Claims
- 1. A cryptographic communication method for communication of information between entities, in which an entity-specific secret key is generated at a center and sent to each entity from the center, one entity uses a common key determined from its own entity-specific secret key sent from the center and a publicly known public key of the other entity to encrypt a plaintext into a ciphertext and transmits the ciphertext to the an other entity, and the other entity uses the same common key as said common key, determined from its own entity-specific secret key sent from the center and a publicly known public key of the one entity, to decrypt said ciphertext sent from the one entity back into a plaintext,characterized in that each of said entity-specific secret keys includes at least one type of secret key selected from a plurality of types of secret keys in which each of a plurality of numbers serves as a modulus, said secret keys generated using said respective entities' public key and entity-specific random number, the one entity uses a plurality of its own said plural types of secret keys and the public key of the other of said entities to generate said common key, and the other of said entities uses a plurality of its own said plural types of secret keys and the public key of the one entity to generate said common key, and wherein said public key of each entity is determined by utilizing a hash function with specific information of each entity.
- 2. The cryptographic communication method according to claim 1, wherein, in the generation of said common key, said random number is eliminated by addition over integer ring.
- 3. The cryptographic communication method according to claim 1, wherein said random number is a multidimensional random number vector.
- 4. The cryptographic communication method according to claim 2, wherein said random number is a multidimensional random number vector.
- 5. The cryptographic communication method according to claim 1, wherein computational formulas for generating two types of said secret key at said center are as follows:{right arrow over (si)}=(A{right arrow over (vi)}+{right arrow over (γi)})mod P {right arrow over (ti)}=(B{right arrow over (vi)}−{right arrow over (γi)})mod Q whereVector si: one secret key of the entity i Vector ti: the other secret key of the entity i P and Q: publicly known prime numbers A and B: symmetric matrices composed of random numbers known only to the center Vector γi: personal random number vector composed of random numbers.
- 6. The cryptographic communication method according to claim 2, wherein computational formulas for generating two types of said secret key at said center are as follows:{right arrow over (si)}=(A{right arrow over (vi)}+{right arrow over (γi)})mod P {right arrow over (ti)}=(B{right arrow over (vi)}−{right arrow over (γi)})mod Q whereVector si: one secret key of the entity i Vector ti: the other secret key of the entity i P and Q: publicly known prime numbers A and B: symmetric matrices composed of random numbers known only to the center Vector γi: personal random number vector composed of random numbers.
- 7. The cryptographic communication method according to claim 3, wherein computational formulas for generating two types of said secret key at said center are as follows:{right arrow over (si)}=(A{right arrow over (vi)}+{right arrow over (γi)})mod P {right arrow over (ti)}=(B{right arrow over (vi)}−{right arrow over (γi)})mod Q whereVector si: one secret key of the entity i Vector ti: the other secret key of the entity i P and Q: publicly known prime numbers A and B: symmetric matrices composed of random numbers known only to the center Vector γi: personal random number vector composed of random numbers.
- 8. The cryptographic communication method according to claim 4, wherein computational formulas for generating two types of said secret key at said center are as follows:{right arrow over (si)}=(A{right arrow over (vi)}+{right arrow over (γi)})mod P {right arrow over (ti)}=(B{right arrow over (vi)}−{right arrow over (γi)})mod Q whereVector si: one secret key of the entity i Vector ti: the other secret key of the entity i P and Q: publicly known prime numbers A and B: symmetric matrices composed of random numbers known only to the center Vector γi: personal random number vector composed of random numbers.
- 9. The cryptographic communication method according to claim 5, wherein computational formulas for generating said common key for the entities are as follows:Aij′=t{right arrow over (si)}{right arrow over (vj)} mod P Bij′=t{right arrow over (ti)}{right arrow over (vj)} mod Q Kij=Aij′+Bij′whereKij: common key generated by one entity i for another entity j Vector Vj: public key of entity j Aij′ and Bij′: intermediate values for generating the common key Kij.
- 10. The cryptographic communication method according to claim 6, wherein computational formulas for generating said common key for the entities are as follows:Aij′=t{right arrow over (si)}{right arrow over (vj)} mod P Bij′=t{right arrow over (ti)}{right arrow over (vj)} mod Q Kij=Aij′+Bij′whereKij: common key generated by one entity i for another entity j Vector vj: public key of entity j Aij′ and Bij′: intermediate values for generating the common key Kij.
- 11. The cryptographic communication method according to claim 7, wherein computational formulas for generating said common key for the entities are as follows:Aij′=t{right arrow over (si)}{right arrow over (vj)} mod P Bij′=t{right arrow over (ti)}{right arrow over (vj)} mod Q Kij=Aij′+Bij′whereKij: common key generated by one entity i for another entity j Vector vj: public key of entity j Aij′ and Bij′: intermediate values for generating the common key Kij.
- 12. The cryptographic communication method according to claim 8, wherein computational formulas for generating said common key for the entities are as follows:Aij′=t{right arrow over (si)}{right arrow over (vj)} mod P Bij′=t{right arrow over (ti)}{right arrow over (vj)} mod Q Kij=Aij′+Bij′whereKij: common key generated by one entity i for another entity j Vector vj: public key of entity j Aij′ and Bij′: intermediate values for generating the common key Kij.
- 13. The cryptographic communication method according to claim 5, wherein said P and Q are k bits to satisfy following formulas:P≡δ(mod R) Q≡ε(mod R) whereR: prime number of d bits δ and ε: number of e bits k>d>e.
- 14. The cryptographic communication method according claim 6, wherein said P and Q are k bits to satisfy following formulas:P≡δ(mod R) Q≡ε(mod R) whereR: prime number of d bits δ and ε: number of e bits k>d>e.
- 15. The cryptographic communication method according claim 7, wherein said P and Q are k bits to satisfy the following formulas:P≡δ(mod R) Q≡ε(mod R) whereR: prime number of d bits δ and ε: number of e bits k>d>e.
- 16. The cryptographic communication method according to claim 8, wherein said P and Q are k bits to satisfy following formulas:P≡δ(mod R) Q≡ε(mod R) whereR: prime number of d bits δ and ε: number of e bits k>d>e.
- 17. The cryptographic communication method according to claim 13, wherein computational formulas for generating said common key for the entities are as follows: Aij′= tsi→υj→mod PBij′= tti→υj→mod QKij′=Aij′+Bij′Kij″=Kij′mod RKij=⌊Kij″2e+c⌋whereKij: common key generated by one entity i for another entity j Kij′: an intermediate value for generating the common key Kij Kij″: an intermediate value for generating the common key Kij, i.e., remainder of dividing Kij′ by R.
- 18. The cryptographic communication method according to claim 14, wherein computational formulas for generating said common key for the entities are as follows: Aij′= tsi→υj→mod PBij′= tti→υj→mod QKij′=Aij′+Bij′Kij″=Kij′mod RKij=⌊Kij″2e+c⌋whereKij: common key generated by one entity i for another entity j Kij′: an intermediate value for generating the common key Kij Kij″: an intermediate value for generating the common key Kij, i.e., remainder of dividing Kij′ by R.
- 19. The cryptographic communication method according to claim 15, wherein computational formulas for generating said common key for the entities are as follows: Aij′= tsi→υj→mod PBij′= tti→υj→mod QKij′=Aij′+Bij′Kij″=Kij′mod RKij=⌊Kij″2e+c⌋whereKij: common key generated by one entity i for another entity j Kij′: an intermediate value for generating the common key Kij Kij″: an intermediate value for generating the common key Kij, i.e., remainder of dividing Kij′ by R.
- 20. The cryptographic communication method according to claim 16, wherein computational formulas for generating said common key for the entities are as follows: Aij′= tsi→υj→mod PBij′= tti→υj→mod QKij′=Aij′+Bij′Kij″=Kij′mod RKij=⌊Kij″2e+c⌋whereKij: common key generated by one entity i for another entity j Kij′: an intermediate value for generating the common key Kij Kij″: an intermediate value for generating the common key Kij, i.e., remainder of dividing Kij′ by R.
- 21. An encryption method, in which secret keys are sent to a plurality of entities, said secret keys being specific to the entities to which they are sent, and said entities use their own said entity-specific keys to encrypt a plaintext into a ciphertext,characterized in that said entity-specific secret key includes includes at least one type of secret key selected from a plurality of types of secret keys in which each of a plurality of numbers serves as a modulus, said secret keys generated using a one-entity-specific public key and one-entity-specific secret random number, and the one entity encrypts a plaintext into a ciphertext using a common key generated using a plurality of its own said types of secret keys and a public key of an other entity, said other entity being an intended recipient of the ciphertext, and wherein said public key of each entity is determined by utilizing a hash function with specific information of each entity.
- 22. A cryptographic communication system including a plurality of entities, in which encryption into a ciphertext of a plaintext to be transmitted, and decryption of the transmitted ciphertext back into a plaintext, are performed mutually between the plurality of entities,said cryptographic communication system comprising: a center for using an entity-specific public key and an entity-specific secret random number to generate includes at least one type of secret key selected from a plurality of types of secret keys for each entity, with each of a plurality of numbers serving as a modulus in relation to the plural types of secret keys, and sending the plural types of secret keys to each entity; and a plurality of entities, one of which entities uses a plurality of its own said types of secret keys sent from said center and a public key specific to other entity, said other entity being a ciphertext recipient, to generate a common key for performing said encryption, and said other entity uses a plurality of its own said types of secret keys sent from said center and a public key specific to the one entity to generate the same common key for performing said decryption, and wherein said public key of each entity is determined by utilizing a hash function with specific information of each entity.
- 23. A cryptographic communication method for communication of information between entities, in which an entity-specific secret key is generated at a center and sent to each entity from the center, one entity uses a common key determined from its own entity-specific secret key sent from the center and a publicly known public key of an other entity to encrypt a plaintext into a ciphertext and transmits the ciphertext to the an other entity, and the other entity uses the same common key as said common key, determined from its own entity-specific secret key sent from the center and a publicly known public key of the one entity, to decrypt said ciphertext back into the plaintext,characterized in that said entity-specific secret key of the one entity includes a plurality of secret keys in which each of a plurality of numbers serves as a modulus, said plurality of secret keys being generated using a plurality of public keys of the one entity and a plurality of entity-specific random numbers of the one entity, said entity-specific secret key of the other entity includes a plurality of secret keys in which each of a plurality of numbers serves as a modulus, said plurality of secret keys of the other entity being generated using a plurality of public keys of the other entity and a plurality of entity-specific random numbers of the other entity, the one entity uses a plurality of its secret keys and a plurality of public keys of the other entity to generate said common key, and the other entity uses a plurality of its own secret keys and a plurality of public keys of the one entity to generate said common key, and wherein said public key of each entity is determined by utilizing a hash function with specific information of each entity.
- 24. The cryptographic communication method according to claim 23, wherein, in the generation of said common key, said plurality of random numbers are eliminated by addition over integer ring.
- 25. The cryptographic communication method according to claim 23, wherein said plurality of random numbers are a plurality of multidimensional random number vectors.
- 26. The cryptographic communication method according to claim 24, wherein said plurality of random numbers are a plurality of multideminsional random number vectors.
- 27. The cryptographic communication method according to claim 23, wherein computational formula for generating four of said secret keys at said center is as follows (A), and computational formula for generating said common key at each entity is as follows (B): s11,i→=(A1υ1,i→+γ1,i→)mod P1s22,i→=(A2υ2,i→+γ2,i→)mod P2s21,i→=(A3υ1,i→-γ2,i→)mod P3s12,i→=(A3tυ2,i→-γ1,i→)mod P3}(A)whereVector S11,i: first secret key of entity i Vector S22,i: second secret key of entity i Vector S21,i: third secret key of entity i Vector S12,i: fourth secret key of entity i Vector v1,i: first public key of entity i Vector v2,i: second public key of entity i P1, P2, and P3: publicly known prime numbers A1 and A2: secret symmetric matrices composed of random numbers known only to the center A3: secret matrix composed of random numbers known only to the center Vector γ1,i: first personal random number vector composed of random numbers Vector γ2,i: second personal random number vector composed of random numbers Kij=A11,ij′+A22,ij′+A21,ij′+A12,ij′ (B)&AutoLeftMatch;(A11,ij′= ts11,i→υ1,j→mod P1A22,ij′= ts22,i→υ2,j→mod P2A21,ij′= ts21,i→υ2,j→mod P3A12,ij′= ts12,i→υ1,j→mod P3)whereKij: common key generated by one entity i for another entity j Vector v1,j: first public key of entity j Vector v2,j: second public key of entity j A11,ij′, A22,ij′, A21,ij′, and A12,ij′: intermediate values for generating the common key Kij.
- 28. The cryptographic communication method according to claim 24, wherein computational formula for generating four of said secret keys at said center is as follows (A), and computational formula for generating said common key at each entity is as follows (B): s11,i→=(A1υ1,i→+γ1,i→)mod P1s22,i→=(A2υ2,i→+γ2,i→)mod P2s21,i→=(A3υ1,i→-γ2,i→)mod P3s12,i→=(A3tυ2,i→-γ1,i→)mod P3}(A)whereVector S11,i: first secret key of entity i Vector S22,i: second secret key of entity i Vector S21,i: third secret key of entity i Vector S12,i: fourth secret key of entity i Vector v1,i: first public key of entity i Vector v2,i: second public key of entity i P1, P2, and P3: publicly known prime numbers A1 and A2: symmetric matrices composed of random numbers known only to the center A3: matrix composed of random numbers known only to the center Vector γ1,i: first personal random number vector composed of random numbers Vector γ2,i: second personal random number vector composed of random numbers Kij=A11,ij′+A22,ij′+A21,ij′+A12,ij′ (B) &AutoLeftMatch;(A11,ij′= ts11,i→υ1,j→mod P1A22,ij′= ts22,i→υ2,j→mod P2A21,ij′= ts21,i→υ2,j→mod P3A12,ij′= ts12,i→υ1,j→mod P3)whereKij: common key generated by one entity i for another entity j Vector v1,j: first public key of entity j Vector v2,j: second public key of entity j A11,ij′, A22,ij′, A21,ij′, and A12,ij′: intermediate values for generating the common key Kij.
- 29. The cryptographic communication method according to claim 25, wherein computational formula for generating four of said secret keys at said center is as follows (A), and computational formula for generating said common key at each entity is as follows (B): s11,i→=(A1υ1,i→+γ1,i→)mod P1s22,i→=(A2υ2,i→+γ2,i→)mod P2s21,i→=(A3υ1,i→-γ2,i→)mod P3s12,i→=(A3tυ2,i→-γ1,i→)mod P3}(A)whereVector S11,i: first secret key of entity i Vector S22,i: second secret key of entity i Vector S21,i: third secret key of entity i Vector S12,i: fourth secret key of entity i Vector v1,i: first public key of entity i Vector v2,i: second public key of entity i P1, P2, and P3: publicly known prime numbers A1 and A2: symmetric matrices composed of random numbers known only to the center A3: matrix composed of random numbers known only to the center Vector γ1,i: first personal random number vector composed of random numbers Vector γ2,i: second personal random number vector composed of random numbers Kij=A11,ij′+A22,ij′+A21,ij′+A12,ij′ (B) &AutoLeftMatch;(A11,ij′= ts11,i→υ1,j→mod P1A22,ij′= ts22,i→υ2,j→mod P2A21,ij′= ts21,i→υ2,j→mod P3A12,ij′= ts12,i→υ1,j→mod P3)whereKij: common key generated by one entity i for another entity j Vector v1,j: first public key of entity j Vector v2,j: second public key of entity j A11,ij′, A22,ij′, A21,ij′, and A12,ij′: intermediate values for generating the common key Kij.
- 30. The cryptographic communication method according to claim 26, wherein computational formula for generating four of said secret keys at said center is as follows (A), and computational formula for generating said common key at each entity is as follows (B): s11,i→=(A1υ1,i→+γ1,i→)mod P1s22,i→=(A2υ2,i→+γ2,i→)mod P2s21,i→=(A3υ1,i→-γ2,i→)mod P3s12,i→=(A3tυ2,i→-γ1,i→)mod P3}(A)whereVector S11,i: first secret key of entity i Vector S22,i: second secret key of entity i Vector S21,i: third secret key of entity i Vector S12,i: fourth secret key of entity i Vector v1,i: first public key of entity i Vector v2,i: second public key of entity i P1, P2, and P3: publicly known prime numbers A1 and A2: symmetric matrices composed of random numbers known only to the center A3: matrix composed of random numbers known only to the center Vector γ1,i: first personal random number vector composed of random numbers Vector γ2,i: second personal random number vector composed of random numbers Kij=A11,ij′+A22,ij′+A21,ij′+A12,ij′ (B) &AutoLeftMatch;(A11,ij′= ts11,i→υ1,j→mod P1A22,ij′= ts22,i→υ2,j→mod P2A21,ij′= ts21,i→υ2,j→mod P3A12,ij′= ts12,i→υ1,j→mod P3)whereKij: common key generated by one entity i for another entity j Vector v1,j: first public key of entity j Vector v2,j: second public key of entity j A11,ij′, A22,ij′, A21,ij′, and A12,ij′: intermediate values for generating the common key Kij.
- 31. The cryptographic communication method according to claim 23, wherein there are d number of public keys for each entity, computational formula for generating d2 number of said secret keys at said center is as follows (C), and computational formula for generating said common key at each entity is as follows (D): syz,i→=(Ayzυz,i→+γyz,i→)mod Pyz(C)whereAyz (y and z=1, 2, . . . , d): a sub-matrix generated by partitioning an n×n symmetric matrix A in both the row and column directions at n1, n2, . . . , nd (where n=n1+n2+ . . . +nd) Vector Syz,i: d2 number of secret keys of entity i Vector vz,i: a vector generated by dividing a public key column vector vi of entity i in the column direction into sizes of n1, n2, . . . , nd Vector γyz,i: a vector generated by dividing a personal random number column vector γz,i of entity i in the column direction into sizes of n1, n2, . . . , nd Pyz: publicly known prime number Kij=∑y=1d∑z=1dAyz,ij′Ayz,ij′= tsyz,i→υy,j→mod Pyz(D)whereKij: common key generated by one entity i for another entity j Vector vy,j: a vector generated by dividing a public key row vector vj of entity j in the row direction into sizes of n1, n2, . . . , nd Ayz,ij′: d2 number of intermediate values for generating the common key Kij.
- 32. The cryptographic communication method according to claim 24, wherein there are d number of public keys for each entity, computational formula for generating d2 number of said secret keys at said center is as follows (C), and computational formula for generating said common key at each entity is as follows (D): syz,i→=(Ayzυz,i→+γyz,i→)mod Pyz(C)whereAyz (y and z=1, 2, . . . , d): a sub-matrix generated by partitioning an n×n symmetric matrix A in both the row and column directions at n1, n2, . . . nd (where n=n1+n2+ . . . +nd) Vector Syz,i: d2 number of secret keys of entity i Vector vz,i: a vector generated by dividing a public key column vector vi of entity i in the column direction into sizes of n1, n2, . . . , nd Vector γyz,i: a vector generated by dividing a personal random number column vector γz,i of entity i in the column direction into sizes of n1, n2, . . . , nd Pyz: publicly known prime number Kij=∑y=1d∑z=1dAyz,ij′Ayz,ij′= tsyz,i→υy,j→mod Pyz(D)whereKij: common key generated by one entity i for another entity j Vector vy,j: a vector generated by dividing a public key row vector vj of entity j in the row direction into sizes of n1, n2, . . . , nd Ayz,ij′: d2 number of intermediate values for generating the common key Kij.
- 33. The cryptographic communication method according to claim 25, wherein there are d number of public keys for each entity, computational formula for generating d2 number of said secret keys at said center is as follows (C), and computational formula for generating said common key at each entity is as follows (D): syz,i→=(Ayzυz,i→+γyz,i→)mod Pyz(C)whereAyz (y and z=1, 2, . . . , d): a sub-matrix generated by partitioning an n×n symmetric matrix A in both the row and column directions at n1, n2 . . . nd (where n=n1+n2+ . . . +nd) Vector Syz,i: d2 number of secret keys of entity i Vector vz,i: a vector generated by dividing a public key column vector vi of entity i in the column direction into sizes of n1, n2, . . . , nd Vector γyz,i: a vector generated by dividing a personal random number column vector γz,i of entity i in the column direction into sizes of n1, n2, . . . , nd Pyz: publicly known prime number Kij=∑y=1d∑z=1dAyz,ij′Ayz,ij′= tsyz,i→υy,j→mod Pyz(D)whereKij: common key generated by one entity i for another entity j Vector vy,j: a vector generated by dividing a public key row vector vj of entity j in the row direction into sizes of n1, n2, . . . , nd Ayz,ij′: d2 number of intermediate values for generating the common key Kij.
- 34. The cryptographic communication method according to claim 26, wherein there are d number of public keys for each entity, computational formula for generating d2 number of said secret keys at said center is as follows (C), and computational formula for generating said common key at each entity is as follows (D): syz,i→=(Ayzυz,i→+γyz,i→)mod Pyz(C)whereAyz (y and z=1, 2, . . . , d): a sub-matrix generated by partitioning an n×n symmetric matrix A in both the row and column directions at n1, n2 . . . nd (where n=n1+n2+ . . . +nd) Vector Syz,i: d2 number of secret keys of entity i Vector vz,i: a vector generated by dividing a public key column vector vi of entity i in the column direction into sizes of n1, n2, . . . , nd Vector γyz,i: a vector generated by dividing a personal random number column vector γz,i of entity i in the column direction into sizes of n1, n2, . . . , nd Pyz: publicly known prime number Kij=∑y=1d∑z=1dAyz,ij′Ayz,ij′= tsyz,i→υy,j→mod Pyz(D)whereKij: common key generated by one entity i for another entity j Vector vy,j: a vector generated by dividing a public key row vector vj of entity j in the row direction into sizes of n1, n2, . . . , nd Ayz,ij′: d2 number of intermediate values for generating the common key Kij.
- 35. The cryptographic communication method according to claim 31, wherein a plurality of combinations are used, each combination including d number of public keys for each entity, and d2 number of secret keys for each entity.
- 36. The cryptographic communication method according to claim 32, wherein a plurality of combinations are used, each combination including d number of public keys for each entity, and d2 number of secret keys for each entity.
- 37. The cryptographic communication method according to claim 33, wherein a plurality of combinations are used, each combination including d number of public keys for each entity, and d2 number of secret keys for each entity.
- 38. The cryptographic communication method according to claim 34, wherein a plurality of combinations are used, each combination including d number of public keys for each entity, and d2 number of secret keys for each entity.
- 39. The cryptographic communication method according to claim 23 wherein the computational formula for generating the 2d number of said secret keys at said center is as follows (E), and computational formula for generating said common key at each entity is as follows (F): sr,i→=(Arυr+1,i→+γr,i→)mod Prtr,i→=(Brυr,i→-γr+1,i→)mod Pr}(E)whereVector sr,i: d number of secret keys of entity i Vector tr,i: d number of secret keys of entity i Ar: a secret matrix composed of random numbers known only to the center Br=tAr Vector vr,i: d number of public keys of entity i Vector γr,i: d number of personal random number vectors composed of random numbers Pr: publicly known prime number Kij=∑r=1d(Ar,ij′+Br,ij′)(Ar,ij′= tsr,i→υr,j→mod PrBr,ij′= ttr,i→υr+1,j→mod Pr)(F)whereKij: common key generated by one entity i for another entity j Vector vr,j: d number of public keys of entity j Ar,ij′ and Br,ij′: an intermediate value for generating the common key Kij.
- 40. The cryptographic communication method according to claim 24, wherein the computational formula for generating the 2d number of said secret keys at said center is as follows (E), and computational formula for generating said common key at each entity is as follows (F): sr,i→=(Arυr+1,i→+γr,i→)mod Prtr,i→=(Brυr,i→-γr+1,i→)mod Pr}(E)whereVector sr,i: d number of secret keys of entity i Vector tr,i: d number of secret keys of entity i Ar: a secret matrix composed of random numbers known only to the center Br=tAr Vector vr,i: d number of public keys of entity i Vector γr,i: d number of personal random number vectors composed of random numbers Pr: publicly known prime number Kij=∑r=1d(Ar,ij′+Br,ij′)(Ar,ij′= tsr,i→υr,j→mod PrBr,ij′= ttr,i→υr+1,j→mod Pr)(F)whereKij: common key generated by one entity i for another entity j Vector vr,j: d number of public keys of entity j Ar,ij′ and Br,ij′: an intermediate value for generating the common key Kij.
- 41. The cryptographic communication method according to claim 25, wherein the computational formula for generating the 2d number of said secret keys at said center is as follows (E), and computational formula for generating said common key at each entity is as follows (F): sr,i→=(Arυr+1,i→+γr,i→)mod Prtr,i→=(Brυr,i→-γr+1,i→)mod Pr}(E)whereVector sr,i: d number of secret keys of entity i Vector tr,i: d number of secret keys of entity i Ar: a secret matrix composed of random numbers known only to the center Br=tAr Vector vr,i: d number of public keys of entity i Vector γr,i: d number of personal random number vectors composed of random numbers Pr: publicly known prime number Kij=∑r=1d(Ar,ij′+Br,ij′)(Ar,ij′= tsr,i→υr,j→mod PrBr,ij′= ttr,i→υr+1,j→mod Pr)(F)whereKij: common key generated by one entity i for another entity j Vector vr,j: d number of public keys of entity j Ar,ij′ and Br,ij′: an intermediate value for generating the common key Kij.
- 42. The cryptographic communication method according to claim 26, wherein the computational formula for generating the 2d number of said secret keys at said center is as follows (E), and computational formula for generating said common key at each entity is as follows (F): sr,i→=(Arυr+1,i→+γr,i→)mod Prtr,i→=(Brυr,i→-γr+1,i→)mod Pr}(E)whereVector sr,i: d number of secret keys of entity i Vector tr,i: d number of secret keys of entity i Ar: a secret matrix composed of random numbers known only to the center Br=tAr Vector vr,i: d number of public keys of entity i Vector γr,i: d number of personal random number vectors composed of random numbers Pr: publicly known prime number Kij=∑r=1d(Ar,ij′+Br,ij′)(Ar,ij′= tsr,i→υr,j→mod PrBr,ij′= ttr,i→υr+1,j→mod Pr)(F)whereKij: common key generated by one entity i for another entity j Vector vr,j: d number of public keys of entity j Ar,ij′ and Br,ij′: an intermediate value for generating the common key Kij.
- 43. An encryption method, in which secret keys are sent to a plurality of entities, said secret keys being specific to the entities to which they are sent, and said entities use their own said entities-specific keys to encrypt a plaintext into a ciphertext,wherein said entity-specific secret key of each entity includes at least one type of secret keys selected from a plurality of types of secret keys in which each of a plurality of numbers serves as a modulus, said plurality of secret keys being generated using a plurality of its own entity-specific public keys and a plurality of its own entity-specific secret random numbers, and a plaintext is encrypted by one entity into a ciphertext using a common key generated using said plurality of secret keys of the one entity and a plurality of public keys of an other entity, said one entity being a ciphertext sender and said other entity being the intended recipient of the ciphertext.
- 44. A cryptographic communication system including a plurality of entities, in which encryption into a ciphertext of a plaintext to be transmitted, and decryption of the transmitted ciphertext back into the plaintext, are performed mutually between the plurality of entities,said cryptographic communication system comprising: a center for using a plurality of public keys specific to each entity and a plurality of secret random numbers specific to each entity to generate a plurality of secret keys for each entity, in which each of a plurality of numbers serves as a modulus, and for sending the plurality of secret keys to the entities, respectively; and a plurality of entities, one of which uses its own plurality of secret keys sent from said center and a plurality of public keys specific to an other entity, said other entity being a ciphertext recipient, to generate a common key for performing said encryption, and an other of which uses its own plurality of secret keys sent from said center and a plurality of public keys specific to the one entity, said other entity being a ciphertext sender, to generate the same common key for performing said decryption.
Priority Claims (2)
| Number |
Date |
Country |
Kind |
| 10-262035 |
Sep 1998 |
JP |
|
| 10-338190 |
Nov 1998 |
JP |
|
Parent Case Info
This application relates to two applications concurrently filed herewith entitled (1) “ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION/DECRYPTION METHOD, CRYPTOGRAPHIC COMMUNICATIONS SYSTEM, AND COMPUTER USABLE MEDIUM” that claims foreign priority based on Japanese patent applications 10-262036, filed Sep. 16, 1998 and 11-105815, filed Apr. 13, 1999 (inventors: Masao Kasahara and Yasuyuki Murakami; Express Mail EL 446 156 827 US) and (2) “ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION/DECRYPTION METHOD, CRYPTOGRAPHIC COMMUNICATIONS SYSTEM, AND COMPUTER USABLE MEDIUM” that claims foreign priority based on Japanese patent applications 10-262037, filed Sep. 16, 1998 and 11-105814, filed Apr. 13, 1999 (inventors: Masao Kasahara and Yasuyuki Murakami; Express Mail EL 446 156 835 US), which applications are hereby incorporated by reference in their entirety.
US Referenced Citations (3)
| Number |
Name |
Date |
Kind |
|
5016276 |
Matumoto et al. |
May 1991 |
A |
|
5987129 |
Baba |
Nov 1999 |
A |
|
6289454 |
Eslinger et al. |
Sep 2001 |
B1 |
Non-Patent Literature Citations (3)
| Entry |
| “New Directions in Cryptography” Whitfield Diffe and Martin E. Hellman, Jun. 23-25 1975, p. 34.* |
| Rolf Blom, “Non-Public Key Distribution”, Advances in cryptology: proceedings of CRYPTO 82/ edited by David Chaum, Ronald L. Rivest, and Alan T. sherman / New York: Plenum Press, pp. 231-236. |
| Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Advances in Cryptology: proceedings of CRYPTO 84 / edited by G.R. Blakley and David Chaum, / Berlin; Tokyo: Springer-Verlag, pp. 47-53. |