1. Field of the Invention
This invention relates to a delegation system for decryption rights, enabling decryption of ciphertext, generated using a certain public key, using a secret key different from the secret key corresponding to the public key.
Priority is claimed on U.S. Provisional Patent Application No. 60/839,516, filed Aug. 22, 2006, the content of which is incorporated herein by reference.
2. Description of the Related Art
In encryption using public key encryption, only persons having a corresponding secret key have been capable of decryption of ciphertext which has been encrypted using a certain public key. Due to the usefulness of such systems, in recent years research has been conducted on delegation systems for ciphertext decryption rights (hereafter simply “delegation systems”), enabling decryption of ciphertext, encrypted using a certain public key, using a secret key which differs from the secret key corresponding to the public key. A delegation system comprises three persons, which are a delegator, a delegatee, and a ciphertext converter, or else four persons, with the addition to these of a trusted third party (hereafter “TTP”). Decryption right delegation in such a system entails generation of a re-encryption key for ciphertext conversion by the delegator or TTP, and transfer of the re-encryption key to the ciphertext converter. When plaintext possessed by the delegator is held in common with the delegatee, first the ciphertext obtained by encryption of the plaintext by the delegator using his own public key is transmitted to the ciphertext converter. The ciphertext converter, who holds the re-encryption key, converts the ciphertext received from the delegator such that decryption is possible using the secret key held by the delegatee, and the ciphertext is transmitted to the delegatee. The delegatee uses his own secret key to decrypt the received ciphertext which has been converted, to reproduce the plaintext. Such a delegation system is required to satisfy the following three conditions from a cryptographic standpoint. That is, (1) there must be no need for the delegatee to transfer his own decryption secret key to another person; (2) so long as the ciphertext converter does not perform conversion, the delegatee cannot reproduce the plaintext; and, (3) the ciphertext converter cannot independently reproduce the plaintext from the ciphertext of the delegator.
As devices to realize delegation, used by the delegator and delegatee (and hereafter respectively called the “decryption rights delegator device” and “decryption rights delegates device”), a computer, such as for example a personal computer, portable phone terminal, PDA (Personal Digital Assistant), server, or similar is employed; and as the device used by the ciphertext converter (hereafter “ciphertext conversion device”), a device comprising a server or similar called a proxy is employed. Computers which serve as decryption rights delegator devices or decryption rights delegatee devices comprise functions to execute public key encryption algorithms, and store a public key necessary for encryption and a secret key necessary for decryption. The proxy serving as the ciphertext conversion device is provided with functions to execute a conversion algorithm to convert ciphertext transmitted from the device of the delegator, and stores a re-encryption key.
Such a delegation system can for example be applied to content provision technology through storage equipment used by an unspecified number of users. Suppose that a delegator is the owner of certain content, and that content encrypted using his own public key is stored by storage equipment used by an unspecified number of users. When content is shared with a third party, the delegator chooses the third party as a delegatee, generates a re-encryption key for the delegatee, and transmits the re-encryption key to the ciphertext conversion device which is an access controller for the storage equipment. The ciphertext conversion device, upon receiving a request for content from the decryption rights delegates device of the delegatee, uses the re-encryption key to re-encrypt the ciphertext of the content, and transmits the converted ciphertext to the decryption rights delegatee device. The decryption rights delegatee device uses a delegatee secret key stored internally to decrypt the content. The ciphertext conversion device cannot independently decrypt the content; and because the content is stored in an encrypted state in the storage equipment of the ciphertext conversion device, the delegator and delegatee can securely share the content. Further, in the event of content sharing, there is no need for additional calculations by the delegator, so that efficient sharing is possible.
One public encryption system used to realize a rights delegation system is the standard Public Key Encryption (hereafter “PKE”) system, which uses a random number as a public key, and an Identity Based Encryption (hereafter “IBE”) system, as described in Reference 1 ([BF01] D. Boneh and M. Franklin, “Identity based encryption from the Weil paring”, extended abstract in Advances in Cryptology—Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 213-229, August 2001; see also http://eprint.iacr.org/2001/090/). The IBE system is a public key encryption system in which an arbitrary string, such as for example a telephone number or e-mail address, is used as a public key; because the public key and its owner are easily associated, the system has attracted attention as a means of greatly reducing the complexity of key management in standard public-key encryption. In the IBE system, a third party, called a secret key generator, is necessary for generation of a secret key. The secret key generator uses a master-secret key to generate a secret key for each user, and distributes the secret keys to the users. The secret key generator can decrypt all the ciphertext encrypted by the public keys of users, and so must be a third party who can be trusted.
In the prior art, various technologies have been proposed to realize a rights delegation system using either the PKE system or the IBE system. Specifically, delegation systems such as that shown in
With respect to delegation systems between users using only the IBE system, a method which utilizes the technology described in the above Reference 1 has been proposed. In the technology described in Reference 1, as shown in
This invention was devised in order to resolve the above two problems, and has as an object the provision of a ciphertext decryption rights delegation system enabling conversion by a ciphertext converter from PKE system ciphertext into IBE system ciphertext. A further object is to provide a ciphertext decryption rights delegation system, in a delegation system configuration in which only the IBE system is used among users, such that the master-secret key of the secret key generator cannot be reconstructed even when there is collusion between a ciphertext converter and a decryption rights delegatee.
A decryption rights delegation system of this invention, in which ciphertext decryption rights delegation is performed by a decryption rights delegator device and a decryption rights delegatee device, and comprising a ciphertext conversion device which performs conversion using a re-encryption key such that ciphertext transmitted from the decryption rights delegator device can be decrypted by the decryption rights delegatee device, is characterized in comprising a master-secret key processing unit, for generating, from the master-secret key of an identity based encryption system, secret keys and auxiliary information for the identity based encryption system, and a re-encryption key generation unit, for generating, based on the auxiliary information generated by the master-secret key processing unit, a re-encryption key for conversion of ciphertext, encrypted by the decryption rights delegator device, so that the decryption rights delegatee device can perform decryption using the identity based encryption system secret key.
Further, a decryption rights delegation system of this invention, comprising a decryption rights delegator device which performs encryption using a standard public key encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, is characterized in that the secret key generation device comprises a first storage unit for storing the master-secret key, a master-secret key processing unit for generating, based on the master-secret key stored by the first storage unit and an identity based encryption system public key selected arbitrarily by the decryption rights delegates device, auxiliary information and an identity based encryption system secret key used in decryption by the decryption rights delegatee device and corresponding to the identity based encryption public key, a secret key transmission unit for transmitting an identity based encryption system secret key generated by the master-secret key processing unit to the decryption rights delegatee device, and an auxiliary information transmission unit for transmitting auxiliary information generated by the master-secret key processing unit to the decryption rights delegator device; and is characterized in that the decryption rights delegator device comprises a second storage unit for storing the public key encryption system public key and secret key, an auxiliary information reception unit for receiving auxiliary information from the secret key generation device, a re-encryption key generation unit for generating, based on the secret key stored in the second storage unit and auxiliary information received by the auxiliary information reception unit, a re-encryption key used by the ciphertext conversion device when converting ciphertext, and a re-encryption key transmission unit for transmitting the re-encryption key generated by the re-encryption key generation unit to the ciphertext conversion device.
Further, in a decryption rights delegation system of the above-described invention, the decryption rights delegator device may comprise a public key encryption processing unit for using a public key stored by the second storage unit to encrypt plaintext and generate ciphertext, and a ciphertext transmission unit for transmitting ciphertext generated by the public key encryption processing unit to the ciphertext conversion device; in that the ciphertext conversion device comprises a re-encryption key reception unit for receiving a re-encryption key from the decryption rights delegator device, a ciphertext reception unit for receiving ciphertext from the decryption rights delegator device, a ciphertext conversion processing unit for converting ciphertext received by the ciphertext reception unit based on a re-encryption key received by the re-encryption key reception unit, and a converted ciphertext transmission unit for transmitting ciphertext converted by the ciphertext conversion processing unit to the decryption rights delegatee device; and in that the decryption rights delegatee device comprises a secret key reception unit for receiving a secret key for the identity based encryption system transmitted from the secret key generation device, a converted ciphertext reception unit for receiving converted ciphertext from the ciphertext conversion device, and an identity based encryption processing unit for decrypting ciphertext received by the converted ciphertext reception unit based on the identity based encryption system secret key received by the secret key reception unit.
Further, a secret key generation device of this invention, in a decryption rights delegation system comprising a decryption rights, delegator device which performs encryption using a standard public key encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, is characterized in comprising a first storage unit for storing the master-secret key, a master-secret key processing unit for generating identity based encryption system secret keys and auxiliary information for use in decryption by the decryption rights delegatee device, based on the master-secret key stored by the first storage unit and an identity based encryption system public key chosen arbitrarily by the decryption rights delegates device and corresponding to the identity based encryption public key, and a transmission unit for transmitting an identity based encryption system secret key generated by the master-secret key processing unit to the decryption rights delegatee device, to cause generation by the decryption rights delegator device of a re-encryption key for use by the ciphertext conversion device.
Further, a decryption rights delegator device of this invention, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using a standard public key encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, is characterized in comprising a second storage unit for storing the public key of the public key encryption system and a secret key, an auxiliary information reception unit for receiving from the secret key generation device both the master-secret key and auxiliary information generated based on an identity based encryption system public key selected arbitrarily by the decryption rights delegatee device, a re-encryption key generation unit for generating a re-encryption key based on the secret key stored in the second storage unit and on the auxiliary information received by the auxiliary information reception unit for use when the ciphertext conversion device converts ciphertext, and a re-encryption key transmission unit for transmitting the re-encryption key generated by the re-encryption key generation unit to the ciphertext conversion device.
Further, a decryption rights delegation system of this invention, comprising a decryption rights delegator device which performs encryption using an identity based encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates a secret key used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext encrypted and transmitted by the decryption rights delegator device such that the decryption rights delegatee device can decrypt the ciphertext, is characterized in that the secret key generation device comprises a first storage unit for storing the master-secret key, a master-secret key processing unit for generating, based on the master-secret key stored by the first storage unit and an identity based encryption system public key selected arbitrarily by the decryption rights delegator device, auxiliary information and an identity based encryption system secret key used in decryption by the decryption rights delegatee device, a re-encryption key generation unit for generating a re-encryption key based on the master-secret key stored by the first storage unit and on the auxiliary information, a secret key transmission unit for transmission to the decryption rights delegates device of an identity based encryption system secret key generated by the master-secret key processing unit, and a re-encryption key transmission unit for transmission to the ciphertext conversion device of the re-encryption key generated by the re-encryption key generation unit.
Further, in a decryption rights delegation system of the above-described invention, the decryption rights delegator device may comprise an identity based encryption processing unit for encrypting plaintext to generate ciphertext using an arbitrarily selected identity based encryption public key, and a ciphertext transmission unit for transmitting the ciphertext generated by the identity based encryption processing unit to the ciphertext conversion device; in that the ciphertext conversion device comprises a re-encryption key reception unit for receiving a re-encryption key from the secret key generation device, a ciphertext reception unit for receiving ciphertext from the decryption rights delegator device, a ciphertext conversion processing unit for converting ciphertext received from the ciphertext reception unit based on the re-encryption key received by the re-encryption key reception unit, and a converted ciphertext transmission unit for transmitting ciphertext converted by the ciphertext conversion processing unit to the decryption rights delegatee device; and in that the decryption rights delegatee device comprises a secret key reception unit for receiving the identity based encryption secret key from the secret key generation device, a converted ciphertext reception unit for receiving the ciphertext from the ciphertext conversion device, and an identity based encryption processing unit for decrypting ciphertext received by the converted ciphertext reception unit based on the identity based encryption secret key received by the secret key reception unit.
Further, a secret key generation device of this invention, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using an identity based encryption system, a decryption rights delegates device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, is characterized in comprising a first storage unit for storing the master-secret key, a master-secret key processing unit for generating identity based encryption system secret keys and auxiliary information for use in decryption by the decryption rights delegatee device, based on the master-secret key stored by the first storage unit and an identity based encryption system public key chosen arbitrarily by the decryption rights delegator device, a re-encryption key generation unit for generating a re-encryption key based on the master-secret key stored by the first storage unit and on the auxiliary information, a secret key transmission unit for transmitting to the decryption rights delegatee device an identity based encryption system secret key generated by the master-secret key processing unit, and a re-encryption key transmission unit for transmitting to the ciphertext conversion device a re-encryption key generated by the re-encryption key generation unit.
Further, computer-readable recording media of this invention has recorded a ciphertext decryption rights delegation program, which causes a computer, in a decryption rights delegation system in which ciphertext decryption rights delegation is performed between a decryption rights delegator device and a decryption rights delegatee device, comprising a ciphertext conversion device which uses a re-encryption key to convert ciphertext transmitted from the decryption rights delegator device so as to enable decryption by the decryption rights delegatee device, to execute a procedure of generating from a master-secret key of an identity based encryption system a secret key for the identity based encryption system and auxiliary information, and a procedure, based on the generated auxiliary information, of generating a re-encryption key to convert ciphertext encrypted by the decryption rights delegator device so as to enable the decryption rights delegatee device to perform decryption using the identity based encryption system secret key.
Further, computer-readable recording media of this invention has recorded a ciphertext decryption rights delegation program, which causes a computer, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using a standard public key encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, to execute a procedure of using the secret key generation device to store the master-secret key in a first storage unit, a procedure, based on the master-secret key stored in the first storage unit and an identity based encryption system public key selected arbitrarily by the decryption rights delegatee device, to generate auxiliary information and an identity based encryption system secret key corresponding to the identity based encryption public key and to be used when the decryption rights delegatee device performs decryption, a procedure of transmitting the generated identity based encryption system secret key to the decryption rights delegatee device, a procedure of causing execution of a procedure to transmit the generated auxiliary information to the decryption rights delegator device and of using the decryption rights delegator device to store the public key encryption system public key and secret key in a second storage unit, a procedure of receiving the auxiliary information from the secret key generation device, a procedure of generating a re-encryption key to be used when the ciphertext conversion device converts ciphertext, based on the secret key stored by the second storage unit and on the received auxiliary information, and a procedure of transmitting the generated re-encryption key to the ciphertext conversion device.
Further, computer-readable recording media of this invention has recorded a secret key generation program, which causes the computer of a secret key generation device, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using a standard public key encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, to execute a procedure of causing storage of the master-secret key in a first storage unit, a procedure, based on a master-secret key stored in the first storage unit and on an identity based encryption system public key selected arbitrarily by the decryption rights delegatee device, of generating auxiliary information and an identity based encryption secret key corresponding to the identity based encryption public key, for use when the decryption rights delegatee device performs decryption, and a procedure of transmitting the generated identity based encryption system secret key to the decryption rights delegates device, transmitting the generated auxiliary information to the decryption rights delegator device, and causing the decryption rights delegator device to generate a re-encryption key for use by the ciphertext conversion device.
Further, computer-readable recording media of this invention has recorded a decryption rights delegation program, which causes the computer of a decryption rights delegator device, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using a standard public key encryption system, a decryption rights delegates device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, to execute a procedure of causing storage of a public key of the public key encryption system and a secret key in a second storage unit, a procedure of receiving, from the secret key generation device, auxiliary information generated based on the master-secret key and on an identity based encryption system public key arbitrarily selected by the decryption rights delegatee device, a procedure of generating a re-encryption key based on the secret key stored in the second storage unit and on the received auxiliary information, for use when the ciphertext conversion device converts ciphertext, and a procedure of transmitting the generated re-encryption key to the ciphertext conversion device.
Further, computer-readable recording media of this invention has recorded a decryption rights delegation program, which causes the computer of a decryption rights delegator device, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using an identity based encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, to execute a procedure of causing storage by the secret key generation device of the master-secret key in a first storage unit, a procedure, based on the master-secret key stored in the first storage unit and on an identity based encryption system public key arbitrarily selected by the decryption rights delegator device, of generating auxiliary information and an identity based encryption system secret key to be used by the decryption rights delegates device when performing decryption, a procedure of generating a re-encryption key based on the master-secret key stored in the first storage unit and on the auxiliary information, a procedure of transmitting the generated identity based encryption system secret key to the decryption rights delegatee device, and a procedure of transmitting the generated re-encryption key to the ciphertext conversion device.
Further, computer-readable recording media of this invention has recorded a secret key generation program, which causes the computer of a secret key generation device, in a decryption rights delegation system comprising a decryption rights delegator device which performs encryption using an identity based encryption system, a decryption rights delegatee device which performs encryption using an identity based encryption system, a secret key generation device which generates secret keys used in an identity based encryption system based on a master-secret key, and a ciphertext conversion device which converts ciphertext, encrypted and transmitted by the decryption rights delegator device, so as to enable decryption of the ciphertext by the decryption rights delegatee device, to execute a procedure of causing storage of the master-secret key in a first storage unit, a procedure, based on a master-secret key stored in the first storage unit and on an identity based encryption system public key selected arbitrarily by the decryption rights delegator device, of generating auxiliary information and an identity based encryption secret key for use when the decryption rights delegatee device performs decryption, a procedure of generating a re-encryption key based on the master-secret key stored in the first storage unit and on the auxiliary information, a procedure of transmitting the generated identity based encryption system secret key to the decryption rights delegatee device, and a procedure of transmitting the generated re-encryption key to the ciphertext conversion device.
Below, embodiments of the invention are explained referring to the drawings. In the following embodiments, the IBE system proposed in Reference 2 ([BB04] D. Boneh and X. Boyen, “Efficient selective-id secure identity based encryption without random oracle”, Advances in Cryptology—EUROCRYPT '04, Lecture Notes in Computer Science, LNCS 3027, pp. 223-238, Springer-Verlag, 2004) is adopted, in a delegation system from users using a PKE system to users using an IBE system.
Below, a first embodiment of the invention is explained, referring to
The delegation system I comprises a decryption rights delegator device 10 (hereafter also called “A”); a decryption rights delegates device 20 (hereafter also called “B”); a ciphertext conversion device 30 (hereafter also called “P”); and a PKG device (secret key generation device) 40. The decryption rights delegator device 10 (A) adopts PKE system encryption; the decryption rights delegatee device 20 (B) adopts IBE system encryption.
In the PKG device 40, the storage portion 42 stores in advance a master-secret key (mk). The master-secret key processing portion 41 generates a secret key (dID) corresponding to the device adopting IBE system encryption, such as the decryption rights delegatee device 20, and generates auxiliary information (eID). The transmission/reception portion 43 transmits and receives information with the decryption rights delegator device 10 and decryption rights delegatee device 20.
In the decryption rights delegator device 10, the storage portion 14 stores a secret key and public key generated by the key generation portion 13, and stores auxiliary information transmitted from the PKG device 40. The re-encryption key generation portion 11 generates a re-encryption key (rkID) using the secret key stored in the storage portion 14 and the auxiliary information transmitted from the PKG device 40; the re-encryption key is used by the ciphertext conversion device 30. The public key encryption processing portion 12 executes an algorithm to perform PKE encryption using the public key stored in the storage portion 14, and executes an algorithm to perform decryption using the secret key stored in the storage portion 14. The transmission/reception portion 15 performs transmission and reception of information with the PKG device 40 and ciphertext conversion device 30.
In the decryption rights delegatee device 20, the storage portion 22 stores the IBE system public key (ID) selected arbitrarily by the user of the decryption rights delegatee device 20, and stores the secret key corresponding to the public key generated and transmitted from the PKG device 40. The identity based encryption processing portion 21 performs encryption based on the IBE system using the public key stored in the storage portion 22, and executes an algorithm to perform decryption using the secret key stored in the storage portion 22. The transmission/reception portion 23 performs transmission and reception with the PKG device 40 and ciphertext conversion device 30.
In the ciphertext conversion device 30, the storage portion 32 stores the re-encryption key generated and transmitted by the decryption rights delegator device 10. Ciphertext transmitted from the decryption rights delegator device 10 is received by the transmission/reception portion 33; the ciphertext re-encryption portion 31 uses the re-encryption key stored in the storage portion 32 to convert the received ciphertext, and the converted ciphertext is transmitted to the decryption rights delegates device 20 by the transmission/reception portion 33. The transmission/reception portion 33 performs transmission and reception of information with the decryption rights delegator device 10 and decryption rights delegatee device 20.
Next, processing to generate a secret key for the decryption rights delegates device 20, performed by the PKG device 40 in the delegation system 1 of the first embodiment, and processing to generate a re-encryption key for the ciphertext conversion device 40 by the decryption rights delegator device 10, are explained.
First, the various symbols used in the explanation below are defined as follows.
: Set of natural numbers other than 0 up to complex number p exclusive (hereafter denoted by Zp*),
: Groups of prime order p which can define a bilinear map (hereafter denoted by G and G1),
ê: : A bilinear map,
ID: The ID of a user (rights delegatee) using identity based encryption. The bit size necessary for binary representation of ID is taken to be 1,
: When ID is represented in binary notation, the set of indexes corresponding to digits for which the bit is “1”. For example, if ID=110, then ={2,3,6}, and if ID=001001, then =, 4}.
As premises of the processing to generate the secret key of the decryption rights delegates device 20 and the re-encryption key of the ciphertext conversion device 30, as initialization processing the PKG device 40 uses a security parameter k, randomly selects a generator gεG in the group G, and selects random elements g2, hεG in the group G. Then, a random element αεZp* in Zp* is selected, and with mk=g2α, g1=gα, and parms=(g,g1,g2,h), the master-secret key mk and public parameters parms are stored in the storage portion 42. Here, parms are public parameters which can be accessed by a third party.
In the decryption rights delegator device 10 (A), the key generation portion 13 is used to perform PKE system key generation. The key generation portion 13 takes as input the public parameters parms made available by the PKG device 40, and selects random elements β,θεZp* in Zp*. Then, with g3=g1β and g4=gθ, the public key pk and the decryption secret key sk are respectively generated as pk=(g3,g4) and sk=β, with θ as a secret key for re-encryption key generation. The generated values of pk, sk, θ are stored in the storage portion 14.
Under processing under the above premises, the processing to generate the secret key for the decryption rights delegates device 20 and the re-encryption key for the ciphertext conversion device 30 is performed as follows.
First, the master-secret key processing portion 41 of the PKG device 40 uses the master-secret key (mk) to generate an IBE system secret key (dID) for the decryption rights delegates device 20 (B) and auxiliary information (eID). Specifically, the master-secret key processing portion 41 takes as input the master-secret key mk=g2α, the user ID which is the IBE system public key of the decryption rights delegatee device 20 (B), and the public parameters parms, selects a random element uεZp* in Zp*, and generates the secret key (dID) and auxiliary information (eID) using the following equation (1):
(dID,eID)=(g2α(g1IDh)u,gu) (1)
The master-secret key processing portion 41 of the PKG device 40 then uses a secure communication circuit to transmit the IBE secret key (dID) to the decryption rights delegatee device 20 (B) via the transmission/reception portion 43 (step (2)). The decryption rights delegatee device 20 (B) stores the received secret key (dID) in the storage portion 22. The master-secret key processing portion 41 of the PKG device 40 also transmits the auxiliary information to the decryption rights delegator device 10 (A) via a tamper-proof communication path, using the transmission/reception portion 43 (step (3)).
The re-encryption key processing portion 11 of the decryption rights delegator device 10 (A), upon receiving the auxiliary information via the transmission/reception portion 15, records the received auxiliary information in the storage portion 14, and uses its own secret key (sk,θ) and auxiliary information (eID) stored in the storage portion 14 to generate a re-encryption key (rkID) (step (4)). Specifically, taking as input the decryption secret key sk=β, secret key for re-encryption key generation 0, auxiliary information eID=gu corresponding to B20 indicated by ID, and public parameters parms made accessible by the PKG device 40, the re-encryption key is then rkID=(gu/β,gu,θ). Then, the re-encryption key generation portion 11 of the decryption rights delegator device 10 (A) transmits the generated re-encryption key (rkID) via a secure communication path to the ciphertext conversion device 30 (P) using the transmission/reception portion 15. The ciphertext conversion device 30 (P) records the re-encryption key (rkID) received via the transmission/reception portion 33 in the storage portion 32 (step (5)). As shown in
Next, processing to encrypt, convert, and decrypt plaintext, using the public key, re-encryption key, and secret key generated as described above, is explained referring to
First, the public key encryption processing portion 12 of the decryption rights delegator device 10 (A) encrypts the plaintext M to be shared with 20 (B) using the PKE system public key, to generate ciphertext Cpk. Specifically, taking as input the public key pk=(g3,g1), plaintext MεG1, and the public parameters parms, a random element rεZp* in Zp* is selected, and the following equation (2) is used to generate the ciphertext Cpk (step (1)):
C
PK=(g4r,g3r,hr,M·ê(g1,g2)r)ε× (2)
Next, the public key encryption processing portion 12 of the decryption rights delegator device 10 (A) transmits the generated ciphertext Cpk to the ciphertext conversion device 30 (P) via the transmission/reception portion 15 (step (2)). The ciphertext conversion processing portion 31 of the ciphertext conversion device 30 (P) takes as input the re-encryption key rkID=(gu/β,gu,θ) stored in the storage portion 32 and the public parameters parms and ciphertext Cpk=(C1,C2,C3,C4), and based on the following equation (3), converts Cpk to generate the converted ciphertext CR
C
R
=(C′1,C′2)=(C11/θ,C4·ê(gu/β,C2ID)·ê(gu,C3))ε× (3)
The ciphertext conversion processing portion 31 of the ciphertext conversion device 30 (P) transmits the generated converted ciphertext CR
M=C′
2
/ê(dID,C′1) (4)
By means of the above configuration, whereas in the prior art a delegation system could not be realized when both A and B adopted only one among a PKE system and an IBE system, as shown in
The security of the delegation system 1 realized by means of the above-described configuration is proven as described below.
(Definition 1)
For randomly chosen integers
a random generator
and an element
we define the advantage of an algorithm in solving the decision Bilinear Diffie-Hellman (dBDH) problem as follows:
=|Pr[(g,ga,gb,gc,ê(g,g)abc)=0]−Pr[(g,ga,gb,gc,R)=0]|
where the probability is over the random choice of generator gε, the randomly chosen integers a, b, c, the random choice of Rε, and the random bits used by A. We say that the (k, t, ε)-dBDH assumption holds in if no t-time algorithm has advantage at least ε in solving the dBDH problem in under a security parameter k.
(Security Notion)
(Chosen Plaintext Security)
We model chosen plaintext security for a hybrid proxy re-encryption system as a game between an adversary and a challenger C. In this game, the adversary is allowed to adaptively choose the secret key queries and re-encryption key queries. Intuitively, these queries correspond to the situation where the adversary compromises some part of the proxy (or proxies) and some delegatees. Since the adversary obviously wins the game if it obtains both delegatee's secret key and the corresponding re-encryption key involving the same identity, she is not allowed to ask such query. More precisely, IND-ID-CPA security is defined as follows:
<Setup>
<Phase 1>
<Challenge>
<Phase 2>
<Guess>
The adversary wins if {tilde over (b)}=b. The hybrid proxy re-encryption system is secure in the sense of IND-ID-CPA if |Pr[{tilde over (b)}=b]−½| is negligible.
(Definition 2)
Let be an adversary against the hybrid proxy re-encryption system. Define the IND-ID-CPA advantage of as follows:
Adv
hyd
idcpa()=2(Pr[{tilde over (b)}=b]−½)
We say that a hybrid proxy re-encryption system is (k, t, q, ε) adaptive chosen plaintext secure if for any t time IND-ID-CPA adversary that makes at most q chosen queries under a security parameter k we have that Advhydidcpa()<ε. As shorthand, we say that a hybrid proxy re-encryption system is (k, t, q, ε) INDID-CPA secure.
Note that this game encompasses the notion of semantic security for the PKE system, as well as that for the IBE system, and also the notion that a set of reencryption keys cannot be “combined” to form new re-encryption keys for other identities. For example, if the PKE system is not semantically secure, then the adversary can win the game by simply distinguishing the challenge ciphertext.
(Theorem 1)
Suppose that the (k, t, ε)-dBDH assumption holds. Then the hybrid proxy re-encryption system is (k, t′, q, ε) IND-ID-CPA secure for any q, k, and t′<t−θ(τq) where τ is the maximum time for an exponentiation in .
(Proof)
Let be an adversary against the hybrid proxy re-encryption system in the IND-ID-CPA sense. We construct an adversary B which solves the dBDH problem in by utilizing . Providing that is given an input (g, Γ1, Γ2, Γ3, X)=(g, ga, gb, gc, X), where x=ê(g,g)abc or
We describe how works in the following:
<Setup>
<Challenge>
CPK
<Phase 2>
<Solve>
We claim that generates a valid secret key and the corresponding auxiliary information for IDi. To see this, let
Then we have that
We also claim that can perfectly simulate the re-encryption key for IDi since it looks random and independent of any other values if the adversary does not obtain the corresponding secret key. Therefore, we conclude the theorem 1.
The secret key stored in the second storage unit, used when the re-encryption key generation unit of the decryption rights delegation device generates a re-encryption key in this invention, corresponds to a combination of the decryption secret key and the secret key for re-encryption key generation in the above embodiment, and this secret key corresponds to the decryption secret key in the above proof.
Below, a second embodiment of the invention is explained, referring to
The dashed-line arrows between equipment in
The delegation system 2 comprises a decryption rights delegator device 60 (hereafter also called “A”), a decryption rights delegates device 70 (hereafter also called “B”), a ciphertext conversion device 80 (hereafter also called “P”), and a PKG (secret key generation) device 90. The decryption rights delegator device 60 (A) and decryption rights delegatee device 70 (B) employ IBE system encryption.
In the PKG device 90, the storage portion 92 stores a master-secret key (mk) in advance. Here, the master-secret key of the second embodiment is defined as comprising, in addition to the master-secret key described in Reference 2 and in the first embodiment, information for use in generating a re-encryption key. From the master-secret key stored in the storage portion 92, the master-secret key processing portion 91 generates a secret key and auxiliary information corresponding thereto for devices performing IBE system encryption and decryption, such as the decryption rights delegator device 60 and the decryption rights delegates device 70. The re-encryption key generation device 93 generates a re-encryption key from the master-secret key and auxiliary information. The transmission/reception portion 94 transmits and receives information with the decryption rights delegator device 60, decryption rights delegatee device 70, and ciphertext conversion device 80.
In the decryption rights delegator device 60, the storage portion 62 stores an ID selected arbitrarily by the user of the decryption rights delegator device 60, that is, the IBE system public key, and the secret key generated and transmitted by the PKG device 90. The identity based encryption processing portion 61 executes an algorithm to perform encryption based on an identity based encryption system using the public key stored in the storage portion 62, and executes an algorithm to perform decryption using the secret key stored in the storage portion 62. The transmission/reception portion 63 transmits and receives information with the PKG device 90 and ciphertext conversion device 80.
In the decryption rights delegatee device 70, the storage portion 72 stores an ID selected arbitrarily by the user of the decryption rights delegatee device 70, that is, the IBE system public key, and the secret key generated and transmitted by the PKG device 90. The identity based encryption processing portion 71 executes an algorithm to perform IBE system encryption using the public key stored in the storage portion 72, and executes an algorithm to perform decryption using the secret key stored in the storage portion 72. The transmission/reception portion 73 transmits and receives information with the PKG device 90 and ciphertext conversion device 80.
In the ciphertext conversion device 80, the storage portion 82 stores the re-encryption key generated and transmitted by the PKG device 90. The ciphertext conversion processing portion 81 receives ciphertext transmitted from the decryption rights delegator device 10 using the transmission/reception portion 83, converts the received ciphertext using the re-encryption key stored in the storage portion 82, and transmits the converted ciphertext using the transmission/reception portion 83 to the decryption rights delegatee device 70. The transmission/reception portion 83 transmits and receives information with the PKG device 90, decryption rights delegator device 60, and decryption rights delegatee device 70.
Next, processing to generate a secret key for the decryption rights delegatee device 70 and a re-encryption key for the ciphertext conversion device 80, performed by the PKG device 90 in the delegation system 1 of the second embodiment, is explained, referring to
: Set of natural numbers other than 0 up to complex number p exclusive (hereafter denoted by Zp*),
: Groups of prime order p which can define a bilinear map (hereafter denoted by G and G1),
ê: : A bilinear map,
ID: The ID of a user (rights delegates) using identity based encryption. The bit size necessary for binary representation of ID is taken to be 1,
: When ID is represented in binary notation, the set of indexes corresponding to digits for which the bit is “1”. For example, if ID=100110, then ={2,3,6}, and if ID=001001, then ={1,4}.
As premises of the processing by the PKG device 90 to generate the secret key of the decryption rights delegatee device 70 and the re-encryption key of the ciphertext conversion device 80, as initialization processing the PKG device 90 uses a security parameter k, randomly selects a generator gεG in the group G, and selects random elements g2, h1, h2εG in the group G. Then, random elements α, ωεZp* in Zp* are selected, and the master-secret key mk and public parameters parms are stored in the storage portion 92, as indicated in equation (5) below, wherein parms are public parameters which can be accessed by a third party:
Under processing under the above premises, the processing to generate the secret key for the decryption rights delegatee device 70 and the re-encryption key for the ciphertext conversion device 80 is performed as follows.
First, the master-secret key processing portion 91 of the PKG device 90 generates auxiliary information (eR
(dR
Next, the re-encryption key generation portion 93 of the PKG device 90 uses the auxiliary information ((eR
wherein IDB is a public key selected by the user of the decryption rights delegated device 70.
The master-secret key processing portion 91 of the PKG device 90 transmits the generated IBE system secret key (dR
As shown in
Next, processing to encrypt, convert, and decrypt plaintext, using the public key, re-encryption key, and secret key generated as described above, is explained referring to
First, taking as input the public key (IDAεG), plaintext (MεG1), and the public parameters parms, a random element rεZp* in Zp* is selected, and the following equation (8) is used to generate the ciphertext CID (step (1)):
C
ID=(C1, C2,C3,C4)=(πtεI
When the ciphertext CID is generated, the identity based encryption portion 61 transmits the generated ciphertext CID to the ciphertext conversion device 80 using the transmission/reception portion 63 (step (2)). The ciphertext conversion processing portion 81 of the ciphertext conversion device 80 takes as input the ciphertext CID=(C1,C2,C3,C4) received via the transmission/reception portion 83, the public key IDA of the decryption rights delegator device 60 which is made public, and the re-encryption key (rkID
C
R
=(C′1,C′2,C′3)=(C2,C3, C4·ê(C1,gs/ΣtεZ ID logh2 {tilde over (H)})ε× (9)
The ciphertext conversion processing portion 81 which generates the converted ciphertext CR
M=C′
3
·ê(d1,C′2)/ê(d0,C′1) (10)
In the above configuration, the re-encryption key used by the ciphertext conversion device 80 and the secret key for decryption rights delegation used by the decryption rights delegatee device 70 are not generated by dividing a master-secret key. Hence even when there is collusion between the user of the ciphertext conversion device 80 and the user of the decryption rights delegatee device 70, the master-secret key of the PKG device 90 cannot be reproduced, and the security of the IBE system delegation system 2 can be ensured.
The security of the delegation system 2 realized by means of the above-described configuration is proven as described below.
(Definition 1)
For randomly chosen integers
a random generator
and an element
we define advantage of an algorithm in solving the decision Bilinear Diffie-Hellman (dBDH) problem as follows:
=|Pr[(g,ga,gb,gc,ê(g,g)=0]−Pr[(g,ga,gb,gc,R)=0]|
where the probability is over the random choice of generator gε, the randomly chosen integers a, b, c, the random choice of Rε, and the random bits used by A. We say that the (k, t, ε)-dBDH assumption holds in if no t-time algorithm has advantage at least ε in solving the dBDH problem in under a security parameter k.
(Security Notion)
(Chosen Plaintext Security)
We model chosen plaintext security for an IBE proxy re-encryption system as a game between an adversary and a challenger C. In this game, the adversary is allowed to adaptively choose the secret key queries and re-encryption key queries. Since the adversary obviously wins the game if it obtains both the delegatee's second level secret key and the corresponding re-encryption key involving the target identity, she is not allowed to ask such query. She is also not allowed to ask for the first level secret key for the target identity. More precisely, IND-ID-CPA security is defined as follows:
<Setup>
<Phase 1>
<Challenge>
<Phase 2>
<Guess>
(Definition 3)
Let be an adversary against the IBE proxy re-encryption system. Define the IND-ID-CPA advantage of as follows:
Adv
ibep
idcpa()=2(Pr[{tilde over (b)}=b]−½)
We say that the an IBE proxy re-encryption system is (k, t, q, ε) adaptive chosen plaintext secure if for any t time IND-ID-CPA adversary that makes at most q chosen queries under a security parameter k we have that Advibepidcpa()<ε. As shorthand, we say that an IBE proxy re-encryption system is (k, t, q, ε) IND-IDCPA secure.
We define the selective adversary who is identical to the above adversary except that it discloses to the challenger the target identity before the setup. We denote the selective IND-ID-CPA by IND-sID-CPA and the advantage of the selective adversary by Advibepsidcpa. The definition is as same as that of Definition 3.
(Security Analysis)
(Theorem 2)
Suppose that the (k, t, ε)-dBDH assumption holds. Then the IBE proxy re-encryption system is (k, t′, q, ε) IND-sID-CPA secure for any q, k, and t′<t−θ(τq) where τ is the maximum time for an exponentiation in .
(Proof)
Let be an adversary in the IND-sID-CPA sense. We construct an adversary B which solves the dBDH problem in by utilizing . Providing that is given an input (g, Γ1, Γ2, Γ3, X)=(g, ga, gb, gc, X), where X=ê(g,g)abc or
We describe how works in the following:
<Initialization>
<Setup>
<Phase 1>
<Challenge>
<Phase 2>
<Solve>
We claim that generates valid first level secret keys and the corresponding auxiliary information for IDi. To see this, let
and we consider the first level secret key. Then we have that
It is obvious that can simulate the second level secret keys. Since can perfectly simulate re-encryption keys and secret keys, we conclude the theorem 2.
The delegation system 1 and delegation system 2 of the above first and second embodiments are each a single ciphertext decryption rights delegation system which, for ciphertext transmitted from a decryption rights delegator device, enables decryption by a decryption rights delegatee device through conversion of the ciphertext by a ciphertext conversion device using a re-encryption key. Such a ciphertext decryption rights deletion system is divided into a re-encryption key generation phase and a phase in which content sharing is performed; in the re-encryption key generation phase in the configuration of the above first and second embodiments, a master-secret key held by an IBE system secret key generator is used to generate an IBE system secret key, and to generate auxiliary information related thereto, and based on this auxiliary information, the re-encryption key is generated. On the other hand, in the content sharing phase, ciphertext generated by the decryption rights delegator device is converted into IBE-system ciphertext in the ciphertext conversion device, and the converted ciphertext is decrypted by the decryption rights delegatee device using the IBE system secret key.
The above-described first embodiment is characterized in comprising a PKG device, which generates an IBE system secret key using a master-secret key; a decryption rights delegator device, which performs PKE system encryption; a ciphertext conversion device, which converts PKE system ciphertext transmitted from the decryption rights delegator device into IBE system ciphertext so as to enable decryption by a decryption rights delegatee device; and, a decryption rights delegatee device, which performs IBE system decryption.
The above-described second embodiment is characterized in comprising a PKG device, which generates an IBE system secret key and a re-encryption key using a master-secret key; a decryption rights delegator device, which performs IBE system encryption; a ciphertext conversion device, which converts IBE system ciphertext transmitted from the decryption rights delegator device into another IBE system ciphertext so as to enable decryption by a decryption rights delegatee device; and, a decryption rights delegatee device, which performs IBE system decryption.
In the above, preferred embodiments of the invention have been explained, but the invention is not limited to these embodiments. Various additions, omissions, substitutions, and other modifications can be made, without deviating from the gist of the invention. The invention is not limited by the above explanations, but is limited only by the attached Scope of Claims.
The decryption rights delegator device 10, decryption rights delegatee device 20, ciphertext conversion device 30, and PKG device 40 of the above-described first embodiment, as well as the decryption rights delegator device 60, decryption rights delegates device 70, ciphertext conversion device 80, and PKG device 90 of the above-described second embodiment, each have an internal computer system. The processing in each of the above-described devices is performed by having computers read and execute programs stored on computer-readable recording media. Here “computer-readable recording media” may be magnetic disks, magneto-optical discs, CD-ROMs, DVD-ROMs, semiconductor memory, or other media. Computer programs may also be distributed to computers through communication circuits, so that a computer receiving this distribution executes the program.
This application claims priority on U.S. Provisional Patent Application No. 60/839,516, filed Aug. 22, 2006, the content of which incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60839516 | Aug 2006 | US |