WO2011007697A1 - 匿名認証署名システム、ユーザ装置、検証装置、署名方法、検証方法およびそれらのプログラム - Google Patents
匿名認証署名システム、ユーザ装置、検証装置、署名方法、検証方法およびそれらのプログラム Download PDFInfo
- Publication number
- WO2011007697A1 WO2011007697A1 PCT/JP2010/061449 JP2010061449W WO2011007697A1 WO 2011007697 A1 WO2011007697 A1 WO 2011007697A1 JP 2010061449 W JP2010061449 W JP 2010061449W WO 2011007697 A1 WO2011007697 A1 WO 2011007697A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- signature
- attribute
- public key
- verification
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Definitions
- the present invention relates to an anonymous authentication signature system, a user device, a verification device, a signature method, a verification method, and a program thereof, and more particularly to an anonymous authentication signature system that can reduce the amount of calculation required for generating and verifying an anonymous authentication certificate. .
- Anonymous authentication signature technology means that a user (signer) who has an anonymous authentication certificate with multiple attributes and a signature key backed by it is possessed by the authority. This is a technique capable of generating a signature that partially discloses the attributes of an anonymous authentication certificate for a document given by using. This signature only knows that it was generated with the disclosed attribute and a signature key based on the anonymous authentication certificate with the signature.
- this anonymous authentication signature technology is used, for example, when a user rents a rental car, only the attribute of “owning a driver's license” is disclosed to the rental car company that is the business operator, and the time information is signed. You can rent a car anonymously.
- the operator When a situation arises in which the user's attributes need to be clarified, such as when an accident or criminal case has occurred in a rental car rented by this user, the operator must be an authorized person (for example, police or public security officer).
- the user's attributes can be specified by inquiring to the association.
- the anonymous authentication technique is expected to be able to provide a useful method of using personal information for both users and businesses.
- Non-Patent Document 1 describes a Camenisch-Lysyanskaya signature, which is one of the techniques for realizing such an anonymous authentication signature.
- the attribute assigned to each user is ⁇ [1],..., ⁇ [n], in which the user discloses ⁇ [i1],. [J1],..., ⁇ [jn-m] are hidden, and signature data is generated anonymously.
- n and m are natural numbers, and n> m.
- i1 to im are sets of m different natural numbers satisfying 1 ⁇ i ⁇ n. j1 to jn-m are sets of nm different natural numbers that satisfy 1 ⁇ j ⁇ n and are not included in i1 to im.
- Each user has his own secret key ⁇ and a Kamenishi-Lysianskaya signature ( ⁇ , E, ⁇ ) for the attributes ⁇ [1],.
- ( ⁇ , E, ⁇ ) is data satisfying the condition shown in the following equation (1).
- the user discloses ⁇ [i1],..., ⁇ [im], and knows the data ( ⁇ , ⁇ , ⁇ [j1],..., ⁇ [jn ⁇ m]) that satisfies the condition shown in Equation 1 above.
- a signature sentence Signature of knowledge indicating the fact is created (first method).
- Each user has a Kamenissi-Lysianskaya signature corresponding to each of a plurality of private keys.
- the pair of the secret key and the Kamenissi-Lysianskaya signature is converted into a Kamenissi-Lysianskaya signature ( ⁇ [1], E [1], ⁇ [1]) for the secret key ( ⁇ , ⁇ [1]),. n]) as a Kamenissi-Lysianskaya signature ( ⁇ [n], E [n], ⁇ [n]).
- the user publishes part of the attribute ⁇ [i1],..., ⁇ [im], and the Kamenissi-Ryanianskaya signature for ( ⁇ , ⁇ [i1]) , ..., (signature signature signature indicating that it knows all the Kamenissi-Lysianskaya signatures ( ⁇ [n], E [n], ⁇ [n]) for ( ⁇ , ⁇ [im]) is created (second the method of).
- Patent Document 1 describes a service providing method in which a certificate for certifying a property is issued through an appropriate guarantor device and exchanged, whereby anonymity can be negotiated with each other.
- Patent Document 2 describes a certificate verification system in which an alternative certificate obtained by removing user privacy information from a certificate is used.
- Patent Document 3 describes an attribute authentication system in which a received attribute certificate is used after being transformed or encrypted, and the server can verify it.
- Non-Patent Document 2 describes an example of a signature scheme similar to the Kamenissi-Lysianskaya signature scheme.
- An object of the present invention is to provide an anonymous authentication signature system, a user, which can generate and verify an anonymous authentication certificate with a smaller amount of calculation by reducing the number of times of calculation of a power residue when generating a signature sentence
- An apparatus, a verification apparatus, a signature method, a verification method, and a program thereof are provided.
- an anonymous authentication signature system includes a user device that generates and outputs signature data for a document input by a user, and whether the signature data generated by the user device is valid. And a verification apparatus that verifies whether or not and outputs a result thereof.
- the anonymous authentication signature system is configured to be connected to each other, and the user apparatus has a first system parameter that is each first parameter given in advance.
- a first storage unit storing a disclosure public key, a user public key, a user secret key, a member certificate, and an attribute certificate; and an input for receiving a document from the user and an attribute to be disclosed by the user
- a signature output means for outputting a cipher text and a zero knowledge signature sentence as signature data, and the verification device is provided with each second parameter given in advance.
- a second storage unit storing a second system parameter, a disclosure public key, a user public key, and an attribute certificate, input receiving means for receiving input of a document and signature data from a user device, Zero knowledge proof sentence included in signature data is verified using the second parameter to determine whether or not this zero knowledge proof sentence can be accepted, and if it is determined that it can be accepted, zero knowledge proof verification that accepts signature data
- the user public key and the attribute certificate are created using the same bag, and the signature sentence creation means of the user device is a part of the user public key and is opened. Combined over a part of the attribute certificate corresponding to the attribute that has not been characterized to create a signature text knowledge to satisfy the applied combined data has been determined in advance equation.
- a user apparatus is a user apparatus that generates and outputs signature data for a document input by a user, and includes system parameters that are given in advance, disclosure disclosure, and the like.
- a storage unit that stores a key, a user public key, a user private key, a member certificate, and an attribute certificate; and an input / output unit that receives an input of a document from the user and an attribute to be disclosed by the user.
- Ciphertext creating means for creating a ciphertext from each document and the attribute to be disclosed and each parameter, signature text creating means for creating a zero knowledge signature text from the created ciphertext, and ciphertext and zero knowledge signature Signature output means for outputting the text as signature data, and the user public key and attribute certificate are created using the same font.
- the signature sentence creation means multiplies part of the user public key and part of the attribute certificate corresponding to the attribute that has not been disclosed, and knowledge that the crossed data satisfies a predetermined formula. A signature sentence is created.
- a verification apparatus is a verification apparatus that verifies whether signature data generated by a user apparatus is valid and outputs the result, each of which is given in advance
- a storage unit storing system parameters, disclosure public key, user public key, and attribute certificate, input receiving means for receiving input of document and signature data from the user, and signature using each parameter
- the zero knowledge proof sentence included in the data is verified to determine whether or not the zero knowledge proof sentence can be accepted, and if it is judged to be acceptable, it has zero knowledge proof verification means for accepting the signature data, and the user
- the public key and attribute certificate are created using the same trap.
- a signature method is a signature method for generating and outputting signature data for a document input from a user.
- the key, user public key, user private key, member certificate, and attribute certificate created using the same trap as the user public key are stored in advance, and the document from the user and the attribute to be disclosed by the user are stored.
- Attribute certificate that accepts input, creates the ciphertext from the input document and the attribute to be disclosed, and each parameter, and corresponds to a part of the user public key and the attribute that was not disclosed from the created ciphertext
- a zero-knowledge signature sentence that is a signature sentence of knowledge that this multiplied data satisfies a predetermined expression is And outputs a zero-knowledge signature text as the signature data and.
- a verification method is a verification method for verifying whether signature data generated by a user apparatus is valid and outputting the result, each of which is given in advance System parameters, disclosure public key, user public key, and attribute certificate created using the same trap as the user public key in advance, accepting input of document and signature data from the user, The zero-knowledge proof sentence included in the signature data is verified using the parameters of this to determine whether or not the zero-knowledge proof sentence can be accepted, and the signature data is accepted if it can be accepted. .
- a signature program is a signature program that generates and outputs signature data for a document input by a user, and includes system parameters that are given in advance, disclosure disclosure
- the document from the user and the user will be disclosed to the computer in which the key, the user public key, the user private key, the member certificate, and the attribute certificate created using the same trap as the user public key are stored in advance.
- the procedure for accepting the input of the attribute, the input document and the attribute to be disclosed, the procedure for creating the ciphertext from each parameter, and the part of the user public key is not disclosed from the created ciphertext Multiply it with a part of the attribute certificate corresponding to the selected attribute, and the multiplied data must satisfy a predetermined formula.
- a step of creating a zero-knowledge signature text is signed statement of knowledge, characterized in that to execute a step of outputting the ciphertext and zero knowledge signature document as signature data.
- a verification program is a verification program for verifying whether signature data generated by a user device is valid and outputting the result, each of which is given in advance Enter the document and signature data from the user on the computer in which the system parameters, disclosure public key, user public key, and attribute certificate created using the same trap as the user public key are stored in advance , A procedure for verifying the zero knowledge proof text included in the signature data using each parameter and determining whether or not the zero knowledge proof text can be accepted, and the signature data if it is determined to be accepted And a procedure for accepting.
- the present invention creates a ciphertext corresponding to an attribute to be disclosed by a user using the user public key and attribute certificate created using the same bag as described above, and attributes from the ciphertext Since it is configured to create a zero knowledge signature sentence that is a signature sentence of knowledge that crossed with a part of the certificate and this multiplied data satisfies a predetermined formula, it must be proved The number of data can be reduced. This makes it possible to reduce the number of times the exponentiation remainder is generated when generating a signature sentence, and to generate and verify an anonymous authentication certificate with a smaller amount of calculation, which makes it possible to perform anonymous authentication.
- a signature system, a user device, a verification device, a signature method, a verification method, and a program thereof can be provided.
- the anonymous authentication signature system 1 verifies whether the user device 22 that generates and outputs signature data for a document input by a user and whether the signature data generated by the user device is valid.
- This is an anonymous authentication signature system configured to be connected to a verification device 23 that outputs the result.
- the user device 22 stores a first system parameter, a disclosure public key, a user public key, a user private key, a member certificate, and an attribute certificate, which are first parameters given in advance.
- the ciphertext is generated from the storage unit 13, the input / output unit 12 that receives input of the document from the user and the attribute to be disclosed by the user, the input document and the attribute to be disclosed, and each first parameter.
- the verification device 23 includes a second storage unit 13 storing a second system parameter, a disclosure public key, a user public key, and an attribute certificate, which are second parameters given in advance.
- Input receiving means 231a for receiving input of the document and signature data, and verifying the zero knowledge proof text included in the signature data using each second parameter to determine whether the zero knowledge proof text can be accepted;
- Zero knowledge proof verification means 231b for receiving signature data if it is determined that the signature data can be accepted.
- the user public key and the attribute certificate are created using the same bag, and the signature sentence creating unit 221a of the user device has attributes corresponding to attributes that are not disclosed as part of the user public key. Multiply it with a part of the certificate, and create a signature sentence with knowledge that the multiplied data satisfies a predetermined formula.
- the storage unit 13 of the user device stores a group public key and a group secret key that are given in advance, and the ciphertext creating unit 221a intends to disclose the attribute certificate.
- a ciphertext is created from the data corresponding to the attribute, the user public key, the user secret key, the group public key, and the group secret key.
- the signature text creating unit 221b creates a zero knowledge signature text for the fact that the cipher text created by the cipher text creating unit is a cipher text of data included in the user public key.
- the input receiving unit 231a of the verification apparatus receives input of attribute data disclosed by the user, and the zero knowledge proof verification unit 231b is included in the signature data using the attribute disclosed by the user and each parameter. Verify the zero knowledge proof sentence.
- the storage unit 13 stores the group public key as a predetermined parameter, and the zero knowledge proof verification unit 231b includes data corresponding to the attribute disclosed by the user, the user public key, the group public key, and The zero knowledge certificate is verified from the group secret key.
- the anonymous authentication signature system can reduce the number of times of the power-residue calculation when generating the signature text, and can generate and verify the anonymous authentication certificate with a smaller amount of calculation. Become. Hereinafter, this will be described in more detail.
- FIG. 1 is an explanatory diagram showing the overall configuration of the anonymous authentication signature system 1 according to the embodiment of the present invention.
- the anonymous authentication signature system 1 specifies a user device 22 that generates a signature based on an issued signature key, a verification device 23 that verifies that the generated signature is generated with a specific signature key, and specifies the person who performed the signature
- the disclosed devices 21 are connected to each other via a network 30.
- the disclosure device 21, the user device 22, and the verification device 23 are all computer devices.
- FIG. 2 is an explanatory diagram illustrating a hardware configuration of the computer device 10 that functions as the disclosure device 21, the user device 22, and the verification device 23 illustrated in FIG.
- the computer device 10 includes an arithmetic unit 11 that is a processor that executes a computer program, an input / output unit 12 that inputs and outputs data, a storage unit 13 that stores computer programs and data, and a network 30. And a communication unit 14 that performs data communication with other computer devices.
- the computer device 10 When each computer program is executed by the computing unit 11, the computer device 10 functions as each of the disclosure device 21, the user device 22, and the verification device 23 shown in FIG. That is, the disclosure unit 211 operates in the calculation unit 11 included in the disclosure device 21. In the calculation unit 11 included in the user device 221, the signature unit 221 operates. In the calculation unit 11 provided in the verification device 23, the verification unit 231 operates. Each functional unit is stored in advance in the storage unit 13 included in each computer apparatus 10 and is read and operated by the calculation unit 11. The functions and operations of these functional units will be described later.
- the signature unit 221 further includes a ciphertext creating unit 221a that creates a ciphertext Cipher, a signature text creating unit 221b that creates a signature text Proof, and a signature output unit 221c that outputs a signature signature by combining the ciphertext Cipher and the signature text Proof. It is divided into functional means.
- the verification unit 231 includes an input receiving unit 231a that receives a signature sentence Signature as an input, and a zero knowledge proof verification unit 231b that verifies a zero knowledge proof sentence. The functions and operations of these means will also be described later.
- system parameters data that is known in advance by all devices constituting the anonymous authentication signature system 1 and stored in the storage unit 13 of each device is referred to as a system parameter. More specifically, the system parameters here are: (1) Prime number q, (2) Information sufficient to perform a group operation on the group GRP [1] of order q, (3) Information sufficient to perform a group operation on the group GRP [2] of order q, (4) Information sufficient to perform group operations on the group GRP [3] of order q, (5) Information sufficient to perform group operations on the group GRP ′ of order q, (6) Bilinear mapping from GRP [1] ⁇ GRP [2] to GRP [3] e: information sufficient to calculate GRP [1] ⁇ GRP [2] ⁇ GRP [3], (7) GRP ′ generator ⁇ , Each of the above.
- bilinear map e for example, Weil pairing or Tate pairing can be used. From the viewpoint of safety, it is desirable that the DDH problem (Computational Diffie-Hellman) on GRP 'is difficult. Examples of such groups are, for example, elliptic curve groups, cyclic groups, or their prime order subgroups.
- the disclosure device 21 is provided with a public key and a secret key. These are called a disclosure device public key and a disclosure device private key, respectively.
- the disclosure device public key and the disclosure device private key are generated in advance and stored in the storage unit 13 of the disclosure device 21.
- the disclosed device public key is also distributed in advance to the user device 22 and stored in the storage unit 13 of the user device 22.
- the disclosed device public key is a set of binary ⁇ and ⁇ of GRP ′
- the disclosed device secret key is a set of binary ⁇ and ⁇ of Z / qZ, and those satisfying Expression 2 are used.
- the user device 22 is given a public key and a secret key in addition to the system parameters described above. These are called a user device public key and a user device secret key, respectively.
- the user device public key and the user device private key are generated in advance and stored in the storage unit 13 of the user device 22.
- the disclosure device 21 knows all the user device public keys of each user device 22, and a list 212 including a set of the ID of each user device 22 and the user device public key of the user device 22 is stored in the storage unit of the disclosure device 21. 13 is stored.
- the user apparatus public key is the element ⁇ of GRP ′
- the user apparatus secret key is the element ⁇ of Z / qZ
- the one satisfying Equation 3 is used.
- a certain group of user devices 22 (individual / organization managing the user device 22) is operated, and a unique public key is assigned to this group.
- This public key is called a group public key.
- the group public key is distributed in advance to each user device 22 and is also stored in the storage unit of the user device 22.
- the description will be made assuming that the number of groups is one, but the same applies when there are a plurality of groups.
- the group public key is a set consisting of ternary ⁇ , ⁇ , ⁇ of GRP [1], and binary ⁇ and ⁇ of GRP [2].
- ⁇ is an element that satisfies Equation 4, and ⁇ is a group secret key.
- the user device 22 belonging to the group is given information that proves that it belongs to the group.
- This information is called a member certificate.
- the member certificate is a set consisting of a binary ⁇ / ⁇ of Z / qZ and an element E of GRP [1], which satisfies Equation 5.
- ⁇ ⁇ + ⁇ .
- Each user device 22 belonging to the group is given attributes ⁇ [1],..., ⁇ [n] of the user device 22 (individual or group that manages the user device 22), and those attributes are further added. Information that proves is given. This information is called attribute certificate. Specific attributes given to this attribute certificate include, for example, name, gender, age, address, telephone number, presence of a driver's license, credit card enrollment status, pension information, and the like.
- the attribute certificate is made depending on these attributes. Therefore, n attribute certificates are assigned to the user device 22 to which n attributes are assigned.
- the attribute is represented as an arbitrary bit string.
- the member certificate of the user device 22 is ( ⁇ , ⁇ , E)
- the attribute certificate G [i] corresponding to the attribute ⁇ [i] of the user device 22 is the source of GRP [1], and the number 6 is satisfied.
- the user device 22 belongs to the group and the member certificate ( ⁇ , ⁇ , E) is given in advance. It is assumed that
- the user device 22 executes the signature unit 221 and creates a signature sentence signature for the document M.
- the signature unit 221 To the signature unit 221, the document M and attributes ⁇ [i1],..., ⁇ [im] to be disclosed by the user are input.
- all the attributes assigned to each user are ⁇ [1],..., ⁇ [n], in which the user discloses ⁇ [i1],.
- the attribute ⁇ [j1],..., ⁇ [jn ⁇ m] is to be hidden.
- n and m are natural numbers, and n> m.
- i1 to im are sets of m different natural numbers satisfying 1 ⁇ i ⁇ n.
- j1 to jn-m are sets of nm different natural numbers that satisfy 1 ⁇ j ⁇ n and are not included in i1 to im.
- Each user can arbitrarily determine which of the attributes assigned to the user device 22 is disclosed as ⁇ [i1],..., ⁇ [im].
- the generated signature sentence Signature is sent to the verification device 23 together with the document M and ⁇ [i1],..., ⁇ [im].
- the verification device 23 executes the verification unit 231 to determine whether or not the signature sentence Signature has been created by a valid method, that is, the signature sentence Signature for the document M has attributes ⁇ [i1],... ⁇ [im]. Is created by the authenticated user device 22.
- the document M and the signature sentence Signature are also sent to the disclosure device 21 as necessary.
- the disclosure device 21 can identify the signer who has executed the disclosure unit 211 and created the signature text.
- FIG. 3 is a flowchart showing the operation of the signature unit 221 that operates in the user device 22 shown in FIG.
- the ciphertext creating unit 221a of the signature unit 221 receives the document M and attributes ⁇ [i1],..., ⁇ [im] to be disclosed by the user via the input / output unit 12 of the user device 22 as input ( Step S41).
- the user device secret key ⁇ , the member certificate ( ⁇ , ⁇ , E), and the attribute certificates G [i1],..., G [im] are also read from the storage unit 13 of the user device 22.
- the ciphertext creating means 221a first randomly selects ⁇ from Z / qZ and calculates U shown in Equation 7. Then, the ciphertext Cipher obtained by encrypting ⁇ shown in Expression 8 is output to the signature text creation unit 221b (step S42).
- the signature text creating means 221b knows ( ⁇ , ⁇ , ⁇ , F ′) that satisfies the condition of Equation 9 from the value output from the cipher text creating means 221a, and Cipher encrypts ⁇ with cipher text
- a signature sentence proof of knowledge indicating that the above is created in accordance with the procedure shown in Equation 10 (step S43).
- the signature sentence creating means 221b first randomly selects ⁇ , d, t, b, x, k from Z / qZ, and then performs the calculation shown in Equation 10.
- Hash ′ is a hash function that takes a value of Z / qZ.
- E ( ⁇ , ⁇ ) is bilinear pairing.
- the signature output unit 221c calculates Equation 11 from the ciphertext Cipher output by the ciphertext creation unit 221a in the operation shown in Equation 8 and the signature sentence proof output from the signature statement creation unit 221b in the operation shown in Equation 10.
- the signature signature is generated by the operation shown in FIG. 4 and is output to the verification device 23 together with the document M and the attributes ⁇ [i1],..., ⁇ [im].
- U ⁇ ⁇ ( ⁇ + ⁇ ) in Equation 7 described above.
- FIG. 4 is a flowchart showing the operation of the verification unit 231 that operates in the verification device 23 shown in FIG.
- the input receiving unit 231a receives the document M, the attributes ⁇ [i1],..., ⁇ [im], and the signature sentence Signature output from the signature unit 221 of the user device 22 (step S51).
- the zero knowledge proof verification unit 231b performs an operation represented by Equation 12 from these numerical values to verify the zero knowledge proof sentence (F, c, D, T, B, X, K) (step S52). Then, it is determined whether or not this zero knowledge proof sentence can be accepted according to the condition shown in Equation 13 (step S53). If accepted, the fact that the signature sentence Signature is accepted is output to the input / output unit 12 of the verification device 23 and the process is terminated (step S54). Otherwise, the rejection is output and terminated (step S55).
- FIG. 5 is a flowchart showing the operation of the disclosure unit 211 that operates in the disclosure device 21 shown in FIG.
- the input receiving unit 211a receives the document M, the attributes ⁇ [i1],..., ⁇ [im], and the signature sentence Signature that are output from the signature unit 221 of the user device 22 as input (step S61).
- the zero knowledge proof verification means 231b performs an operation represented by Equation 12 from these numerical values to verify the zero knowledge proof sentence (F, c, D, T, B, X, K) (step S62). Then, it is determined whether or not this zero knowledge proof sentence can be accepted according to the condition shown in Equation 13 (step S63). Note that steps S61 to S63 described so far are the same processes as steps S51 to S53 in FIG.
- the data is output to the input / output unit 12 of the device 21 (step S65). If the zero-knowledge proof text cannot be accepted in step S63, a rejection is output and the processing ends as it is (step S66).
- the anonymous authentication signature system 1 is configured such that the user device 22 and the verification device 23 described above are connected to each other, and the attributes connected to the user device and the verification device are connected to each other.
- the attribute authentication apparatus includes an attribute authentication unit 251 that generates an attribute certificate based on data corresponding to an attribute given to a user, user secret key, and data determined depending on the user apparatus. Have.
- the system also includes an attribute verification device (user device 22b) interconnected with the user device, the verification device, and the attribute authentication device.
- the attribute verification device includes data corresponding to the attribute given to the user and the user's It has an attribute verification unit (attribute authenticator verification unit 223) that verifies whether or not the attribute certificate is valid from the data corresponding to the group to which it belongs.
- FIG. 6 is an explanatory diagram showing the overall configuration of the anonymous authentication signature system 301 according to the second embodiment of the present invention.
- the disclosure device 21 and the user device 22 are replaced with a disclosure device 21b and a user device 22b different from the first embodiment, compared to the anonymous authentication signature system 1 described in the first embodiment.
- the verification device 23 is the same as that in the first embodiment.
- the issuing device 24 and the attribute authentication device 25 are configured to be connected to each other via the same network 30.
- Both the issuing device 24 and the attribute authentication device 25 are the same computer devices as those described in FIG. Further, the issuing device 24 and the attribute authentication device 25 may be the same device as the disclosure device 21 or may be different devices. Further, a plurality of attribute authentication devices 25 may exist depending on the attribute.
- the group key generating unit 241 and the issuing unit 242 operate.
- the attribute authentication unit 251 operates in the calculation unit 11 included in the attribute authentication device 25.
- the disclosure key generation unit 213 operates in addition to the disclosure unit 211.
- an affiliation unit 222, an attribute authenticator verification unit 223, and a user device key creation unit 224 operate. All of these functional units operate as respective computer units as computer programs.
- the attribute authentication unit 251 generates an attribute certificate.
- the affiliation unit 222 has a function in which the user belongs to a specific group.
- the attribute authenticator verification unit 223 verifies the validity of the attribute certificate generated by the attribute authentication unit 251.
- the disclosure key generation unit 213 generates a disclosure public key and a disclosure secret key.
- the group key generation unit 241 generates a group public key and a corresponding group secret key.
- the group key generation unit 241 operates on the issuing device 24 will be described, but this may operate on the attribute authentication device 25.
- FIG. 7 is a flowchart showing the operation of the group key generation unit 241 operating on the issuing device 24 shown in FIG.
- the group key generation unit 241 first randomly selects ⁇ , ⁇ , ⁇ from GRP [1], randomly selects ⁇ from GRP [2], and selects ⁇ from Z / qZ. Random selection is made and ⁇ is defined as shown in Equation 15 (step S411).
- the group key generation unit 241 discloses the group consisting of ⁇ , ⁇ , ⁇ , ⁇ , and ⁇ as a group public key to the entire anonymous authentication signature system 301 (step S412). Then, ⁇ is transmitted and stored only in the issuing device 24 and the attribute authentication device 25 as a group secret key (step S413).
- FIG. 8 is a flowchart showing the operation of the disclosure key generation unit 213 operating in the disclosure device 21b shown in FIG.
- the disclosed key generation unit 213 randomly selects ⁇ and ⁇ from Z / qZ, and defines ⁇ and ⁇ as shown in Equation 16 (step S421).
- the group consisting of ⁇ and ⁇ is disclosed to the entire anonymous authentication signature system 301 as a disclosed public key (step S422).
- a set of ⁇ and ⁇ is stored as a disclosure secret key only in the storage unit 13 of the disclosure device 21b (step S423).
- FIG. 9 is a flowchart showing the operation of the user device key creation unit 224 that operates on the user device 22b shown in FIG.
- the user device key creation unit 224 first selects ⁇ and ⁇ randomly from Z / qZ, and defines ⁇ as shown in Equation 17 (step S431). Then, ⁇ is disclosed to the entire anonymous authentication signature system 301 as a user device public key (step S432). ⁇ selected in step S431 is stored as a user device secret key only in the storage unit 13 of the user device 22b (step S433).
- the user device key creation unit 224 may be configured to operate on a computer different from the user device 22b so that the user device 22b receives the created user device public key and user device secret key.
- FIG. 10 is a flowchart showing operations of the issuing unit 242 and the affiliation unit 222 that operate in the issuing device 24 and the user device 22b shown in FIG.
- the affiliation unit 222 first randomly selects ⁇ from Z / qZ and defines C as shown in Equation 18 (step S441). Then, the affiliation unit 222 randomly selects ⁇ ′ and ⁇ ′ from Z / qZ, calculates ⁇ ′ and C ′ shown in Equation 19, and then generates a zero knowledge proof sentence prf by the procedure shown in Equation 20. (Step S442), ( ⁇ , C, prf) is transmitted to the issuing device 24 (Step S443).
- the issuing unit 242 of the issuing device 24 Upon receiving ( ⁇ , C, prf), the issuing unit 242 of the issuing device 24 first performs calculation of Equation 21 to verify the validity of prf from the condition of Equation 22 (steps S444 to 445). If this is accepted, the calculation of Expression 23 is performed, and ( ⁇ , ⁇ , E) is returned to the user device 22b (steps S446 to 7), and further, the set of the ID and ⁇ of the user device 22b is transmitted to the disclosure device 21. And stored in the list 212 (step S448). If prf is not valid in step S445, an error is returned to the user device 22b and the process is terminated (step S449).
- the user device 22b that has returned ( ⁇ , ⁇ , E) from the issuing device 24 in step S447 calculates ⁇ shown in the equation 24 and determines whether or not the condition shown in the equation 25 is satisfied (steps S450 to 451). ). If the condition is satisfied, the protocol is terminated normally with ( ⁇ , ⁇ , E) as a member certificate (step S452), otherwise the protocol is terminated abnormally (step S453).
- FIG. 11 is a flowchart showing the operation of the attribute authentication unit 251 that operates in the attribute authentication device 25 shown in FIG.
- the attribute authentication unit 251 issues an attribute certificate corresponding to the attribute ⁇ to the user device 22b having the attribute ⁇ [i].
- the attribute authentication unit 251 calculates G [i] by the process shown as Equation 26, and outputs this as a member certificate (step S461).
- ⁇ is a part of the member certificate of the user device 22b.
- the attribute authentication device 25 It does not matter in particular how the attribute authentication device 25 obtains ⁇ , but from the viewpoint of security, the attribute authentication device 25 is that ⁇ is actually part of the member certificate of the user device 22b. It is desirable to confirm things in some way. More specifically, the issuing device 24 gives a signature to ⁇ and the attribute authentication device 25 confirms the signature, or the issuing device 24 publishes a correspondence table between the user device 22b and ⁇ in advance. There are methods.
- FIG. 12 is a flowchart illustrating the operation of the attribute authenticator verification unit 223 that operates in the user device 22b illustrated in FIG.
- the user device 22b executes the attribute authenticator verification unit 223 to verify the validity of the attribute certificate issued by the attribute authentication device 25.
- the attribute authenticator verification unit 223 determines the validity of G [i] based on whether or not the condition shown in Expression 27 is satisfied (step S471), and accepts G [i] if it is valid. (Step S472), otherwise it is rejected (Step S473).
- a signature method is a signature method for generating and outputting signature data for a document input by a user, and includes a system parameter, a disclosure public key, a user public key, and a user, which are parameters given in advance.
- An attribute certificate created using the same key as the private key, member certificate, and user public key is stored in advance, and a document from the user and an input of the attribute to be disclosed by the user are accepted (FIG. 3: In step S41, a ciphertext is created from the input document, the attribute to be disclosed, and each parameter (FIG. 3: step S42), and a zero knowledge signature text is created from the created ciphertext (FIG. 3: In step S43, the ciphertext and the zero knowledge signature text are output as signature data (FIG. 3: step S44).
- the verification method according to the present invention is a verification method for verifying whether the signature data generated by the user device is valid and outputting the result, which is a system parameter that is a parameter given in advance.
- the disclosure public key and the attribute certificate are stored in advance, the input of the document and the signature data from the user is accepted (FIG. 4: step S51), and the zero knowledge proof sentence included in the signature data is verified using each parameter. Then, it is determined whether or not this zero-knowledge proof sentence can be accepted (FIG. 4: steps S52 to 53). If it is determined that it can be accepted, the signature data is accepted (FIG. 4: step S54).
- each of the above-described operation steps may be programmed so as to be executable by a computer, and may be executed by the user device 22 or the verification device 23 which is a main body that directly executes each of the steps.
- the present embodiment (first and second embodiments) has the following effects.
- Equation 29 uses the same ⁇ ⁇ + ⁇ . By multiplying these equations into Equation 30, Equation 31 is established.
- the user can generate a signature of knowledge ( ⁇ , ⁇ , F ′, ⁇ ) satisfying the above-described Expression 31 as an attribute that discloses ⁇ [i1],..., ⁇ [im].
- ⁇ , ⁇ , and F ′ that need to be proved here, and a large amount of calculation proportional to the number of attributes to be disclosed is not required.
- the present invention can be used in systems and apparatuses that use anonymous authentication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
以下、本発明の第1の実施形態の構成について添付図1、2に基づいて説明する。
最初に、本実施形態の基本的な内容について説明し、その後でより具体的な内容について説明する。
本実施形態に係る匿名認証署名システム1は、ユーザから入力された文書に対する署名データを生成して出力するユーザ装置22と、ユーザ装置によって生成された署名データが正当であるか否かを検証してその結果を出力する検証装置23とが相互に接続されて構成された匿名認証署名システムである。ユーザ装置22は、あらかじめ与えられた各々の第1パラメータである第1のシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、および属性証明書を記憶している第1の記憶部13と、ユーザからの文書とユーザが開示しようとする属性の入力を受け付ける入出力部12と、入力された文書と開示しようとする属性、および各々の第1パラメータから暗号文を作成する暗号文作成手段221aと、作成された暗号文からゼロ知識署名文を作成する署名文作成手段221bと、暗号文およびゼロ知識署名文とを署名データとして出力する署名出力手段221cとを有する。検証装置23は、あらかじめ与えられた各々の第2パラメータである第2のシステムパラメータ、開示公開鍵、ユーザ公開鍵および属性証明書を記憶している第2の記憶部13と、ユーザ装置からの文書および署名データの入力を受け付ける入力受け取り手段231aと、各々の第2パラメータを用いて署名データに含まれるゼロ知識証明文を検証してこのゼロ知識証明文が受理できるか否かを判断し、受理できると判断されれば署名データを受理するゼロ知識証明検証手段231bとを有する。ここで、ユーザ公開鍵および属性証明書は同一の冪を使って作成されたものであり、ユーザ装置の署名文作成手段221aは、ユーザ公開鍵の一部と開示されなかった属性に対応する属性証明書の一部とをかけ合わせ、このかけ合わせたデータが事前に定められた式を満たす事の知識の署名文を作成する。
以下、これをより詳細に説明する。
(1)素数q、
(2)位数qの群GRP[1]の上の群演算を行う為に十分な情報、
(3)位数qの群GRP[2]の上の群演算を行う為に十分な情報、
(4)位数qの群GRP[3]の上の群演算を行う為に十分な情報、
(5)位数qの群GRP’の上の群演算を行う為に十分な情報、
(6)GRP[1]×GRP[2]からGRP[3]への双線形写像e:GRP[1]×GRP[2]→GRP[3]を計算する為に十分な情報、
(7)GRP’の生成元Θ、
以上の各々である。
本発明の第2の実施形態の構成について添付図6に基づいて説明する。
本実施形態に係る匿名認証署名システム1は、前述したユーザ装置22と検証装置23とが相互に接続されて構成されるのに加えて、それらのユーザ装置および検証装置と相互に接続された属性認証装置25を有し、この属性認証装置は、ユーザに与えられた属性に対応するデータとユーザ秘密鍵およびユーザ装置に依存して決まるデータに基づいて属性証明書を生成する属性認証部251を有する。
次に、上記の実施形態の全体的な動作について説明する。本発明に係る署名方法は、ユーザから入力された文書に対する署名データを生成して出力する署名方法であって、あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、およびユーザ公開鍵と同一の冪を使って作成された属性証明書を事前に記憶し、ユーザからの文書とユーザが開示しようとする属性の入力を受け付け(図3:ステップS41)、入力された文書と開示しようとする属性、および各々のパラメータから暗号文を作成し(図3:ステップS42)、作成された暗号文からゼロ知識署名文を作成し(図3:ステップS43)、暗号文およびゼロ知識署名文とを署名データとして出力する(図3:ステップS44)。
この構成および動作により、本実施形態(第1・第2の実施形態)は以下のような効果を奏する。
10 コンピュータ装置
11 演算部
12 入出力部
13 記憶部
14 通信部
21、21b 開示装置
22、22b ユーザ装置
23 検証装置
24 発行装置
25 属性認証装置
30 ネットワーク
211 開示部
212 リスト
213 開示鍵生成部
221 署名部
221a 暗号文作成手段
221b 署名文作成手段
221c 署名出力手段
222 所属部
223 属性認証子検証部
224 ユーザ装置鍵作成部
231 検証部
231a 入力受け取り手段
231b ゼロ知識証明検証手段
241 グループ鍵生成部
242 発行部
251 属性認証部
Claims (13)
- ユーザから入力された文書に対する署名データを生成して出力するユーザ装置と、前記ユーザ装置によって生成された前記署名データが正当であるか否かを検証してその結果を出力する検証装置とが相互に接続されて構成された匿名認証署名システムであって、
前記ユーザ装置が、
あらかじめ与えられた各々の第1パラメータである第1のシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、および属性証明書を記憶している第1の記憶部と、
ユーザからの文書と前記ユーザが開示しようとする属性の入力を受け付ける入出力部と、
入力された前記文書と前記開示しようとする属性、および前記各々の第1パラメータから暗号文を作成する暗号文作成手段と、
作成された前記暗号文からゼロ知識署名文を作成する署名文作成手段と、
前記暗号文および前記ゼロ知識署名文とを前記署名データとして出力する署名出力手段とを有し、
前記検証装置が、
あらかじめ与えられた各々の第2パラメータである第2のシステムパラメータ、前記開示公開鍵、前記ユーザ公開鍵および前記属性証明書を記憶している第2の記憶部と、
前記ユーザ装置からの前記文書および前記署名データの入力を受け付ける入力受け取り手段と、
前記各々の第2パラメータを用いて前記署名データに含まれるゼロ知識証明文を検証してこのゼロ知識証明文が受理できるか否かを判断し、受理できると判断されれば前記署名データを受理するゼロ知識証明検証手段とを有し、
前記ユーザ公開鍵および前記属性証明書は同一の冪を使って作成されたものであり、
前記ユーザ装置の前記署名文作成手段は、前記ユーザ公開鍵の一部と開示されなかった前記属性に対応する前記属性証明書の一部とをかけ合わせ、このかけ合わせたデータが事前に定められた式を満たす事を示す前記ゼロ知識署名文を作成することを特徴とする匿名認証署名システム。 - 前記ユーザ装置の前記第1の記憶部は、あらかじめ与えられた各々のパラメータであるグループ公開鍵およびグループ秘密鍵を記憶していて、
前記ユーザ装置の前記暗号文作成手段は、前記属性証明書の中で前記開示しようとする属性に対応するデータと、前記ユーザ公開鍵、前記ユーザ秘密鍵、前記グループ公開鍵、および前記グループ秘密鍵から前記暗号文を作成することを特徴とする、請求項1に記載の匿名認証署名システム。 - 前記ユーザ装置の前記署名文作成手段は、前記暗号文作成手段が作成した暗号文が前記ユーザ公開鍵に含まれるデータの暗号文であることに対するゼロ知識署名文を作成することを特徴とする、請求項1に記載の匿名認証署名システム。
- 前記検証装置の前記入力受け取り手段は、前記ユーザが開示する属性のデータの入力を受け付け、
前記検証装置の前記ゼロ知識証明検証手段は、このユーザが開示する属性と前記各々のパラメータとを用いて前記署名データに含まれる前記ゼロ知識証明文を検証することを特徴とする、請求項1に記載の匿名認証署名システム。 - 前記検証装置の前記第2の記憶部は、グループ公開鍵をあらかじめ与えられた前記パラメータとして記憶していて、
前記検証装置の前記ゼロ知識証明検証手段は、前記ユーザが開示した属性に対応するデータと、前記ユーザ公開鍵、前記グループ公開鍵、および前記グループ秘密鍵から前記ゼロ知識証明文を検証することを特徴とする、請求項4に記載の匿名認証署名システム。 - 前記ユーザ装置および前記検証装置と相互に接続された属性認証装置を有し、
前記属性認証装置は、前記ユーザに与えられた属性に対応するデータとユーザ秘密鍵および前記ユーザ装置に依存して決まるデータに基づいて前記属性証明書を生成する属性認証部を有することを特徴とする、請求項1に記載の匿名認証署名システム。 - 前記ユーザ装置、前記検証装置および前記属性認証装置と相互に接続された属性検証装置を有し、
前記属性検証装置は、前記ユーザに与えられた属性に対応するデータと前記ユーザの属するグループに対応するデータから前記属性証明書が正当なものであるか否かを検証する属性検証部を有することを特徴とする、請求項6に記載の匿名認証署名システム。 - ユーザから入力された文書に対する署名データを生成して出力するユーザ装置であって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、および属性証明書を記憶している記憶部と、
ユーザからの文書と前記ユーザが開示しようとする属性の入力を受け付ける入出力部と、
入力された前記文書と前記開示しようとする属性、および前記各々のパラメータから暗号文を作成する暗号文作成手段と、
作成された前記暗号文からゼロ知識署名文を作成する署名文作成手段と、
前記暗号文および前記ゼロ知識署名文とを前記署名データとして出力する署名出力手段とを有し、
前記ユーザ公開鍵および前記属性証明書は同一の冪を使って作成されたものであり、
前記署名文作成手段は、前記ユーザ公開鍵の一部と開示されなかった前記属性に対応する前記属性証明書の一部とをかけ合わせ、このかけ合わせたデータが事前に定められた式を満たす事を示す前記ゼロ知識署名文を作成することを特徴とするユーザ装置。 - ユーザ装置によって生成された署名データが正当であるか否かを検証してその結果を出力する検証装置であって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵および属性証明書を記憶している記憶部と、
ユーザからの文書および前記署名データの入力を受け付ける入力受け取り手段と、
前記各々のパラメータを用いて前記署名データに含まれるゼロ知識証明文を検証してこのゼロ知識証明文が受理できるか否かを判断し、受理できると判断されれば前記署名データを受理するゼロ知識証明検証手段とを有し、
前記ユーザ公開鍵および前記属性証明書は同一の冪を使って作成されたものであることを特徴とする検証装置。 - ユーザから入力された文書に対する署名データを生成して出力する署名方法であって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、および前記ユーザ公開鍵と同一の冪を使って作成された属性証明書を事前に記憶し、
ユーザからの文書と前記ユーザが開示しようとする属性の入力を受け付け、
入力された前記文書と前記開示しようとする属性、および前記各々のパラメータから暗号文を作成し、
前記ユーザ公開鍵の一部と開示されなかった前記属性に対応する前記属性証明書の一部とをかけ合わせ、このかけ合わせたデータが事前に定められた式を満たす事を示すゼロ知識署名文を作成し、
前記暗号文および前記ゼロ知識署名文とを前記署名データとして出力する
ことを特徴とする署名方法。 - ユーザ装置によって生成された署名データが正当であるか否かを検証してその結果を出力する検証方法であって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵および前記ユーザ公開鍵と同一の冪を使って作成された属性証明書を事前に記憶し、
ユーザからの文書および前記署名データの入力を受け付け、
前記各々のパラメータを用いて前記署名データに含まれるゼロ知識証明文を検証してこのゼロ知識証明文が受理できるか否かを判断し、
受理できると判断されれば前記署名データを受理する
ことを特徴とする検証方法。 - ユーザから入力された文書に対する署名データを生成して出力する署名プログラムであって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵、ユーザ秘密鍵、メンバー証明書、および前記ユーザ公開鍵と同一の冪を使って作成された属性証明書が事前に記憶されているコンピュータに、
ユーザからの文書と前記ユーザが開示しようとする属性の入力を受け付ける手順と、
入力された前記文書と前記開示しようとする属性、および前記各々のパラメータから暗号文を作成する手順と、
前記ユーザ公開鍵の一部と開示されなかった前記属性に対応する前記属性証明書の一部とをかけ合わせ、このかけ合わせたデータが事前に定められた式を満たす事を示すゼロ知識署名文を作成する手順と、
前記暗号文および前記ゼロ知識署名文とを前記署名データとして出力する手順と
を実行させることを特徴とする署名プログラム。 - ユーザ装置によって生成された署名データが正当であるか否かを検証してその結果を出力する検証プログラムであって、
あらかじめ与えられた各々のパラメータであるシステムパラメータ、開示公開鍵、ユーザ公開鍵および前記ユーザ公開鍵と同一の冪を使って作成された属性証明書が事前に記憶されているコンピュータに、
ユーザからの文書および前記署名データの入力を受け付ける手順と、
前記各々のパラメータを用いて前記署名データに含まれるゼロ知識証明文を検証してこのゼロ知識証明文が受理できるか否かを判断する手順と、
受理できると判断されれば前記署名データを受理する手順と
を実行させることを特徴とする検証プログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/383,476 US8949609B2 (en) | 2009-07-13 | 2010-07-06 | Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor |
JP2011522786A JP5532048B2 (ja) | 2009-07-13 | 2010-07-06 | 匿名認証署名システム、ユーザ装置、検証装置、署名方法、検証方法およびそれらのプログラム |
EP10799756.1A EP2456119B1 (en) | 2009-07-13 | 2010-07-06 | Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009-164884 | 2009-07-13 | ||
JP2009164884 | 2009-07-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011007697A1 true WO2011007697A1 (ja) | 2011-01-20 |
Family
ID=43449306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/061449 WO2011007697A1 (ja) | 2009-07-13 | 2010-07-06 | 匿名認証署名システム、ユーザ装置、検証装置、署名方法、検証方法およびそれらのプログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US8949609B2 (ja) |
EP (1) | EP2456119B1 (ja) |
JP (1) | JP5532048B2 (ja) |
WO (1) | WO2011007697A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012101913A1 (ja) * | 2011-01-25 | 2012-08-02 | 三菱電機株式会社 | 署名処理システム、鍵生成装置、署名装置、検証装置、署名処理方法及び署名処理プログラム |
US8464058B1 (en) | 2008-04-08 | 2013-06-11 | Hewlett-Packard Development Company, L.P. | Password-based cryptographic method and apparatus |
US8930704B2 (en) | 2011-04-26 | 2015-01-06 | Hewlett-Packard Development Company, L.P. | Digital signature method and system |
WO2020261396A1 (ja) * | 2019-06-25 | 2020-12-30 | 富士通株式会社 | 検証方法、検証システム及び証明プログラム |
JPWO2021124498A1 (ja) * | 2019-12-18 | 2021-06-24 | ||
JP7462910B2 (ja) | 2019-02-25 | 2024-04-08 | ティービーシーエーソフト,インコーポレイテッド | クレデンシャル・サービス・プロバイダを通じたクレデンシャルの検証及び発行 |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4764447B2 (ja) * | 2008-03-19 | 2011-09-07 | 株式会社東芝 | グループ署名システム、装置及びプログラム |
US9075958B2 (en) * | 2009-06-24 | 2015-07-07 | Uniloc Luxembourg S.A. | Use of fingerprint with an on-line or networked auction |
WO2012174427A2 (en) | 2011-06-16 | 2012-12-20 | OneID Inc. | Method and system for determining authentication levels in transactions |
JP5790289B2 (ja) * | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、及び記録媒体 |
AU2011101297B4 (en) | 2011-08-15 | 2012-06-14 | Uniloc Usa, Inc. | Remote recognition of an association between remote devices |
WO2013109932A1 (en) | 2012-01-18 | 2013-07-25 | OneID Inc. | Methods and systems for secure identity management |
US9286466B2 (en) | 2013-03-15 | 2016-03-15 | Uniloc Luxembourg S.A. | Registration and authentication of computing devices using a digital skeleton key |
WO2015105479A1 (en) * | 2014-01-07 | 2015-07-16 | Empire Technology Development Llc | Anonymous signature scheme |
JP5807887B1 (ja) * | 2015-05-07 | 2015-11-10 | 株式会社制御システム研究所 | プログラマブルロジックデバイス、プログラマブルロジックデバイスのエラー検証方法、及びプログラマブルロジックデバイスの回路形成方法 |
US9853817B2 (en) * | 2015-11-23 | 2017-12-26 | Lockheed Martin Corporation | Generating enhanced digital signatures for artifacts |
US11025428B2 (en) | 2016-05-05 | 2021-06-01 | Neustar, Inc. | Systems and methods for enabling trusted communications between controllers |
US11277439B2 (en) | 2016-05-05 | 2022-03-15 | Neustar, Inc. | Systems and methods for mitigating and/or preventing distributed denial-of-service attacks |
US11108562B2 (en) | 2016-05-05 | 2021-08-31 | Neustar, Inc. | Systems and methods for verifying a route taken by a communication |
US10958725B2 (en) | 2016-05-05 | 2021-03-23 | Neustar, Inc. | Systems and methods for distributing partial data to subnetworks |
WO2017193093A1 (en) * | 2016-05-05 | 2017-11-09 | Neustar, Inc. | Systems and methods for enabling trusted communications between entities |
CN109450645B (zh) * | 2018-11-29 | 2021-04-13 | 中国电子科技集团公司第三十研究所 | 一种基于零知识证明的可监管匿名认证方法 |
US11451519B2 (en) * | 2019-11-25 | 2022-09-20 | Electronics And Telecommunications Research Institute | Anonymous credential authentication system and method thereof |
KR102460299B1 (ko) * | 2019-11-25 | 2022-10-28 | 한국전자통신연구원 | 익명 크리덴셜 인증 시스템 및 그 방법 |
CN114189340B (zh) * | 2021-12-09 | 2023-05-23 | 电子科技大学 | 一种基于素数阶群的基于属性签名方法 |
WO2024159217A1 (en) * | 2023-01-27 | 2024-08-02 | Passivebolt, Inc. | Decentralized identity-based access control systems and methods |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001188757A (ja) | 1999-12-28 | 2001-07-10 | Nippon Telegr & Teleph Corp <Ntt> | 証明書を用いたサービス提供方法 |
JP2005159463A (ja) | 2003-11-20 | 2005-06-16 | Hitachi Ltd | Pki認証システムにおける代替証明書発行・検証システム |
JP2006330462A (ja) * | 2005-05-27 | 2006-12-07 | Nec Corp | 擬似ランダム関数計算装置及び方法、並びに回数制限匿名認証システム及び方法 |
JP2008131058A (ja) | 2006-11-16 | 2008-06-05 | Kddi R & D Laboratories Inc | 属性認証システム、同システムにおけるユーザの行動履歴検索方法およびプログラム |
WO2009008069A1 (ja) * | 2007-07-11 | 2009-01-15 | Kabushiki Kaisha Toshiba | グループ署名システム、装置及びプログラム |
JP2009164884A (ja) | 2008-01-07 | 2009-07-23 | Fujitsu Media Device Kk | 弾性波デバイス及びその製造方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4872908B2 (ja) * | 2005-02-10 | 2012-02-08 | 日本電気株式会社 | メンバー証明書獲得装置、メンバー証明書発行装置、グループ署名装置、グループ署名検証装置 |
US7975142B2 (en) * | 2006-12-04 | 2011-07-05 | Electronics And Telecommunications Research Institute | Ring authentication method for concurrency environment |
-
2010
- 2010-07-06 JP JP2011522786A patent/JP5532048B2/ja not_active Expired - Fee Related
- 2010-07-06 WO PCT/JP2010/061449 patent/WO2011007697A1/ja active Application Filing
- 2010-07-06 US US13/383,476 patent/US8949609B2/en not_active Expired - Fee Related
- 2010-07-06 EP EP10799756.1A patent/EP2456119B1/en not_active Not-in-force
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001188757A (ja) | 1999-12-28 | 2001-07-10 | Nippon Telegr & Teleph Corp <Ntt> | 証明書を用いたサービス提供方法 |
JP2005159463A (ja) | 2003-11-20 | 2005-06-16 | Hitachi Ltd | Pki認証システムにおける代替証明書発行・検証システム |
JP2006330462A (ja) * | 2005-05-27 | 2006-12-07 | Nec Corp | 擬似ランダム関数計算装置及び方法、並びに回数制限匿名認証システム及び方法 |
JP2008131058A (ja) | 2006-11-16 | 2008-06-05 | Kddi R & D Laboratories Inc | 属性認証システム、同システムにおけるユーザの行動履歴検索方法およびプログラム |
WO2009008069A1 (ja) * | 2007-07-11 | 2009-01-15 | Kabushiki Kaisha Toshiba | グループ署名システム、装置及びプログラム |
JP2009164884A (ja) | 2008-01-07 | 2009-07-23 | Fujitsu Media Device Kk | 弾性波デバイス及びその製造方法 |
Non-Patent Citations (3)
Title |
---|
JAN CAMENISCH; ANNA LYSYANSKAYA, A SIGNATURE SCHEME WITH EFFICIENT PROTOCOLS. SCN2002, pages 268 - 289 |
JUN FURUKAWA; HIDEKI IMAI: "An Efficient Group Signature Scheme from Bilinear Maps", ACISP, 2005, pages 455 - 467, XP019011708 |
See also references of EP2456119A4 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8464058B1 (en) | 2008-04-08 | 2013-06-11 | Hewlett-Packard Development Company, L.P. | Password-based cryptographic method and apparatus |
WO2012101913A1 (ja) * | 2011-01-25 | 2012-08-02 | 三菱電機株式会社 | 署名処理システム、鍵生成装置、署名装置、検証装置、署名処理方法及び署名処理プログラム |
JP2012155088A (ja) * | 2011-01-25 | 2012-08-16 | Mitsubishi Electric Corp | 署名処理システム、鍵生成装置、署名装置、検証装置、署名処理方法及び署名処理プログラム |
US9106408B2 (en) | 2011-01-25 | 2015-08-11 | Mitsubishi Electric Corporation | Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program |
US8930704B2 (en) | 2011-04-26 | 2015-01-06 | Hewlett-Packard Development Company, L.P. | Digital signature method and system |
JP7462910B2 (ja) | 2019-02-25 | 2024-04-08 | ティービーシーエーソフト,インコーポレイテッド | クレデンシャル・サービス・プロバイダを通じたクレデンシャルの検証及び発行 |
WO2020261396A1 (ja) * | 2019-06-25 | 2020-12-30 | 富士通株式会社 | 検証方法、検証システム及び証明プログラム |
JPWO2020261396A1 (ja) * | 2019-06-25 | 2021-12-09 | 富士通株式会社 | 検証方法、検証システム及び証明プログラム |
JP7272436B2 (ja) | 2019-06-25 | 2023-05-12 | 富士通株式会社 | 検証方法、検証システム及び証明プログラム |
JPWO2021124498A1 (ja) * | 2019-12-18 | 2021-06-24 | ||
WO2021124498A1 (ja) * | 2019-12-18 | 2021-06-24 | 富士通株式会社 | 保証制御方法、情報処理装置および保証制御プログラム |
JP7222436B2 (ja) | 2019-12-18 | 2023-02-15 | 富士通株式会社 | 保証制御方法、情報処理装置および保証制御プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP2456119A4 (en) | 2015-04-08 |
US8949609B2 (en) | 2015-02-03 |
JPWO2011007697A1 (ja) | 2012-12-27 |
US20120124379A1 (en) | 2012-05-17 |
JP5532048B2 (ja) | 2014-06-25 |
EP2456119A1 (en) | 2012-05-23 |
EP2456119B1 (en) | 2016-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5532048B2 (ja) | 匿名認証署名システム、ユーザ装置、検証装置、署名方法、検証方法およびそれらのプログラム | |
CN103081398B (zh) | 用于保护密码资产免受白盒攻击的系统和方法 | |
Herranz | Deterministic identity-based signatures for partial aggregation | |
Kaaniche et al. | Attribute-based signatures for supporting anonymous certification | |
US8583932B2 (en) | Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor | |
US9882890B2 (en) | Reissue of cryptographic credentials | |
US20040165728A1 (en) | Limiting service provision to group members | |
US20120278609A1 (en) | Joint encryption of data | |
EP2792098B1 (en) | Group encryption methods and devices | |
JP4973193B2 (ja) | 制限付ブラインド署名システム | |
Rass et al. | Cryptography for security and privacy in cloud computing | |
Singh et al. | A novel credential protocol for protecting personal attributes in blockchain | |
CN102301643B (zh) | 数据处理系统中的密码证书的管理方法和系统 | |
WO2007105749A1 (ja) | グループ署名システムおよび情報処理方法 | |
Govinda et al. | Identity anonymization and secure data storage using group signature in private cloud | |
Garcia-Rodriguez et al. | Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures | |
Al-Riyami et al. | Escrow-free encryption supporting cryptographic workflow | |
JP3513324B2 (ja) | ディジタル署名処理方法 | |
EP2384563B1 (en) | Verification of data items in data processing systems | |
JP4791828B2 (ja) | グループ署名システム、装置、プログラム及び方法 | |
JP2004228958A (ja) | 署名方法および署名プログラム | |
Wu et al. | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | |
Enache | About group digital signatures | |
Rajasree | Generation of dynamic group digital signature | |
JP2009290698A (ja) | ブラインド署名装置、部分ブラインド署名装置、受信装置、システム、方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10799756 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011522786 Country of ref document: JP |
|
REEP | Request for entry into the european phase |
Ref document number: 2010799756 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13383476 Country of ref document: US Ref document number: 2010799756 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |