機関Ti はci より(ki ‖ci-1 )=D
i (ci )を求め、 ki とЭi+1 より、kiを秘密鍵としてЭi+1 Эi
=εki(Эi+1 )と暗号化した後(ci-1 ,Эi )を信
託機関Ti-1 に送信し、 この繰り返しにより、最後に信託機関T2 が(c1 ,Э
2 )を得、 信託機関T1 はc1 より、 (k1 ‖IDU )=D1 (c1 )を求め、認証子IDU
により利用者Uを特定し、 k1 とЭ2 より、Э1 =εk1(Э2 )を求めた後、 Э1 を利用者Uに送信し、 信託機関T1 、Ti 、Tt はそれぞれ(IDU ,Э2
Э1 )、(Эi+1 ,Э i )、(N,L,Эt )を保持
し、利用者Uは、(k1 ,…,kt )とεの復号機関Д
を用いて、 L=Дkto…oДk1(C1 )=sig(N) を得ることを特徴とする匿名登録方法。
1. The user U transfers the data N to a trust institution T =
(T1, ..., Tt) When registering with1, ..., TtAgainst (k1,…, Kt)
Select TiPublic-key cryptographic function EiUsing inductively 1<i<c for ti= Ei(Ki
ci-1) (However, c0Is the authenticator ID of user UUToss
Is calculated, and finally ctAnd, by induction, C1= E1o ... oEt(N | ct) Is calculated (where EioEj(X): = Ei(E
j(Means x), this C1Trust agency T1Sent to the trust institution T1Is the public key decryption function D1Using CTwo= D1(C1) Is calculated, and this is the trust institution TTwoSent to
Trust, and then i = 1, ...iIs the public key decryption function DiUsing Ci + 1= Di(Ci) Is a trust institution Ti + 1To the trust agency TtIs CtAnd trust organization TtIs CtFrom the public key decryption function DtUsing
, (N ‖ct) = Dt(Ct), And further ctFrom
(Kt‖Ct-1) = Dt(Ct), And eventually (N, ct-1, Kt) And trust organization TtGenerates receipt L, ktThe receipt L as Φt = εkt(L) and encryption
And (ct-1, Эt) Is a trust institution Tt-1Sent to the trust institution TiIs ciThan (ki‖Ci-1) = D
i(Ci), KiAnd Эi + 1From the secret key KIi + 1To Эi
= Εkii + 1) And encrypted (ci-1, Эi) Believe
Trust Ti-1To the trust agency TTwoIs (c1, Э
Two) And trust organization T1Is c1From (k1‖IDU) = D1(C1), And the authenticator IDU
Identifies the user U by k1And ЭTwoThan Э1= Εk1Two), Then Э1Is sent to user U, and trust institution T1, Ti, TtEach (IDU, ЭTwo,
Э1), (Эi + 1, Э i), (N, L, Эt) Hold
Then, the user U uses (k1,…, Kt) And ε decryption agency Д
Using, L = Дkto ... oДk1(C1) = Sig (N) 2. Anonymous registration method.
JP5753696A 1995-11-06 1996-03-14 Anonymous registration method Expired - Lifetime JP3104904B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP5753696A JP3104904B2 (en) 1996-03-14 1996-03-14 Anonymous registration method
US08/744,856 US5901229A (en) 1995-11-06 1996-11-04 Electronic cash implementing method using a trustee
EP96117686A EP0772165B1 (en) 1995-11-06 1996-11-05 Electronic cash implementing method using an anonymous public key license
DE69633217T DE69633217T2 (en) 1995-11-06 1996-11-05 A method of implementing electronic money using an anonymous public key license

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP5753696A JP3104904B2 (en) 1996-03-14 1996-03-14 Anonymous registration method

Publications (2)

Publication Number Publication Date
JPH09244531A true JPH09244531A (en) 1997-09-19
JP3104904B2 JP3104904B2 (en) 2000-10-30

Family

ID=13058491

Family Applications (1)

Application Number Title Priority Date Filing Date
JP5753696A Expired - Lifetime JP3104904B2 (en) 1995-11-06 1996-03-14 Anonymous registration method

Country Status (1)

Country Link
JP (1) JP3104904B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008509591A (en) * 2004-08-05 2008-03-27 韓國電子通信研究院 Transaction authentication method and transaction authentication system for protecting privacy regarding electronic transaction details
JP4934261B2 (en) * 2000-02-07 2012-05-16 ユーキューイー,エルエルシー Method, system and storage medium for securely distributing content

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4934261B2 (en) * 2000-02-07 2012-05-16 ユーキューイー,エルエルシー Method, system and storage medium for securely distributing content
JP2012105284A (en) * 2000-02-07 2012-05-31 Uqe Llc Method and apparatus for secure content distribution
JP2008509591A (en) * 2004-08-05 2008-03-27 韓國電子通信研究院 Transaction authentication method and transaction authentication system for protecting privacy regarding electronic transaction details

Also Published As

Publication number Publication date
JP3104904B2 (en) 2000-10-30

Similar Documents

Publication Publication Date Title
US7571324B2 (en) Method and device for anonymous signature with a shared private key
JP4603252B2 (en) Security framework and protocol for universal general transactions
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US6377688B1 (en) Cryptographic communication method and system
US9704159B2 (en) Purchase transaction system with encrypted transaction information
US5315658A (en) Fair cryptosystems and methods of use
KR100406754B1 (en) Forward-secure commercial key escrow system and escrowing method thereof
US4944007A (en) Public key diversification method
Soo Ju et al. An anonymous buyer-seller watermarking protocol with anonymity control
USRE36918E (en) Fair cryptosystems and methods of use
CN101331706A (en) Secure threshold decryption protocol computation
US20070074027A1 (en) Methods of verifying, signing, encrypting, and decrypting data and file
CN1778065B (en) Security method and apparatus using biometric data
US20010014156A1 (en) Common key generating method, common key generator, cryptographic communication method and cryptographic communication system
US7640432B2 (en) Electronic cash controlled by non-homomorphic signatures
JPH11298470A (en) Key distribution method and system
EP1164745A2 (en) System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature
JP2000269957A (en) Electronic voting method and medium recording its program
JP2002500842A (en) Automatic recovery and automatic authentication possible encryption system
Cetinkaya et al. Pseudo-voter identity (pvid) scheme for e-voting protocols
JPH10240826A (en) Electronic contracting method
JP3104904B2 (en) Anonymous registration method
JP2004192029A (en) Electronic voting system, voting data generating server, terminal equipment, tabulation server and computer program
JP2004013606A (en) Electronic voting method and system, voter device and manager device and tabulator device, electronic voting program and storage medium with its program stored
Suwarjono et al. Cryptography Implementation for electronic voting security

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20070901

Year of fee payment: 7

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080901

Year of fee payment: 8

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080901

Year of fee payment: 8

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090901

Year of fee payment: 9

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090901

Year of fee payment: 9

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100901

Year of fee payment: 10

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100901

Year of fee payment: 10

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110901

Year of fee payment: 11

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120901

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130901

Year of fee payment: 13

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

EXPY Cancellation because of completion of term