WO2005041474A1 - 認証システム及び遠隔分散保存システム - Google Patents
認証システム及び遠隔分散保存システム Download PDFInfo
- Publication number
- WO2005041474A1 WO2005041474A1 PCT/JP2004/015184 JP2004015184W WO2005041474A1 WO 2005041474 A1 WO2005041474 A1 WO 2005041474A1 JP 2004015184 W JP2004015184 W JP 2004015184W WO 2005041474 A1 WO2005041474 A1 WO 2005041474A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- value
- authentication
- server
- data
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
Definitions
- the present invention relates to an authentication system that is resistant to leakage of information related to authentication and a remote distributed storage system that can securely store data using the authentication system.
- a user ID and a password known only to the user are input from the terminal device and matched with the information stored on the server side. Then, a method of authenticating a valid user is known.
- Non-Patent Documents 1 to 3 are based on the method of password analysis by offline analysis when information encrypted with a password is leaked from the user's terminal device or the password authentication data is leaked from the server. There is a problem that can be requested.
- the method of repeatedly entering the password online to the server can take measures such as denying access according to the number of times the password is incorrect.However, in the offline analysis work, take preventive measures. There is also the problem that it cannot be changed. Also, if the password is leaked, there is also a problem that the data stored in the system that can log in with this password is leaked. Disclosure of the invention
- An object of the present invention is to provide an authentication system that is resistant to information leakage and that can securely exchange encryption keys.
- An object of the present invention is to provide a remote decentralized storage system that can securely store data using the authentication system according to the present invention.
- the gist of the present invention is an authentication system that performs mutual authentication between a terminal device and a server, wherein the terminal device performs password authentication for server registration based on a password determined in advance by a user.
- Data decompression means for obtaining data H and authentication information P 'for user storage; storage means for pre-stored authentication information P' obtained by the data decompression means; and authentication information P 'read from the storage means.
- a value V1 is determined by a predetermined formula using the value MK as an input, and transmitted to a server, and a value obtained by a predetermined formula using the value V2 received from the server and the value MK as an input V2 is provided, and an authentication result judgment means is provided for authenticating the server if it matches.
- the server includes a storage unit that stores password authentication data H obtained by the data decompression unit in advance, a password authentication data read from the storage unit, and a random number generated internally as input.
- a mask calculating means for obtaining a value Y2 by a predetermined calculation formula, transmitting the value to the terminal device, a password authentication data H, a random number generated internally, and a value Y1 received from the terminal device as a predetermined value;
- a master key generating means for obtaining a value MK by a calculation formula; a value V2 obtained by a predetermined calculation formula by using the value MK as an input; transmitting the value to the terminal device; and transmitting the value V1 and the value V1 received from the terminal device.
- An authentication result determination unit is provided that compares the value MK as an input with a value VI based on a predetermined calculation formula, and authenticates the terminal device when the values match.
- the gist of the present invention is an authentication program that operates on a terminal device in an authentication system that performs mutual authentication between the terminal device and a server.
- the authentication program is based on a password determined in advance by a user.
- a data decompression process for obtaining a pass-word authentication data H for one-pass registration and authentication information P ′ for storing a user; a storage process for previously storing the authentication information P ′ obtained by the data decompression process; Combination processing to obtain a value P by a predetermined calculation formula using the authentication information P 'stored in the process and the password input at the time of authentication, and a predetermined process using the value P and a random number generated inside as inputs
- a value Y1 is calculated by the following formula, and a mask calculation process for transmitting the value to the server is performed.
- the value P, the internally generated random number, and the value Y2 received from the server are input as predetermined values.
- An authentication program operating on a server in an authentication system for performing authentication comprising: a storage process for storing password authentication data H in advance; and a path stored by the storage process.
- the password authentication data H and the internally generated random number are input, a value Y2 is obtained by a predetermined calculation formula, a mask calculation process to be transmitted to the terminal device is performed, and the password authentication data H and the internally generated random number are calculated.
- a master key generation process for obtaining a value MK by a predetermined formula using the value Y1 received from the terminal device as an input, obtaining a value V2 by a predetermined formula using the value MK as an input, and transmitting the value to the terminal device.
- the computer receives the value V1 received from the terminal device and the value MK, compares the value V1 with the value VI according to a predetermined calculation formula, and if the values match, authenticates the terminal device. .
- the gist of the present invention is an authentication system for performing mutual authentication between a terminal device and a server, wherein the terminal device performs password authentication data for server registration based on a password determined in advance by a user.
- H and the data decompression means for obtaining the authentication information P 'for storing the user, and the authentication information P' obtained by the data decompression means and the RSA public key (N, e) obtained by the RSA key generation means are stored in advance.
- Storage means combining means for obtaining a value W by a predetermined calculation formula by using the authentication information P 'read from the storage means and the password input at the time of authentication, and reading the value W and the storage means
- a mask calculating means for obtaining a value Z by a predetermined formula using the RSA public key (N, e) and a random number T generated internally as input, and transmitting the value to the server, and a value received from the server V2 and the random number T are input and compared with a value V2 according to a predetermined calculation formula, and an authentication result determining means for authenticating the server when they match, and a value VI is calculated by a predetermined calculation formula using the random number T as an input.
- a verifier generating means for transmitting to the server, the server comprising: an RSA key generating means for obtaining an RSA public key (N, e) and an RSA secret key (N, d); and the RSA key.
- Storage means for previously storing the RSA secret key (N, d) obtained by the generation means and the password authentication data H obtained by the data expansion means; and an RSA secret key (N, d) read from the storage means.
- Master key generating means for inputting the value H and the value Z received from the terminal device to obtain a value T by a predetermined calculation formula; and inputting the value T to obtain a value V 2 by a predetermined calculation formula.
- the gist of the present invention is an authentication program that operates on a terminal device in an authentication system that performs mutual authentication between the terminal device and a server.
- the authentication program for server registration is performed based on a password determined in advance by a user.
- the gist of the present invention is an authentication program that operates on a server in an authentication system that performs mutual authentication between a terminal device and a server, wherein an RSA public key (N, e) and an RSA secret key (N, d) are used.
- the computer is made to perform the result determination process.
- the gist of the present invention is a remote distributed storage system for mutually authenticating between a terminal device and a plurality of servers, and distributing and storing data to be stored in the terminal device in the server.
- the terminal device includes: a data decompression unit that obtains a password authentication data H for server registration and authentication information P ′ for user storage based on a password determined in advance by a user; Storage means for preliminarily storing the authentication information P 'obtained by the above, and coupling means for obtaining the value P. by a predetermined formula using the authentication information P' read from the storage means and the password input at the time of authentication.
- the value P1 and a random number generated internally are input and a value Y1 is obtained by a predetermined calculation formula, and a mask calculating means for transmitting the value Y1 to the server is generated.
- a master key generating means for inputting a random number and a value Y2 received from the server to obtain a value MK by a predetermined calculation formula; obtaining a value V1 by a predetermined calculation formula by receiving the value MK as an input; Then, the value V2 received from the server is compared with the value VI, and the authentication result determining means for authenticating the server when the values match, and the session key SK when the server is authenticated.
- Session key generating means for generating the same number of servers; data dividing means for dividing the data to be stored to obtain the same number of divided data as the number of authenticated servers; and each of the divided data and the storage object Data storing means for encrypting the identification information for identifying the data using the session key SK shared with the storage destination server and transmitting the encrypted data to each server; A data restoring means for receiving the divided data from the storage device and restoring the data to be saved; the server comprising: a storage means for previously storing the password authentication data H obtained by the data decompression means; and the storage means.
- Mask calculation means for obtaining the value Y2 by a predetermined formula using the password authentication data H read out from the memory and the internally generated random number as an input, and transmitting the password authentication data H to the terminal device;
- a master key generation means for inputting the random number generated in step 2 and the value Y1 received from the terminal device to obtain a value MK according to a predetermined calculation formula; and a value V2 according to a predetermined calculation formula using the value MK as input.
- the gist of the present invention is that a terminal device and a plurality of servers mutually authenticate each other, and the data to be stored in the terminal device is distributed and stored in the server on the terminal device in the remote distributed storage system.
- a remote storage program that operates, a data decompression process for obtaining password authentication data H for server registration and authentication information P ′ for user storage based on a password predetermined by the user;
- a storage process in which the authentication information P 'obtained by the data decompression process is stored in advance, and a value P is obtained by a predetermined formula using the authentication information P' read from the storage process and the password input at the time of authentication as inputs.
- the value VI is obtained and transmitted to the server, and the value V2 and the value V1 received from the server are compared and collated, and if they match, an authentication result determination process for authenticating the server and server authentication are performed.
- the gist of the present invention is that a terminal device and a plurality of servers mutually authenticate each other, and operate on a server in a remote distributed storage system in which data to be stored in the terminal device is distributed and stored in the server.
- a remote storage program that stores password authentication data H obtained by data decompression processing in advance, and stores a password authentication data H read from the storage processing and a random number generated internally.
- a value Y2 is obtained by a predetermined calculation formula as an input, a mask calculation process to be transmitted to the terminal device, and the password authentication data H, a random number generated inside, and a value Y1 received from the terminal device are obtained.
- Master-key generation processing for obtaining a value MK by a predetermined calculation expression as an input, and obtaining a value V2 by a predetermined calculation expression by inputting the value MK to a terminal device
- Authentication value judgment processing for comparing the value V1 and the value V2 received from the terminal device, and authenticating the terminal device when the values V1 and V2 match.
- a session key generation process for generating a key; a data reception process for receiving the divided data received from the terminal device; a data storage process for storing the divided data; and the divided data stored in the data storage process And transmitting the data to a terminal device.
- FIG. 1 is a block diagram illustrating a configuration of a terminal device according to an embodiment of the present invention. .
- FIG. 2 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 3 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 4 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 5 is a block diagram showing the configuration of a device that performs mutual authentication and key exchange.
- FIG. 6 is a block diagram showing a configuration of the terminal device 1 shown in FIG.
- FIG. 7 is a block diagram showing a configuration of the server 2 shown in FIG.
- FIG. 8 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 9 is a block diagram showing the configuration of the terminal device 1 for updating the password authentication data 11.
- FIG. 10 is a block diagram showing the configuration of the server 2 for updating password authentication data-1.
- FIG. 11 is a block diagram showing the configuration of the terminal device 1 for updating the password authentication data 12.
- FIG. 12 is a block diagram showing the configuration of the server 2 for updating password authentication data-2.
- FIG. 13 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 14 is a block diagram showing a configuration of the data decompressor 11 shown in FIG.
- FIG. 15 is a block diagram illustrating a configuration of the server 2 when performing initialization processing using secure communication.
- FIG. 16 is a block diagram showing the configurations of the terminal device 1 and the server 2 when performing the initialization process using insecure communication.
- FIG. 17 is a block diagram showing a configuration of the terminal device 1 shown in FIG.
- FIG. 18 is a block diagram showing a configuration of the server 2 shown in FIG.
- FIG. 19 is a block diagram showing a configuration of the terminal device 1 in a case where the updating process is performed using the master key.
- FIG. 20 is a block diagram showing a configuration of the server 2 in a case where an update process is performed using a master key.
- FIG. 21 is a block diagram showing a configuration of the remote distributed storage device 5 when the distributed data is not stored in the terminal.
- FIG. 22 is a block diagram showing a configuration of the data distributor 51 shown in FIG.
- FIG. 23 is a block diagram showing a configuration of the remote distributed storage device 5 when data is not stored in the terminal.
- FIG. 24 is a block diagram showing the configuration of the data decompressor 54 shown in FIG.
- FIG. 25 is a block diagram showing a configuration of the remote distributed storage device 5 when the distributed data is also stored in the terminal.
- FIG. 26 is a block diagram showing the configuration of the data divider 51 shown in FIG.
- FIG. 27 is a block diagram showing a configuration of the remote distributed storage device 5 when the distributed data is also stored in the terminal.
- FIG. 28 is a block diagram showing a configuration of data restorer 54 shown in FIG. Best mode for carrying out the invention.
- the user's terminal device and the server's authentication device mutually authenticate each other and secure the same session key.
- P and q are prime numbers and have a relationship of d I p-l.
- QI p-1 means that Q is a value divisible by p-1.
- g j mod p means the remainder of the power of g raised to the j-th power divided by p in the exponential operation.
- p and Q indicate the operation system (characteristic of the prime field).
- the random number generated by the random number generator generates RG (Z / q Z) * at random.
- (Z / qZ) * indicates a set of ⁇ 1, 2, ⁇ , Q ⁇ .
- N indicates the length of the password. II means concatenation of values (conc at ena ti on).
- FIG. 1 is a block diagram showing a configuration of an initialization process of a user terminal device.
- the data decompressor 11 When a user inputs a password, the data decompressor 11 generates password authentication data H for server registration and a value P for user storage, and the password authentication data H is received by the server. Passed, the value P, is stored in memory 12.
- the data decompressor 11 can be composed of a polynomial, a polynomial and a hash function, a hash function, a pseudorandom number generator, and the like.
- a polynomial is randomly generated by a polynomial generator 1 1 1.
- the first-order polynomial ( ⁇ '( ⁇ ) !-Xmo dq) with X as a variable
- the n-th polynomial ( ⁇ ' ( ⁇ ) ⁇ ! ⁇ ⁇ + ⁇ 2 ⁇ ⁇ 2 + ⁇ ⁇ -+ ⁇ -x n mod dq).
- the password authentication data generator 111 When the polynomial and the password of the user are input, the password authentication data generator 111 generates password authentication data H.
- p '(1) is the value calculated by inserting the server ID (for example, "1") in place of X (' X).
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- a polynomial is randomly generated by a polynomial generator 1 1 1.
- the first-order polynomial (p, (X) l-xmo dq) with ⁇ ⁇ ⁇ as a variable
- the n-th polynomial (p, (x) CE I ⁇ ⁇ + ⁇ 2 ⁇ x 2 +- ⁇ -+ ⁇ ⁇ ⁇ x n mo dq).
- ⁇ is randomly chosen from (Z / qq) *.
- the user enters a password that he remembers (for example, "Pooh 93").
- the password authentication data generator 111 When the polynomial and the password of the user are input, the password authentication data generator 111 generates password authentication data H.
- p, (1) is the value calculated by inserting the server ID (for example, “1”) in place of x in p, (x). It is necessary for the user to notify the user of the password authentication data safely by directly passing it to the server, sending it by mail, or notifying him by telephone.
- a polynomial is randomly generated by a polynomial generator 1 19.
- the first-order polynomial ( ⁇ '(X) 1-xmodN) with X as a variable
- the nth-order polynomial ( ⁇ ' ( ⁇ ) a! ⁇ ⁇ ⁇ - ⁇ 2 ⁇ ⁇ 2 + ⁇ ⁇ ⁇ + Q! N ⁇ x n mod dN).
- the hash function generator 120 generates a hash function HASH randomly.
- HASH is a one-way hash function.
- the user enters a password that he remembers (for example, "Pooh 93").
- the password authentication data generator 1 2 1 generates password authentication data H.
- ID (U) and ID (S) represent user and server IDs, respectively.
- p, (1) is the value calculated by inserting "1" in place of X in p '(X).
- the password authentication data generator 122 generates password authentication data H for the i-th server.
- ID (U) and ID (S) represent the ID of the user and the i-th server, respectively.
- (i) is the value calculated by inserting "i" in place of X in the nth degree polynomial p '(X).
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- the hash function generator 120 generates a hash function HASH randomly.
- HASH is a one-way hash function.
- the user enters a password that he remembers (for example, "Pooh 93").
- Polynomial, hash function and user password
- the password authentication data generator 121 generates password authentication data H.
- ID (U) and ID (S) represent user and server IDs, respectively.
- p '(1) is the value calculated by inserting' 1 'in place of X in p' (X).
- the password authentication data generator 121 when the number of servers to be registered is n, the password authentication data generator 121 generates password authentication data H for the i-th server.
- I D (U) and I D (S) represent the ID of the user and the i-th server, respectively.
- p '(i) is the value calculated by inserting "i" in place of X in the nth degree polynomial p' (x).
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- a hash function HASH is randomly generated by a hash function generator 113.
- secret value generator 114 also randomly generates secret value S.
- the user enters the password he remembers (for example, "Poo 93").
- the password authentication data generator 1 15 generates password authentication data H.
- ID (U) and ID (S) are Indicates the user and server ID.
- the password authentication data H must be securely notified by the user by passing it directly to the server, sending it by mail, or notifying it by telephone.
- a hash function HASH is randomly generated by a hash function generator 113.
- secret value generator 114 also randomly generates secret value S.
- the user enters a password that he remembers (for example, "Poo 93").
- the password authentication data generator 1 15 generates password authentication data H.
- I D (U) and I D (S) represent the user and server I D, respectively.
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- a pseudorandom number function PRNG is randomly generated by a pseudorandom number generator 116.
- the secret value generator 117 also randomly generates the secret value S.
- the user enters a password that he remembers (for example, "Pooh 93").
- the password authentication data generator 118 generates the password authentication data H.
- H h PRNG (sllp .
- a pseudo-random number function PRNG is randomly generated by a pseudo-random number generator 116.
- secret value generator 117 also randomly generates secret value S.
- the user enters a password that he remembers (for example, "Pooh 93").
- the password authentication data generator 118 In response to the input of the pseudo-random function PRNG, the secret value S, and the user's password, the password authentication data generator 118 generates the password authentication data H.
- ID (U) and ID (S) represent user and server IDs, respectively.
- the password authentication data H must be securely notified by the user by passing it directly to the server, sending it by mail, or notifying it by telephone.
- the terminal device 1 operates as follows irrespective of whether the above-described polynomial is used (part 1) or the case where the polynomial is used (part 2).
- the mask calculator 34 calculates from the P input from the combiner 32 and the random number generated by the random number generator 33 by Y gK 1 ⁇ h— p (1) mo.
- the communication processing unit 35 transmits to the server 2 and receives Y 2 from the server 2.
- the authentication result judgment unit 37 receives MK as input, calculates by Vi-HASH (00 II Y! II Y 2 II MK), transmits this to the server 2 by the communication processing unit 35, and receives from the server 2 the V 2 and HASH (0 1 II Y x II Y 2 II MK) Compare.
- HASH is a directional hash function
- MAS Message Au thenticati on Code
- authentication result determination unit 37 V 2 and HASH (01 II Y! II Y 2 II MK) do not match gar
- authentication result determination unit 37 informs the error generator 38 does not match I do.
- the error generator 38 generates an error and suspends the processing.
- the authentication result of the determination unit in the 37 V 2 and HASH (0 1
- Yi II Y 2 II MK) If match Gar authenticated as the server 2 legitimate device set Chillon key generator 39, SK HASH (1 1 II II Y 2 II MK) Generate an application key SK.
- the terminal device 1 operates as follows irrespective of whether the above-mentioned polynomial and the hash function are used (part 1), or whether the polynomial and the hash function are used (part 2).
- the stored polynomial and hash function P ′ ( ⁇ ′ (X), HASH) are read from the memory 12 provided in the terminal device 1 of the user.
- the mask calculator 34 calculates P from the combiner 32 and the random number generated by the random number generator 33 by using -gK 1 '! ⁇ mo dp.
- p '(1) is the value calculated by inserting "1" in place of x in p' (x).
- the communication processing unit 35 transmits to the server 2 and receives Y 2 from the server 2.
- the mass key generator 36 receives the ⁇ output from the combiner 32 and the Y 2 received from the random number generator 33 as inputs, and outputs MK and MK (Y 2 ⁇ h—P R1 mod dp Calculate and output.
- p '(i) is the value calculated by inserting "i" in place of X in p' (X) for the i-th server.
- the communication processing unit 35 transmits to the server 2 and receives Y 2 from the server 2.
- the authentication result determining unit 37 receives MK as input, calculates by HASH (00 II Yi II Y 2 II MK), transmits this to the server 2 by the communication processing unit 35, and receives V from the server 2. Compare 2 with HASH (01 II ⁇ II ⁇ 2 II MK).
- HASH is a one-way hash function, and MAC (Message Autheticati on Code) may be used instead of HASH.
- authentication result determination unit 37 V 2 and HASH (01 II Y x II Y 2 II MK) do not match gar
- authentication result determination unit 37 informs the error generator 38 does not match I do.
- the error generator 38 generates an error and suspends the processing.
- Terminal device 1 operates as follows regardless of whether the above-described hash function is used (part 1) or the case where the hash function is used (part 2).
- Mask calculator 34 The random number R i and color which is generated in the P and the random number generator 33 that is input from the coupler 32 is calculated by Yi g ⁇ h one p mo dp.
- the communication processing unit 35 transmits the ⁇ to the server 2, receives the Upsilon 2 from the server 2.
- the master key generator 36 receives the K output from the combiner 32 and the Y 2 received from the random number generator 3 3 as inputs, and calculates MK by ⁇ -( ⁇ 2 ⁇ h— p ) R1 mod dp. Calculate and output.
- the authentication result determination unit 37 receives MK as input, calculates by V-HASH (0 II Y x II ⁇ 2 II MK), and transmits this V to the server 2 by the communication processing unit 35. Compare V 2 and HASH received from the server 2 (0 1 II Y! II Y 2 II MK).
- HASH is a one-way hash function, and MAC (Message Authentication Code) may be used instead of HASH.
- Terminal device 1 operates as follows irrespective of whether the pseudo-random number generator described above is used (part 1) or the pseudo-random number generator is used (part 2).
- Part 1 When using a polynomial (Part 1), When using a polynomial and a hash function (Part 1), When using a hash function (Part 1), When using a pseudo-random function (Part 1)
- Server 2 uses the above-mentioned polynomial (Part 1), uses a polynomial and a hash function (Part 1), uses a hash function (Part 1), uses a pseudorandom number generator (Part 1) Regardless of 1), it operates as follows.
- the mask calculator 43 Reads the user ID and password authentication data H stored in the memory 41 provided in the server 2.
- the communication processing unit 44 transmits the calculated Y 2 to the terminal device 1, and outputs the received Y 2 from the terminal device 1 to the master key generator 45.
- Mask key generator 45 of MK as input from R 2 to a communication processing unit 44 from H and a random number generator 42 which is read out from the memory 41, MK (Yi - H ) calculated by R2 mo d P Output MK.
- HASH is a one-way hash function, and MAC (Message Authentication Code) may be used instead of HASH.
- Server 2 uses the above-mentioned polynomial (Part 2), uses a polynomial and a hash function (Part 2), uses a hash function (Part 2), uses a pseudo-random number generator (Part 2) Regardless of 2), it operates as follows.
- the communication processing unit 44 transmits the Y 2 obtained by calculating in the terminal apparatus 1, and outputs the received from the terminal 1 to the master key generator 45.
- HASH is a one-way hash function
- MAC Message Au thenticati on Code
- HASH (00 II Y! II Y 2 II MK) does not match in the authentication result judgment unit 46
- the authentication result judgment unit 46 notifies the error generator 47 that they do not match. .
- the error generator 47 generates an error and interrupts the processing.
- HASH (00 11 Y 1 II ⁇ 2 II MK) matches in the authentication result determination unit 46
- FIG. 9 is a block diagram illustrating a configuration of a user terminal device update process.
- the update value generator 14 A value H 'and an updated polynomial P' for user storage are generated, H 'is passed to the server, and the updated polynomial P' is stored in memory 12.
- the updating process here uses the above-mentioned polynomial (Part 1), uses the polynomial (Part 2), uses the polynomial and hash function (Part 1), and uses the polynomial and hash function. When used. (Part 2) It is possible to apply.
- a polynomial is randomly generated by the polynomial generator 13.
- j3 is chosen at random from (Z / q Z) *.
- the stored polynomial ⁇ ′ ⁇ ′ ( ⁇ ) is read from the memory 12 provided in the user terminal device 1.
- the update value generator 14 When the polynomial t ′ (x) and the polynomial P ′ (x) are input, the update value generator 14 generates an updated polynomial P ′ for user storage and a value for server update.
- the value H 'for updating the server is —They need to be notified securely by handing them over to the server, sending them by mail, or notifying them by telephone.
- a polynomial is randomly generated by the polynomial generator 13.
- a first-order polynomial (t '(X) ⁇ ! Xmo dq) with X as a variable
- an n-order polynomial (t , to generate a (x) ⁇ 8 i ⁇ x + j8 2 ⁇ x 2 + ⁇ ⁇ ⁇ + j8 n ⁇ x n mo dq).
- j3 is chosen at random from (Z / q Z) *.
- (X) i3 xmodq.
- the update value generator 14 When the polynomial t ′ (x) and the polynomial P ′ (X) are input, the update value generator 14 generates an updated polynomial P ′ for storing the user and a value H ′ for updating the server.
- t '(1) is the value calculated by inserting the server ID (for example, "1") in place of x in t' (x).
- the value H 'for updating the server must be securely notified by the user, such as by passing it directly to the server, sending it by mail, or notifying it by telephone.
- a polynomial is randomly generated by the polynomial generator 13.
- a first-order polynomial ⁇ 1 -xmo dN
- x as a variable
- n-th polynomial (t' (x) i3! ⁇ x + jS 2 ⁇ x 2 +- ⁇ ⁇ + j8 n ⁇ x n mod n ).
- 3 is chosen at random from ( ⁇ / qZ) *.
- Polynomial !; '(X) and polynomial p' (X) are input
- the update value generator 14 generates an updated polynomial P 'for user storage and a value H' for server update.
- the update value generator 14 For example, if the number of registered servers is n, the update value generator 14 generates a server update value H 'for the i-th server.
- t '(i) is the value calculated by inserting "i" in place of x in the n-th order polynomial t' (x).
- the value H 'for updating the server must be securely notified by the user, such as by passing it directly to the server, sending it by mail, or notifying it by telephone.
- a polynomial is randomly generated by the polynomial generator 13.
- a first-order polynomial i ⁇ xmod dN
- X as a variable
- the polynomial and the hash function P ′ (p, (X), HASH) stored from the memory 12 provided in the user terminal device 1 are read.
- the update value generator 14 When the polynomial t ′ (X) and the polynomials p and (X) are input, the update value generator 14 generates an updated polynomial P ′ for storing the user and a value H ′ for updating the server.
- the update value generator 14 generates a server update value H 'for the i-th server.
- t '(i) is the value calculated by inserting "i" in place of x in the n-th order polynomial t' (x).
- the value H 'for updating the server must be securely notified by the user by directly passing it to the server, by mail, or by telephone.
- Part 1 When using a polynomial (Part 1), When using a polynomial and a hash function (Part 1)
- Server 2 operates as follows regardless of whether the above-mentioned polynomial is used (part 1) or polynomial and hash function (part 1).
- the user ID and the password authentication data H stored in the memory 41 provided in the server 2 are read.
- the server update value H 'sent from the user's terminal device and the password authentication data H read from the memory 41 are input, the updated value is entered.
- the generator 21 generates updated password authentication data H for storing in the server.
- the memory 41 inside the server stores and stores the updated password authentication data H.
- the update value generator 21 When the value H 'for server update sent from the user's terminal device and the password authentication data H read from the memory 41 are input, the update value generator 21 generates updated password authentication data H for server storage. .
- the memory 41 inside the server stores and stores the updated password authentication data H.
- the update value generator 21 When the server update value H 'sent from the user's terminal device and the password authentication data H read from the memory 41 are input, the update value generator 21 generates the updated password authentication data H for server storage. .
- the memory 41 inside the server stores and stores the updated password authentication data H.
- FIG. 11 is a block diagram showing the configuration of a user terminal updating process.
- the update process is performed when the secret value S 'by the secret value generator 15, the new password PW' of the user, and the P 'stored from the memory 12 provided in the user terminal device 1 are input, and the password authentication data is updated.
- the device 16 generates password authentication data H 'for updating the server and updated P' for storing the user, H 'is passed to the server 2, and the updated P' is stored in the memory. Save to 12.
- the updating process uses the above-mentioned hash function (Part 1), uses the hash function (Part 2), uses the pseudo-random number generator (Part 1), generates the pseudo-random number. It can be applied to cases where a container is used (Part 2). The same applies when using a polynomial (Part 1), when using a polynomial (Part 2), when using a polynomial and a hash function (Part 1), and when using a polynomial and a hash function (Part 2). As described above, the application can be applied by using the same operation as the initialization processing, and thus the detailed description is omitted here. Terminal device update process>
- the secret value generator 15 randomly generates a secret value S '.
- the password authentication data updater 16 updates the updated P' for saving the user and the password authentication for updating the server.
- Part 2 When a hash function is used (Part 2)
- the secret value generator 15 randomly generates a secret value S '.
- P ′ (S, HASH) stored in the memory 12 provided in the user terminal device 1 is read.
- the password authentication data updater 16 updates the updated P 'for user storage and the password authentication for server update.
- ID (U) and ID (S) represent the ID of the user and the server, respectively.
- Part 1 When using a hash function (Part 1), When using a hash function (Part 2), When using a pseudo-random number generator (Part 1), When using a pseudo-random number generator (Part 2) )
- server 2 operates as follows regardless of whether it uses the above-mentioned hash function (parts 1 and 2) or the pseudorandom number generator (parts 1 and 2).
- the password authentication data update unit 22 transmits the password authentication data for server storage.
- H is updated to H ′ sent from the user terminal 1.
- a pair (PubK, PriK) of a public key (PubK) and a secret key (PriK) exists.
- the public key is not secret and can be obtained by anyone.
- En c PubK (m) for message m using a public key.
- the ciphertext is based on the public key Cannot decrypt.
- p and Q the same length.
- RSA gains security from the difficulty of factoring large numbers N.
- cryptographic systems have security parameters that describe their level of security.
- k is used as the security parameter of the hash function HASH (provided that lZ2 k is small enough to be ignored), and 1 is used as the security parameter of the RSA public key method.
- modulo N of A has length 1.
- ⁇ 0, 1 ⁇ * indicates a set of finite binary strings
- ⁇ 0, 1 ⁇ k indicates a set of binary strings of length k.
- the hash function HASH is a secure one-way function that outputs ⁇ 0, 1 ⁇ k from the input of ⁇ 0, 1 ⁇ *
- the FDH (Full-Doma in Hash) function is ⁇ 0, 1 ⁇ Is a safe one-way function that outputs Z N * ⁇ ⁇ 1 ⁇ from the input of *.
- the random number generated by the random number generator randomly generates T (TGZ N *).
- II means to concatenate values.
- FIG. 1 is a block diagram showing a configuration of an initialization process of a user terminal device.
- the data decompressor 11 When a user inputs a password, the data decompressor 11 generates password authentication data H for server registration and a value P 'for user storage, and the password authentication data H is received by the server. Passed and the value ⁇ '- is stored in memory 12.
- the data decompressor 11 can be composed of a polynomial, an FDH function, an FDH function, and the like.
- ⁇ ⁇ + ⁇ 2 ⁇ ⁇ 2 + ⁇ ⁇ + ⁇ ⁇ ⁇ x n mod d)
- ⁇ is chosen at random from ⁇ ⁇ *
- the password authentication data generator 124 generates the password authentication data H.
- p, (1) is' (x) in the server's ID in place of x (e.g., "1") is a value calculated taking the.
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- ⁇ '(X) is P' (x) ⁇ xmodN, where the user enters a password that he or she remembers (for example, "Poo 93").
- the password authentication data generator 124 When the polynomial, the FDH function, and the user password are input, the password authentication data generator 124 generates the password authentication data H.
- the password authentication data generator 124 generates password authentication data H for the i-th server.
- I D (U) and I D (S) represent the I D of the user and the i-th server, respectively.
- p '(i) is the value calculated by inserting "i" in place of X in the nth degree polynomial p' (x).
- the password authentication data H must be securely notified by the user by directly passing it to the server, sending it by mail, or notifying it by telephone.
- the FDH function FDH is randomly generated by the 011 function generator 125.
- the secret value generator 126 randomly generates a secret value S.
- S is long enough to prevent traversal attacks (for example, S is 80 bits or more).
- the user enters a password that he remembers (eg, "Pooh93").
- the password authentication data generator 127 generates the password authentication data H.
- I D (U) and I D (S) represent the user and server I D, respectively. It is necessary for the user to pass the passcode authentication data H safely, such as by passing it directly to the server, sending it by mail, or notifying it by telephone.
- the server performs initialization when it wants to send the RSA public key to the user.
- the server generates a public / private key pair according to the RSA public key method, and sends the public key to the user.
- the initialization can be realized by secure communication or insecure communication.
- the user determines whether the received public key is correct. This user decision provides the user with a way to determine whether the server has generated the selected public key in an appropriate manner.
- the RSA key generator 23 generates a pair of a public key (N, e) and a secret key (N, d).
- the RSA public key (N, e) must be securely notified by the server, such as by handing it directly to the user, sending it by mail, or notifying it by telephone.
- the memory 41 inside the server stores and stores the RSA private key (N, d). -
- a random number (RiG ⁇ 0, 1 ⁇ k ) is randomly generated by the random number generator 17 in the user terminal device 1 and transmitted to the server.
- a pair of a public key (N, e) and a secret key (N, d) is generated by an RSA key generator 24 in the server 2.
- the random number generator 25 randomly generates a random number R 2 (R 2 e ⁇ 0, 1 ⁇ k ).
- RS A signature text generator 26 as input and received from the terminal apparatus 1 RS A secret key generated from the key generator 24 (N, d) the random number R 2 generated from a random number generator 25 and, ⁇ mj ⁇ generates a signature ⁇ s 1 ⁇ j ⁇ n of 1 ⁇ j ⁇ n , where n is an integer such that n ⁇ 1 og e (PW- (e-1) / e), where , PW stands for password.)
- the signature ⁇ S j ⁇ 1 ⁇ j ⁇ n is calculated by ⁇ S jm mod d ⁇ , ⁇ j ⁇ n .
- (m 1 ⁇ j ⁇ n is obtained by dividing the block of length 1 into n blocks from the output of HASH (n II N II e II ID (U) II ID (S) II Rx II R 2 ) It is a thing.
- ID (U) and ID (S) represent the user and server IDs, respectively.
- the server 2 transmits the public key (N, e) and the signature (R 2 , ⁇ s 1 ⁇ j ⁇ n) obtained to the terminal device 1.
- the memory 41 provided inside the server 2 stores and stores the secret key (N, d) generated from the RSA key generator 24.
- the verification result judging unit 18 in the user terminal 1 receives from the server 2 that the random number generator 17 has generated it ((N, e), (R 2 , ⁇ s, ⁇ 1 ⁇ j ⁇ the n)) as input, the signature sentence (R 2, verifies the ⁇ sj ⁇ 1 ⁇ j ⁇ n).
- ⁇ mj S jemo dN ⁇ This calculates the ⁇ nij ⁇ 1 ⁇ j ⁇ n by 1 ⁇ j ⁇ n ⁇ nij ⁇ 1 ⁇ j ⁇ n and HASH (n II N II e II ID (U) II ID (S )
- the stored polynomial and the FDH function P ′ ( ⁇ ′ (x), FDH) are read from the memory 12 provided in the terminal device 1 of the user.
- p ′ (X) is a first-order polynomial
- the calculation is performed using p.
- ⁇ , (1) is the value calculated by inserting “1” in place of X in ⁇ '(X).
- p (X) p '(x) + Pooh 93mo dN.
- p '(i) is the value calculated by inserting "i" in place of x in p' (x) for the i-th server.
- the communication processing unit 5.5 sends Z to the server 2 and receives V 2 from the server 2.
- the authentication result determination unit 56 calculates the HASH (0 1 II T II ID (U) II ID (S)) using the T output from the random number generator 53 as an input, and calculates the VASH received from the server 2. Compare with 2 .
- MAC may be used instead of HASH. If the authentication result determination unit 56 V 2 and HASH (01 II T II ID ( U) II ID (S)) do not match gar, authentication result determination section 56, to the error one generator 57, that no match Notify. In response, the error generator 57 generates an error and interrupts the processing.
- the stored polynomial and FDH function P ′ ( ⁇ ′ (X), FDH) are read from the memory 12 provided in the terminal device 1 of the user.
- p (x)-'(x) + FDH (Po oh 93 II ID (U) il ID (S)) is calculated by modN.
- p, (1) is the value calculated by inserting “1” in place of x in p, (x).
- p '(i) is the value calculated by inserting "i" in place of x in p' (x) for the i-th server.
- the communication processing unit 55 transmits ⁇ ⁇ to the server 2 and receives V 2 from the server 2.
- the authentication result determining unit 56 receives the T output from the random number generator 53 as an input, calculates HASH (0 1 II T II ID (U) II ID (S)), and receives the HASH (0) from the server 2. compared with the V 2.
- MAC may be used instead of HASH. If the authentication in the results determination section 56 V 2 and HASH (0 1 II T II ID (U) II ID (S)) do not match gar, authentication result determination section 56, to the error one generator 57 does not match Notify that. In response, the error generator 57 generates an error and suspends the processing.
- V 2 and HASH in the authentication result of the determination unit 56 are examples of the authentication result of the determination unit 56.
- the verifier generating unit 58 calculates a verifier using Vi-HASH (00 II T II ID (U) II ID (S)) and sends it to the server 2.
- the communication processing unit 55 transmits Z to the server 2 and receives V 2 from the server 2.
- the authentication result determination unit 56 calculates HASH (01 II T II ID (U) II ID (S)) using T output from the random number generator 53 as an input, and calculates V 2 Compare with Here, MAC may be used instead of HASH. If the authentication result determination unit 56 V 2 and HASH (0 1 II T II ID (U) II ID (S)) do not match gar, authentication result determination section 56, to the error generator 57, that no match Notify. In response, the error generator 57 generates an error and interrupts the processing.
- Server 2 When using a polynomial and FDH function (Part 1), When using a polynomial and FDH function (Part 2) Server 2 operates as follows regardless of whether the above-mentioned polynomial and FDH function are used (Part 1), or whether the polynomial and FDH function are used (Part 2).
- the stored authentication data H of the user ID and the password is read from the memory 41 provided in the superuser 2.
- the communication processing unit 64 transmits the V 2 resulting et the calculated to the terminal apparatus 1, and outputs a V i received from the terminal apparatus 1 to the authentication result of the determination section 65.
- the authentication result determination unit 65 calculates the HASH (00 II T II ID (U) II ID (S)) by using the T output from the mass key generator 62 as an input, and calculates the terminal device 1 Compare with received from.
- MAC may be used instead of HASH.
- a session key SK is generated using I II T II ID (U) II ID (S)).
- the stored user ID and password authentication data ⁇ ⁇ is read from the memory 41 provided in the server 2.
- the communication processing unit 64 transmits the V 2 obtained by calculation to the terminal apparatus 1, and outputs the received from the terminal apparatus 1 to the authentication result of the determination section 65.
- the authentication result determination unit 65 calculates the HASH (00 II T II ID (U) II ID (S)) using the T output from the master key generator 62 as an input and receives it from the terminal device 1. Compare with.
- MAC may be used instead of HASH.
- a session key SK is generated using I II T II ID (U) II ID (S)).
- FIGS. 9 and 19 are block diagrams showing the configuration of the updating process of the terminal device of the user.
- the updating process here can be applied when using the above-mentioned polynomial and FDH function (Part 1), when using the polynomial and FDH function (Part 2), and when using the master key. is there.
- this updating process can prevent a rep 1 ay attack on the server.
- the update value generator 14 generates a server update value H 'for the i-th server.
- t '(i) is the value calculated by inserting "i" in place of x in the n-th order polynomial t (x).
- the value H 'for updating the server must be securely notified by the user by directly passing it to the server, by mail, or by telephone.
- a random number T (TeZ N *) is randomly generated by a random number generator 53.
- the update value generator 20 When the random number T and the polynomial p ′ (X) are input, the update value generator 20 generates an updated polynomial P ′ for storing the user.
- Server 2 operates as follows regardless of whether the above-mentioned polynomial and FDH function are used (Part 1) or the case where polynomial and FDH function are used (Part 2).
- the update value generator 21 outputs the updated password authentication data H for server storage.
- the memory 41 inside the server stores and stores the updated pass-word authentication data H.
- the master key generator 62 generates a master key T.
- the stored user ID and password authentication data H are read from the memory 41 provided in the server 2.
- Master key T and password authentication data read from memory 41
- the update value generator 27 When the data H is input, the update value generator 27 generates an updated password authentication data H for storing the server.
- the memory 41 inside the server stores and stores the updated password authentication data H.
- FIG. 11 is a block diagram showing the configuration of a user terminal updating process.
- the update process is performed when the secret value S 'by the secret value generator 15, the user's new password PW', and the P 'stored from the memory 12 provided in the user's terminal device 1 are input.
- the data updater 16 generates password authentication data H 'for updating the super and updated P' for storing the user, H 'is passed to the server 2, and the updated P' is Save to memory 12.
- the updating process here can be applied when the above-mentioned FDH function is used.
- this updating process can prevent a rep1ay attack on the server.
- this updating process can prevent a rep1ay attack on the server.
- the same operation as the initialization process can be applied. Therefore, detailed description is omitted here.
- the secret value generator 15 randomly generates a secret value S '.
- P ′ (S, FDH) stored in the memory 12 provided in the user terminal device 1 is read.
- FDH function FDH and secret value S ' the pass-pad authentication data updater 16 updates the updated P' for storing the user and the password for updating the server.
- ID (U) and ID (S) represent user and server IDs, respectively.
- the password authentication data update unit 22 transmits the password authentication data H for server storage. Update to H 'sent from user terminal 1.
- the user's password is safe in terms of information theory even if the person who intends to exploit it has another person's terminal device. Also, even if you gain information stored by breaking into a server, your password is safe in terms of information theory. Also, when using a hash function, a pseudo-random number generator, and an FDH function, the user's password is computationally safe for anyone who intends to exploit it.
- FIG. 21 is a block diagram illustrating a configuration of the remote distributed storage device 5 when the distributed data is not stored in the terminal.
- the user processes the data DATA to be distributed and stored by his / her own terminal device 21, and divides the data into data S'1,..., S'n to be stored in n servers.
- the divided data S ′ i is transmitted to the server ID by the communication device 52 that can use the secure communication path created by the user terminal device 21 using the key SK i shared with the server authentication device together with the DID which is the data ID.
- Sent to i and saved By the same method, it is possible to divide the saved data list information and save it on the server.
- the user's terminal device authentication data update mode
- the user's terminal device is operated at appropriate intervals (at intervals shorter than the interval at which stored information is obtained by offline exhaustive search, for example, every time authentication is performed or once every few days) Then, generate information UP ', UH1,..., UHn for updating P' and H recorded in each server, and update them.
- both the data stored in the server and the authentication data can be configured to be resistant to leakage and damage.
- the resistance to leakage and breakage can be expressed by four sets of parameters (n, DS, LSI, LS2).
- DS, LS I, and LS 2 are all sets of combinations of entities (where leakage and corruption occur).
- DS represents resistance to data corruption
- LSI and LS 2 represent resistance to leakage.
- DS describes a combination of entities that can be broken. Even if the stored data including the local backup is completely unavailable due to a disaster or other reasons, a damaged combination that allows the user to restore his / her own data is described. In the LSI, a combination of entities that may omit recorded information is described.
- L S2 a combination of entities within a range where some countermeasures can be taken even if recorded information is leaked is described. Even if the stored data is leaked, use a combination of leaks that has countermeasures that make it difficult for an attacker to recover the user's data.
- LS 1 could not contain server ⁇ S ⁇ and user property ⁇ U ⁇ respectively.
- an authentication method that is strong against leakage it is possible to include the server ⁇ S ⁇ and the user's property ⁇ U ⁇ in LS 1 respectively.
- the secret sharing device 512 converts the stored data DATA into (k, n) shared data SI, S 2,..., Sn according to the input parameters n, k.
- the adjuster 511 generates the input X of the data decompressor 513 from the DID, which is the data ID, and passes it to the data decompressor 513.
- the data decompressor 513 outputs the corresponding information H and passes it to the encryptor 514.
- H is long enough for offline exhaustive search.
- the data decompressor 513 outputs a short H, a different X is passed to the plural data decompressor 513, and the obtained plural Hs are used.
- the encryptor 514 encrypts n ⁇ k + 1 or more shared data using H as a key. Also, a tampering detection code may be added to each of S l,..., Sn 1 k + 1. .., S ′ n are output from the data divider 51 together with DID, ID 1, ID 2, ID 2,..., IDn.
- (k, n) distributed data is data in which the original data is divided into n pieces, and the original data can be restored from any of the k pieces, but cannot be restored from less than k pieces. It is data having properties. (K, n) Other than distributed data It is possible to use distributed data with any access structure.
- the secret sharing device can use not only a secure distribution method using information such as polynomials and matrices but also a computationally secure distribution method that can reduce the size of stored data by using encryption. .
- ⁇ CS ⁇ means the record information of the client and the server and its partial information
- ⁇ S n ⁇ means the record information of the n servers and its partial information.
- ⁇ C, S ⁇ means “all information and its partial information recorded in the client or all information and its partial information recorded in the server”. Leakage from UCS k-1 ⁇ can be dealt with by updating authentication information. If the authentication information is updated while the attacker seeks stored information from ⁇ UC S k-1 ⁇ , the attacker will not be able to seek user data.
- the loss of the user's property ⁇ U ⁇ (the loss of ⁇ ') can be solved by making a local copy of the data recorded in ⁇ U ⁇ every time the data is updated.
- all or part of the data and stored information recorded in the user's property, or a part of them, are divided into (k ', n) shared data by a secret sharing device and stored on each server. If this is done, even if the user forgets the stored information, the stored information (and the recorded information of the property) can be restored by offline analysis. At that time, 1) the off-line analysis can be omitted when all are distributed, and 2) the off-line analysis calculation amount can be reduced according to the amount when distributing the — part. This feature allows the user to recover data when authorizing a third party to decrypt the data. The ease of adjustment (similar to the ease of data recovery when an attacker gets ⁇ CS k ' ⁇ ) can be adjusted.
- FIG. 23 is a block diagram showing a configuration of the remote distributed storage device 5 when data is not stored in the terminal.
- the data decompressor 54 transmits at least k of the distributed data S ′ 1,..., S ′ n corresponding to the input DID from the server ID 1, ID 2,. receive.
- the data restorer 54 processes at least k of S'1,..., S'n to restore DATA. In the same way, it is possible to restore the list of saved data.
- the user's terminal device 21 authentication data update mode
- the user's terminal device 21 authentication data update mode
- P ′ and information UP ′, UH1,..., UHn for updating H recorded in each server are generated and updated.
- the coordinator 541 outputs the input n servers ID, ID1, ID2,..., IDn and DID.
- the adjuster 541 also generates an input X of the data decompressor 542 from D ID and passes it to the data decompressor 542.
- the data decompressor 542 outputs the corresponding information H and passes it to the encryptor 543.
- the encryptor 543 decrypts the encrypted distributed data S'1, S'2,..., S'n and secrets S1, S2,..., Sn. Pass to decentralized reconstructor.
- the secret sharing restoration unit 544 restores the data from the given sharing data. It should be noted that tampering detection may be performed and only k distributed data that has not been tampered may be passed.
- FIG. 25 is a block diagram showing the configuration of the remote distributed storage device 5 when the distributed data is also stored in the terminal. Here, only the configuration different from the configuration shown in FIG. 21 will be described.
- the user processes the data DATA to be distributed and stored in his / her own terminal device 21 and divides the data into data DL to be kept at hand and data RS'1,..., RS'n to be stored in n servers.
- the DL is stored in the recording device 55 at hand, and the divided data RS'l is created by the user's terminal device 21 using the key SKi shared with the server's authentication device together with the data ID DID. It is sent to the server ID i via a secure communication channel and stored. In the same way, it is possible to divide the saved data list information and save it on the server.
- the amount of communication with the server can be reduced. It is possible to use a method in which the amount of communication changes according to the combination of damaged servers and a method that does not change, but in the case of a method that changes, the storage area of the entire n servers can be reduced. It should be noted that the resistance to leakage and breakage can be maintained at the same level as when "'--evening is not at hand.
- the configuration of the data divider 51 shown in FIG. 25 will be described with reference to FIG. Here, only the parts that are different from the configuration shown in Fig.
- the encryptor 5 15 receives the random number R from the random number generator 5 16
- the coordinator 5 1 1 passes the input parameters n and k to the secret sharing device 5 12.
- the secret sharing device 512 sets R (k, n) according to the input parameters n and k.
- the coordinator 5 1 1 generates the input x of the data decompressor 513 from the DID, which is the data ID, and decompresses the data.
- the data decompressor 5 13 outputs the corresponding information H, and passes this as a key to the encryptor 514.
- H is an offline Different if the data decompressor 513 outputs a short H: X is passed to multiple data decompressors 513, and the obtained multiple Hs are used. Use.
- the encryptor 514 encrypts n ⁇ k + 1 or more shared data using H as a key.
- each of RS1,..., And RSn-k + 1 may have a tampering detection code.
- the output of the encryptor is RS 'l, ..., RS' n.
- the secret sharing device 512 can use a sharing method that is secure in terms of the amount of information using polynomials or matrices, or a sharing method that is secure in terms of the amount of computation using cryptography. Since the size reduction effect of using a computationally secure distribution method is small, it is better to use an information amount secure distribution method.
- FIG. 27 is a block diagram showing the configuration of the remote distributed storage device 5 when the distributed data is stored in the terminal. Here, only portions different from the configuration shown in FIG. 23 will be described.
- the data decompressor 54 transmits at least k of the distributed data RS'1,..., RS'n corresponding to the input DID to the server ID1, ID2,. Receive from I Dn.
- the data decompressor 54 processes at least k of RS'1,..., RS'n to decompress DATA. In the same way, it is possible to restore the list of saved data.
- FIG. 27 the configuration of the data decompressor 54 shown in FIG. 27 will be described with reference to FIG. Here, only portions different from the configuration shown in FIG. 24 will be described.
- the coordinator 541 generates an input X of the data decompressor 542 from the DID and passes it to the data decompressor 542.
- Data decompressor 542 outputs the corresponding information H and passes it to decoder 543.
- the decoder 543 decodes the encrypted data among the obtained shared data RS'1, RS'2,..., RS'n, and converts RS1,.
- Pass to The secret sharing recovery unit 544 decrypts the DATA from the passed shared data. Restore by. Alteration detection may be performed, and k distributed data items that have not been altered may be passed.
- a program for realizing the functions of the respective processing units shown in the drawings is recorded on a recording medium readable by a computer, and the program recorded on the recording medium is read into a computer system and executed to execute an authentication process. A key exchange process may be performed.
- the “computer system” includes an OS and hardware such as peripheral devices.
- “computer system J.” also includes a WWW system provided with a homepage providing environment (or display environment), and “computer-readable recording medium” includes a flexible disk, a magneto-optical disk, a ROM, This refers to portable media such as CD-ROM, and storage devices such as hard disks built into computer systems.
- a “computer-readable recording medium” is a volatile memory (RAM) in a computer system that functions as a server or a client when a program is transmitted through a network such as the Internet or a communication line such as a telephone line.
- RAM volatile memory
- the above program may be transmitted from a computer system storing the program in a storage device or the like to another computer system via a transmission medium or by a transmission wave in the transmission medium.
- the “transmission medium” for transmitting a program refers to a medium having a function of transmitting information, such as a network (communication network) such as the Internet or a communication line (communication line) such as a telephone line.
- the above program may be for realizing a part of the functions described above.
- a so-called difference file may be used.
- the present invention even if the information stored in the device is leaked from the terminal device side or the server side, the password cannot be found by the offline analysis, thereby preventing unauthorized use of the server. The effect is obtained. Further, since there is no need to use a tamper-resistant module for preventing information stored in the device from being stolen, the device configuration can be simplified. Also, since there is no need to perform complicated key management processing as in a public key cryptosystem, the calculation processing can be improved and the processing content can be simplified. It can also be extended to a plurality of supers. Furthermore, by dynamically changing the user ID between each server and the terminal device while synchronizing the same, it is possible to prevent an eavesdropper from using the user ID to associate the user's privacy information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2005514934A JP4774492B2 (ja) | 2003-10-28 | 2004-10-07 | 認証システム及び遠隔分散保存システム |
| US10/577,111 US7895436B2 (en) | 2003-10-28 | 2004-10-07 | Authentication system and remotely-distributed storage system |
| CN2004800307512A CN1871810B (zh) | 2003-10-28 | 2004-10-07 | 认证系统和远隔分散保存系统 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2003-367527 | 2003-10-28 | ||
| JP2003367527 | 2003-10-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2005041474A1 true WO2005041474A1 (ja) | 2005-05-06 |
Family
ID=34510297
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2004/015184 Ceased WO2005041474A1 (ja) | 2003-10-28 | 2004-10-07 | 認証システム及び遠隔分散保存システム |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US7895436B2 (ja) |
| JP (1) | JP4774492B2 (ja) |
| KR (1) | KR100845018B1 (ja) |
| CN (1) | CN1871810B (ja) |
| WO (1) | WO2005041474A1 (ja) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2008219177A (ja) * | 2007-02-28 | 2008-09-18 | Kddi Corp | 端末装置、データ管理装置およびコンピュータプログラム |
| JP2009267451A (ja) * | 2008-04-21 | 2009-11-12 | National Institute Of Advanced Industrial & Technology | Rsaをベースとしたパスワード認証方式及びその応用 |
| JP2012186635A (ja) * | 2011-03-04 | 2012-09-27 | Toyota Motor Corp | 車両ネットワークシステム |
| US8422670B2 (en) | 2008-07-10 | 2013-04-16 | National Institute Of Advanced Industrial Science And Technology | Password authentication method |
| JP2013090199A (ja) * | 2011-10-19 | 2013-05-13 | National Institute Of Advanced Industrial & Technology | 鍵共有システム、鍵生成装置、及びプログラム |
| WO2020100929A1 (ja) * | 2018-11-15 | 2020-05-22 | 株式会社東海理化電機製作所 | 認証システム及び認証方法 |
| JP2021500760A (ja) * | 2017-10-18 | 2021-01-07 | クリプトグラフィ リサーチ, インコーポレイテッド | 外部監視攻撃からモジュラーインバージョン演算を保護すること |
Families Citing this family (48)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8363837B2 (en) * | 2005-02-28 | 2013-01-29 | HGST Netherlands B.V. | Data storage device with data transformation capability |
| JP2006334803A (ja) * | 2005-05-31 | 2006-12-14 | Konica Minolta Business Technologies Inc | 画像処理装置、および、その制御方法 |
| GB0513375D0 (en) * | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| NO324315B1 (no) * | 2005-10-03 | 2007-09-24 | Encap As | Metode og system for sikker brukerautentisering ved personlig dataterminal |
| JP4575283B2 (ja) * | 2005-11-15 | 2010-11-04 | 株式会社東芝 | 暗号装置、復号装置、プログラム及び方法 |
| KR101391151B1 (ko) * | 2007-06-01 | 2014-05-02 | 삼성전자주식회사 | 세션 키를 이용한 인증 방법 및 이를 위한 장치 |
| GB2467462A (en) * | 2007-09-14 | 2010-08-04 | Millennium Force Co Ltd | Data security apparatus |
| KR100926631B1 (ko) * | 2007-09-14 | 2009-11-11 | (주)밀레니엄 포스 | 데이터 보안장치 |
| CN101425897B (zh) * | 2007-10-29 | 2011-05-18 | 上海交通大学 | 一种用户认证方法、系统、服务器和用户节点 |
| KR101016277B1 (ko) * | 2007-12-20 | 2011-02-22 | 건국대학교 산학협력단 | 보안성이 강화된 sⅰp 등록 및 sⅰp 세션 설정 방법 및장치 |
| JP2009175197A (ja) * | 2008-01-21 | 2009-08-06 | Toshiba Corp | 暗号装置、復号装置、鍵生成装置及びプログラム |
| US8959199B2 (en) * | 2008-03-18 | 2015-02-17 | Reduxio Systems Ltd. | Network storage system for a download intensive environment |
| US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| EP2285042A1 (fr) * | 2009-07-07 | 2011-02-16 | Gemalto SA | Module logiciel de sécurisation utilisant le chiffrement du haché d'un mot de passe concaténé avec une graine |
| US8433918B2 (en) * | 2009-10-14 | 2013-04-30 | Texas Instruments Incorporated | Methods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks |
| US8671265B2 (en) | 2010-03-05 | 2014-03-11 | Solidfire, Inc. | Distributed data storage system providing de-duplication of data using block identifiers |
| US9015489B2 (en) * | 2010-04-07 | 2015-04-21 | Microsoft Technology Licensing, Llc | Securing passwords against dictionary attacks |
| KR101630462B1 (ko) * | 2010-04-14 | 2016-06-14 | 주식회사 넥슨코리아 | 키보드 보안 장치 및 방법 |
| US8874868B2 (en) * | 2010-05-19 | 2014-10-28 | Cleversafe, Inc. | Memory utilization balancing in a dispersed storage network |
| KR20130050696A (ko) * | 2011-11-08 | 2013-05-16 | 삼성전자주식회사 | 메모리 시스템 |
| US9838269B2 (en) | 2011-12-27 | 2017-12-05 | Netapp, Inc. | Proportional quality of service based on client usage and system metrics |
| US9054992B2 (en) | 2011-12-27 | 2015-06-09 | Solidfire, Inc. | Quality of service policy sets |
| US9521130B2 (en) * | 2012-09-25 | 2016-12-13 | Virnetx, Inc. | User authenticated encrypted communication link |
| US20140331061A1 (en) * | 2013-05-02 | 2014-11-06 | Solidfire, Inc | Drive level encryption key management in a distributed storage system |
| US20150033016A1 (en) * | 2013-07-23 | 2015-01-29 | Battelle Memorial Institute | Systems and methods for securing real-time messages |
| US9405783B2 (en) * | 2013-10-02 | 2016-08-02 | Netapp, Inc. | Extent hashing technique for distributed storage architecture |
| US9448924B2 (en) | 2014-01-08 | 2016-09-20 | Netapp, Inc. | Flash optimized, log-structured layer of a file system |
| US9529546B2 (en) | 2014-01-08 | 2016-12-27 | Netapp, Inc. | Global in-line extent-based deduplication |
| US9256549B2 (en) | 2014-01-17 | 2016-02-09 | Netapp, Inc. | Set-associative hash table organization for efficient storage and retrieval of data in a storage system |
| US9268653B2 (en) | 2014-01-17 | 2016-02-23 | Netapp, Inc. | Extent metadata update logging and checkpointing |
| US20150244795A1 (en) | 2014-02-21 | 2015-08-27 | Solidfire, Inc. | Data syncing in a distributed system |
| US9798728B2 (en) | 2014-07-24 | 2017-10-24 | Netapp, Inc. | System performing data deduplication using a dense tree data structure |
| US10133511B2 (en) | 2014-09-12 | 2018-11-20 | Netapp, Inc | Optimized segment cleaning technique |
| US9671960B2 (en) | 2014-09-12 | 2017-06-06 | Netapp, Inc. | Rate matching technique for balancing segment cleaning and I/O workload |
| US9836229B2 (en) | 2014-11-18 | 2017-12-05 | Netapp, Inc. | N-way merge technique for updating volume metadata in a storage I/O stack |
| US9720601B2 (en) | 2015-02-11 | 2017-08-01 | Netapp, Inc. | Load balancing technique for a storage array |
| US9762460B2 (en) | 2015-03-24 | 2017-09-12 | Netapp, Inc. | Providing continuous context for operational information of a storage system |
| US9710317B2 (en) | 2015-03-30 | 2017-07-18 | Netapp, Inc. | Methods to identify, handle and recover from suspect SSDS in a clustered flash array |
| US9740566B2 (en) | 2015-07-31 | 2017-08-22 | Netapp, Inc. | Snapshot creation workflow |
| US9876783B2 (en) | 2015-12-22 | 2018-01-23 | International Business Machines Corporation | Distributed password verification |
| US10929022B2 (en) | 2016-04-25 | 2021-02-23 | Netapp. Inc. | Space savings reporting for storage system supporting snapshot and clones |
| US10642763B2 (en) | 2016-09-20 | 2020-05-05 | Netapp, Inc. | Quality of service policy sets |
| WO2019107314A1 (ja) * | 2017-11-30 | 2019-06-06 | 株式会社アドテクニカ | 情報処理装置、情報処理方法、情報処理システム及びプログラム |
| US12255889B2 (en) * | 2018-08-16 | 2025-03-18 | Cyberark Software Ltd. | Detecting and preventing unauthorized credential change |
| DE102019001731A1 (de) * | 2019-03-12 | 2020-09-17 | data-team Datendienste GmbH | Autorisierungsverfahren mittels Einmalpasswörtern |
| CN110768792B (zh) * | 2019-09-30 | 2023-09-05 | 奇安信科技集团股份有限公司 | 主密钥生成方法、装置及敏感安全参数的加解密方法 |
| JP7273742B2 (ja) * | 2020-02-07 | 2023-05-15 | 株式会社東芝 | 暗号化装置、復号装置、暗号方法、復号方法、暗号化プログラム及び復号プログラム |
| JP7768872B2 (ja) * | 2022-12-06 | 2025-11-12 | 株式会社東芝 | 暗号化装置、復号装置、鍵生成装置、暗号方法、復号方法、鍵生成方法、暗号化プログラム、復号プログラム及び鍵生成プログラム |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH04245287A (ja) * | 1991-01-31 | 1992-09-01 | Matsushita Electric Ind Co Ltd | 識別情報に基づく秘密鍵生成方法 |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6061799A (en) * | 1997-10-31 | 2000-05-09 | International Business Machines Corp. | Removable media for password based authentication in a distributed system |
| CN1338841A (zh) * | 2000-08-11 | 2002-03-06 | 海南格方网络安全有限公司 | 计算机安全认证智能密钥 |
| JP2002208925A (ja) | 2001-01-10 | 2002-07-26 | Ntt Advanced Technology Corp | 可変認証情報を用いる資格認証方法 |
| US6912653B2 (en) | 2001-01-23 | 2005-06-28 | Erika Monika Gohl | Authenticating communications |
| CN1150726C (zh) * | 2002-10-01 | 2004-05-19 | 华中科技大学 | 一种安全网络传输方法及其系统 |
| US7607009B2 (en) * | 2003-02-10 | 2009-10-20 | International Business Machines Corporation | Method for distributing and authenticating public keys using time ordered exchanges |
-
2004
- 2004-10-07 WO PCT/JP2004/015184 patent/WO2005041474A1/ja not_active Ceased
- 2004-10-07 JP JP2005514934A patent/JP4774492B2/ja not_active Expired - Fee Related
- 2004-10-07 KR KR1020067008005A patent/KR100845018B1/ko not_active Expired - Fee Related
- 2004-10-07 US US10/577,111 patent/US7895436B2/en not_active Expired - Fee Related
- 2004-10-07 CN CN2004800307512A patent/CN1871810B/zh not_active Expired - Fee Related
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH04245287A (ja) * | 1991-01-31 | 1992-09-01 | Matsushita Electric Ind Co Ltd | 識別情報に基づく秘密鍵生成方法 |
Non-Patent Citations (2)
| Title |
|---|
| KOBARA K. ET AL.: "Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model", IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS AND COMPUTER SCIENCES, vol. E85-A, no. 10, 1 October 2002 (2002-10-01), pages 2229 - 2237, XP002984269 * |
| SHIN S. ET AL.: "A new password-based authentification protocol", vol. 15, 29 October 2003 (2003-10-29), pages 7 - 12, XP002984270 * |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2008219177A (ja) * | 2007-02-28 | 2008-09-18 | Kddi Corp | 端末装置、データ管理装置およびコンピュータプログラム |
| JP2009267451A (ja) * | 2008-04-21 | 2009-11-12 | National Institute Of Advanced Industrial & Technology | Rsaをベースとしたパスワード認証方式及びその応用 |
| US8422670B2 (en) | 2008-07-10 | 2013-04-16 | National Institute Of Advanced Industrial Science And Technology | Password authentication method |
| JP5224481B2 (ja) * | 2008-07-10 | 2013-07-03 | 独立行政法人産業技術総合研究所 | パスワード認証方法 |
| JP2012186635A (ja) * | 2011-03-04 | 2012-09-27 | Toyota Motor Corp | 車両ネットワークシステム |
| US9413732B2 (en) | 2011-03-04 | 2016-08-09 | Toyota Jidosha Kabushiki Kaisha | Vehicle network system |
| JP2013090199A (ja) * | 2011-10-19 | 2013-05-13 | National Institute Of Advanced Industrial & Technology | 鍵共有システム、鍵生成装置、及びプログラム |
| JP2021500760A (ja) * | 2017-10-18 | 2021-01-07 | クリプトグラフィ リサーチ, インコーポレイテッド | 外部監視攻撃からモジュラーインバージョン演算を保護すること |
| JP7155173B2 (ja) | 2017-10-18 | 2022-10-18 | クリプトグラフィ リサーチ, インコーポレイテッド | 外部監視攻撃からモジュラーインバージョン演算を保護すること |
| WO2020100929A1 (ja) * | 2018-11-15 | 2020-05-22 | 株式会社東海理化電機製作所 | 認証システム及び認証方法 |
| JP2020088408A (ja) * | 2018-11-15 | 2020-06-04 | 株式会社東海理化電機製作所 | 認証システム及び認証方法 |
| JP7057944B2 (ja) | 2018-11-15 | 2022-04-21 | 株式会社東海理化電機製作所 | 認証システム及び認証方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20070061572A1 (en) | 2007-03-15 |
| US7895436B2 (en) | 2011-02-22 |
| JPWO2005041474A1 (ja) | 2007-04-26 |
| KR20060073647A (ko) | 2006-06-28 |
| KR100845018B1 (ko) | 2008-07-10 |
| JP4774492B2 (ja) | 2011-09-14 |
| CN1871810A (zh) | 2006-11-29 |
| CN1871810B (zh) | 2010-09-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4774492B2 (ja) | 認証システム及び遠隔分散保存システム | |
| US12242621B2 (en) | Protecting data from brute force attack | |
| US20060195402A1 (en) | Secure data transmission using undiscoverable or black data | |
| US8396218B2 (en) | Cryptographic module distribution system, apparatus, and program | |
| US20110145576A1 (en) | Secure method of data transmission and encryption and decryption system allowing such transmission | |
| US20120087495A1 (en) | Method for generating an encryption/decryption key | |
| WO2017147503A1 (en) | Techniques for confidential delivery of random data over a network | |
| JP2001513227A (ja) | ネットワーク環境における秘密最新乱数の管理および使用 | |
| CN110868291A (zh) | 一种数据加密传输方法、装置、系统及存储介质 | |
| EP2945347B1 (en) | Methods and devices for securing keys when key-management processes are subverted by an adversary | |
| JP5047638B2 (ja) | 暗号文復号権委譲システム | |
| CN113824713B (zh) | 一种密钥生成方法、系统及存储介质 | |
| JP6041864B2 (ja) | データの暗号化のための方法、コンピュータ・プログラム、および装置 | |
| CN111211897A (zh) | 一种基于随机预言模型的时间控制加密安全增强方法 | |
| JP5324813B2 (ja) | 鍵生成装置、証明書生成装置、サービス提供システム、鍵生成方法、証明書生成方法、サービス提供方法およびプログラム | |
| JP2005252384A (ja) | 暗号化データ保管サーバシステム、暗号化データ保管方法及び再暗号化方法 | |
| Shakiba | Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks | |
| KR20140071775A (ko) | 암호키 관리 시스템 및 방법 | |
| JP4758110B2 (ja) | 通信システム、暗号化装置、鍵生成装置、鍵生成方法、復元装置、通信方法、暗号化方法、暗号復元方法 | |
| Chang et al. | Authentication schemes with no verification table | |
| WO2005018138A1 (en) | Generation and validation of diffie-hellman digital signatures | |
| US20250379734A1 (en) | Enhanced RSA Algorithm Using Transform Function | |
| Kara et al. | An encrypted and signed plaintext symmetric cryptosystem | |
| EP1394981A2 (en) | Public key cryptograph communication method | |
| JP3638501B2 (ja) | 匿名通信路 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200480030751.2 Country of ref document: CN |
|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2005514934 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007061572 Country of ref document: US Ref document number: 1020067008005 Country of ref document: KR Ref document number: 10577111 Country of ref document: US |
|
| WWP | Wipo information: published in national office |
Ref document number: 1020067008005 Country of ref document: KR |
|
| 122 | Ep: pct application non-entry in european phase | ||
| WWP | Wipo information: published in national office |
Ref document number: 10577111 Country of ref document: US |