SIGNATURE VERIFICATION SYSTEM, SIGNATURE APPARATUS, SIGNATURE VERIFICATION METHOD, AND PROGRAM

Information

  • Patent Application
  • 20230224165
  • Publication Number
    20230224165
  • Date Filed
    June 02, 2020
    4 years ago
  • Date Published
    July 13, 2023
    a year ago
Abstract
A signature verification system includes: a signature apparatus configured to sign a first chameleon hash value, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data; a changing apparatus configured to change a public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers; a delegator changing apparatus configured to change a modifiable part of the data, using a private key for the changers of the actual delegator; and a verifying apparatus configured to verify the signature using the public key for the changers and the public key for the changers of the actual delegator.
Description
TECHNICAL FIELD

The present invention relates to a signature verification system, a signature apparatus, a signature verification method, and a program.


BACKGROUND ART

Recent improvements in performance of artificial intelligence (AI) analysis have increased the value of data subject to analysis. This has led to a study of a mechanism in which an individual provides his/her own data to a company desiring to have the data and accepts compensation for the data. As such a mechanism, personal data trust banks, which manage and operate data of individuals, have attracted attention.


In the personal data trust bank mechanism, first, a personal data provider creates data related to an individual and signs the data. The signed data is provided to the individual. The individual having received the signed data deposits the signed data in the personal data trust bank. The personal data trust bank provides the signed data thus deposited, to a personal data user.


The signing by the personal data provider is performed to identify the source of the data and maintain reliability of the data. Hence, when the data is changed, verification of the signature fails. However, it is desired in some cases to change part of the data while maintaining the validity of the signature. For example, in a case where the data includes physical examination data of an individual, there may be a case where the individual desires to hide part of the physical examination data. Specifically, there may be, for example, a case of allowing data of weight to be provided while not desiring to provide data of blood type in the physical examination data.


Moreover, there may be a case where the personal data trust bank desires to change data of an individual according to a demand of a personal data user and provide the changed data to the personal data user. If the personal data trust bank is not capable of changing the data in such a case, the personal data trust bank needs to ask, each time, the individual to provide data satisfying the demand of the personal data user, which requires some work. Hence, by an individual designating a personal data trust bank and permitting change of data by the designated personal data trust bank, such work can be eliminated. This is also referred to as delegation of change capability by an individual (i.e., a changer) capable of changing data. The personal data trust bank to which the change capability is delegated is also referred to as a changer of a delegator.


By using a technique described in NPL 1, in order to delegate the capability of changing data to a delegator (personal data trust bank), a changer (individual) newly generates a signature for the delegator and adds the generated signature to a signature from a signer (personal data provider). In this way, the change capability can be delegated.


CITATION LIST
Non Patent Literature



  • [NPL 1] C. Brzuska, M. Fischlin, A. Lehmann, and D. Schroder, “Santizable signatures: How to partially delegate control for authenticated data”, In BIOSIG, pages 117-128, 2009



SUMMARY
Technical Problem

However, the technique described in NPL 1 increases the number of signatures and consequently a signature size, which also increases computation cost for verification.


An example object of the present invention is to provide a signature verification system, a signature apparatus, a signature verification method, and a program that enable delegation of the capability of changing data without increasing a signature size and computation cost for verification.


Solution to Problem

A signature verification system according to an example aspect of the present invention includes: a signature apparatus configured to sign a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers; a changing apparatus configured to receive the signed data, and to change the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers; a delegator changing apparatus configured to receive the signed data designated the changers of the actual delegator, and to change a modifiable part of the data, using a private key for the changers of the actual delegator; and a verifying apparatus configured to receive the signed data with the changed modifiable part of the data, and to verify the signature using the public key for the changers and the public key for the changers of the actual delegator.


A signature apparatus according to an example aspect of the present invention is configured to sign a first chameleon hash value calculated using a public key for changers of data and a public key for changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value for an entirety of the data calculated using the public key for the changers.


A signature verification method according to an example aspect of the present invention includes: a signature step of signing a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers; a first changing step of receiving the signed data, and changing the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers; a second changing step of receiving the signed data designated the changers of the actual delegator, and changing a modifiable part of the data, using a private key for the changers of the actual delegator; and a verifying step of receiving the signed data with the changed modifiable part of the data, and verifying the signature using the public key for the changers and the public key for the changers of the actual delegator.


A program according to an example aspect of the present invention causes a computer to execute the signature verification method.


Advantageous Effects of Invention

According to the present invention, it is possible to delegate the capability of changing data without increasing a signature size and computation cost for verification.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram describing an overview of example embodiments of the present invention;



FIGS. 2A and 2B are each a diagram describing a method of delegating a change capability according to the example embodiments of the present invention;



FIG. 3 is a block diagram illustrating an example of a configuration of a signature verification system according to a first example embodiment;



FIG. 4 is a functional block diagram illustrating an example of a concrete configuration of the signature verification system according to the first example embodiment;



FIG. 5 is a sequence diagram of signature verification processing according to the first example embodiment;



FIG. 6 is a schematic block diagram illustrating an example of a hardware configuration of a computer according to the first example embodiment; and



FIG. 7 is a functional block diagram illustrating an example of a concrete configuration of a signature verification system according to a second example embodiment.





DESCRIPTION OF THE EXAMPLE EMBODIMENTS

Hereinafter, example embodiments of the present invention will be described with reference to the drawings. Note that, in the Specification and drawings, elements to which similar descriptions are applicable are denoted by the same reference signs, and overlapping descriptions may hence be omitted.


Descriptions will be given in the following order.

    • 1. Overview of Example Embodiments of the Present Invention
    • 2. First Example Embodiment
      • 2.1. System Configuration
      • 2.2. Operation Example
      • 2.3. Concrete Example
      • 2.4. Hardware Configuration
      • 2.5. Description of Effects
    • 3. Second Example Embodiment
      • 3.1. System Configuration
      • 3.2. Operation Example
      • 3.3. Description of Effects
    • 4. Other Example Embodiments


1. OVERVIEW OF EXAMPLE EMBODIMENTS OF THE PRESENT INVENTION


FIG. 1 is a diagram describing an overview of example embodiments of the present invention. The example embodiments of the present invention will be described based on a system including personal data trust banks that manage and operate data of an individual as described above.


As illustrated in FIG. 1, a system according to one example embodiment of the present invention includes a personal data provider 10, an individual 20, personal data trust banks 30, and personal data users 40.


The personal data provider 10 generates data related to the individual 20, signs the generated data, and provides the signed data to the individual 20. The data includes temporary delegator changer data to designate changers of an actual delegator by the individual 20, as will be described later. The personal data provider 10 may be a signer of data in the example embodiments of the present invention.


The individual 20 changes the temporary delegator changer data included in the received signed data to actual delegator changer data and provides the signed data with the changed delegator changer data to the personal data trust bank 30, while maintaining the validity of the signature by the personal data provider 10. The data includes a modifiable part and an unmodifiable part, and the individual 20 may change the modifiable part of the data. The individual 20 may be a changer of data in the example embodiments of the present invention.


Each personal data trust bank 30 can, when the personal data trust bank 30 itself is designated by the delegator changer data, change the modifiable part of the data and provide the signed data thus changed to the personal data user 40, while maintaining the validity of the signature by the personal data provider 10. The personal data trust bank 30 may be a changer of the delegator to which the capability of changing the data is delegated in the example embodiments of the present invention.


Each of the personal data users 40 verifies the signature of the signed data received from the personal data trust bank 30. When the verification succeeds, the personal data user 40 uses the data. The personal data user 40 may be a verifier of data in the example embodiments of the present invention.


According to the example embodiments of the present invention, it is possible, in such a system, to delegate the capability of changing data without increasing a signature size and computation cost for verification. Note that the number of personal data providers 10, the number of individuals 20, the number of personal data trust banks 30, and the number of personal data users 40 are not limited to the numbers illustrated in FIG. 1.


In the example embodiments of the present invention, as a so-called sanitizable signature, an electronic signature for which changers (individual 20) and changers of a delegator (personal data trust bank 30) can change a predetermined part of a message (data) without communicating with an original signer (personal data provider 10) and generate a valid signature for the changed message.


The sanitizable signature according to the example embodiments of the present invention is provided using a chameleon hash. A standard hash function (a hash function that is not a chameleon hash) has characteristics of compressing an input message to a value (hash value) of a predetermined bit length and not generating the same hash value unless an identical message is input. Specifically, assume that messages are denoted by m and m′ and the hash function is denoted by HO. In a case where m≠m′, H(m)≠H(m′). The characteristics are called collision resistance. The standard hash function also has characteristics that it is difficult to find any collision on a (input) hash value. Specifically, it is difficult to obtain m′ such that H(m′) on input m and H(m). Note that m≠m′. The characteristics are called second preimage resistance. In contrast, a chameleon hash is a hash function with which a collision can be found when a certain private key is known.



FIGS. 2A and 2B are each a diagram describing a method of delegating change capability according to the example embodiments of the present invention. In the following, a description will be given of a method in which changers having the capability of changing data designates changers of a delegator corresponding a delegator to which a change capability is delegated, while maintaining the validity of a signature by a signer.


First, with reference to FIG. 2A, a method of designating changers of a delegator by using the technique described in NPL 1 described above will be described.


In FIG. 2A, when a changer delegates the change capability for plain text+signature (a key for a signer) 201, delegator data+signature (a key for the changer) 202 is added to the plain text+signature (the key for the signer) 201. In other words, by providing the delegator data+signature (the key for the changer) 202 to the plain text+signature (the key for the signer) 201, changers of the delegator are designated. This method requires a new signature for the delegator data, which consequently increases a signature size and computation cost for verification.


Next, with reference to FIG. 2B, a method of designating changers of a delegator according to the example embodiments of the present invention will be described.


In FIG. 2B, first, signing is performed using a key for a signer in a state where temporary delegator data is added to a plain text (211). A changer changes, in order to designate changers of the delegator, the temporary delegator data to actual delegator data while maintaining the validity of the signature by the signer (212). This method does not require a new signature for the delegator data, which enables the change capability to be delegated without increasing a signature size and computation cost for verification.


2. FIRST EXAMPLE EMBODIMENT
2.1. System Configuration


FIG. 3 is a block diagram illustrating an example of a configuration of a signature verification system according to a first example embodiment. A signature verification system 100 includes a key generating apparatus 110, a signature apparatus 120, a changing apparatus 130, a delegator changing apparatus 140, and a verifying apparatus 150. Each of constituent elements of the signature verification system 100 will be described in detail with reference to FIG. 4.



FIG. 4 is a functional block diagram illustrating an example of a concrete configuration of the signature verification system according to the first example embodiment.


The key generating apparatus 110 includes a key generating section 111 and a key providing section 112. The key generating section 111 generates pairs of keys to be used for signing data. Specifically, the key generating section 111 generates a pair of a public key pksign and a private key sksign for signing and verification, a pair of a public key pksan and a private key sksan to be used for a changer to designate a delegator of a change capability, and a pair of a public key pkdsan and a private key skdsan for data change to be used by changers of the delegator to change data. The key providing section 112 provides the generated keys to the signature apparatus 120, the changing apparatus 130, the delegator changing apparatus 140, and the verifying apparatus 150. Note that the keys can be provided in any method, and may be transmitted via a network or may be stored and transported in a removable storage apparatus. Key generation in the key generating apparatus 110 may be performed by the signature apparatus 120 or the changing apparatus 130.


The signature apparatus 120 includes a data generating section 121, a signature section 122, and a data transmitting section 123. The signature apparatus 120 corresponds to an apparatus used by the personal data provider 10 described above. The data generating section 121 generates target data. The data includes a modifiable part, which can be changed, and an unmodifiable part, which is prohibited from changing. The data is also referred to as a plain text. The signature section 122 signs a chameleon hash value using a public key for changers and a temporary public key for changers of a delegator, a fixed part (unmodifiable part) of the plain text, and a chameleon hash value for the entire plain text. The data transmitting section 123 transmits the signed data to the changing apparatus 130.


The changing apparatus 130 includes a data changing section 131, a signature section 132, a delegator designating section 133, and a data transmitting section 134. The changing apparatus 130 corresponds to an apparatus used by the individual 20 described above. The data changing section 131 changes the modifiable part of the plain text in the signed data. The signature section 132 signs the changed plain text with a sanitizable signature. The delegator designating section 133 changes the temporary public key for the changers of the delegator to the public key for the changers of the actual delegator, to thereby designate the changers of the actual delegator. The data transmitting section 134 transmits the signed data after the change, to the delegator changing apparatus 140.


The delegator changing apparatus 140 includes a data changing section 141, a signature section 142, and a data transmitting section 143. The delegator changing apparatus 140 corresponds to an apparatus used by the personal data trust bank 30 described above. The data changing section 141 changes the modifiable part of the plain text in the signed data. The signature section 142 signs the changed plain text with a sanitizable signature. The data transmitting section 143 transmits the signed data after the change, to the verifying apparatus 150.


The verifying apparatus 150 includes a verifying section 151. The verifying apparatus 150 corresponds to an apparatus used by the personal data user 40 described above. The verifying section 151 verifies the signature of the signed data after the change, using the public key associated with the private key for the signature, the public key for the changers, and the public key for the changers of the delegator. When the verification succeeds, the personal data user 40 can use the data for which the verification succeeds, for a desired purpose.


Each of the processing sections of the apparatuses described above is implemented with a central processing unit (CPU) of a computer configured to operate according to a program and a communication interface of the computer, for example. For example, the CPU reads the program from a program recording medium, such as a program storage apparatus of the computer, and uses, as necessary, the communication interface to operate as each of the processing sections of the apparatuses described above according to the program.


2.2. Operation Example

Next, an operation example according to the first example embodiment will be described.



FIG. 5 is a sequence diagram of signature verification processing according to the first example embodiment. Note that detailed descriptions of what have already been described are omitted.


First, in step S501, the signature apparatus 120 signs the chameleon hash value using the public key for the changers and the temporary public key for the changers of the delegator, the fixed part (unmodifiable part) of the plain text, and the chameleon hash value for the entire plain text. The signing itself is performed in a general scheme using a private key for a signature. The signed data after the signing is provided to the changing apparatus 130.


Next, in step S502, the changing apparatus 130 changes a modifiable part of the signed data. The data can be changed when the changing apparatus 130 has the private key associated with the public key for the changers. Thereafter, in step S503, the changing apparatus 130 signs the data after the change in a sanitizable manner. Further, in step S504, the changing apparatus 130 changes the public key for the changers of the temporary delegator to the public key for the changers of the actual delegator, to thereby designate the changers of the delegator. The signed data after the change is provided to the delegator changing apparatus 140.


Next, in step S505, the delegator changing apparatus 140 changes the modifiable part of the signed data. The data can be changed when the delegator changing apparatus 140 has the private key associated with the public key for the changers of the delegator. Thereafter, in step S506, the delegator changing apparatus 140 signs the data after the change in a sanitizable manner. The signed data after the change is provided to the verifying apparatus 150.


Then, in step S507, the verifying apparatus 150 verifies the signed data after the change, using the public key associated with the private key for the signature, the public key for the changers, and the public key for the changers of the delegator.


The signature verification processing according to the present example embodiment is performed as described above.


2.3. Concrete Example

Next, a concrete example of signature verification processing according to the present example embodiment will be described.


First, extension of a chameleon hash based sanitizable signature according to the present example embodiment will be described.


In the present example embodiment, two kinds of chameleon hash are used. The two kinds of chameleon hash are a plain text change chameleon hash (also referred to as an MCH) as well as a key and plain text change chameleon hash (also referred to as KMCH).


With the plain text change chameleon hash (MCH), for a public key pk, a message m before change, a random number r, and a message m′ after change, a random number r′ satisfying Expression (1) below can be calculated by using a private key sk for the public key pk.





[Math. 1]






MC(pk,m,r)=MCH(pk,m′,r′)  (1)


With the key and plain text change chameleon hash (KMCH), for the public key pk, the message m before change, the random number r, and the message m′ after change, the random number r′ satisfying Expression (2) below can be calculated by using a private key sk′ for the public key pk′.





[Math. 2]





KMCH(pk,m,r)=KMCH(pk′,m′,r′)  (2)


Next, a procedure from signing to verification will be described by using the above-described two kinds of chameleon hash.


First, a signer (signature apparatus 120) signs an MCH hash value of temporary delegator data, a plain text mFIX corresponding to a fixed part, and a KMCH hash value of an entire plain text mFull by employing a general signature method as presented in Expression (3) below. Examples of the general signature method include a signature method of a digital signature algorithm (DSA) scheme, for example.





[Math. 3]





Sign(sksig,MCH(pksan,pksan,rmch)∥mFIX∥KMCH(pksan,mFULL,rkmch))  (3)


Here, the second pksan (i.e., a public key for changers) of the MCH is used as a public key for changers of the temporary delegator.


Subsequently, a changer (changing apparatus 130) changes the public key pksan for the changers of the temporary delegator to a public key pkdsan for changers of an actual delegator by using the characteristics of the MCH as presented in Expression (4) below.





[Math. 4]





Sign(sksig,MCH(pksan,pkdsan,rmch′)∥mFIX∥KMCH(pksan,mFULL,rkmch))  (4)


Here, a random number rmch is changed to a random number rmch′ in actual.


Subsequently, a changer of the delegator (delegator changing apparatus 140) changes the plain text excluding the fixed part (i.e., the modifiable part), using the secret key for the changers of the delegator by using the characteristics of the KMCH as presented in Expression (5) below.





[Math. 5]





Sign(sksig,MCH(pksan,pkdsan,rmch′)∥mFIX∥KMCH(pkdsan,mFULL′,rkmch′))  (5)


Here, a random number rkmch is changed to a random number r′kmch in actual. mFULL denoting the entire plain text is changed to m′FULL.


Subsequently, a verifier (verifying apparatus 150) regenerates the hash value and verifies a signature by using the random numbers, plain texts, and public keys for the verifier, changers, and changers of the delegator.


Next, the chameleon hash based sanitizable signature will be described in more detail.


The signer (signature apparatus 120) signs the fixed part mFIX of the plain text and the MCH hash value of the entire plain text mFULL using the public key pksan for the changers, by using a private key sksig of the signer in a general signature scheme as presented in Expression (6) below. The random number r used for the signing and hash computation is passed to the changer (changing apparatus 130).





[Math. 6]





Sign(sksig,mFIX∥MCH(pksan,mFULL,r))  (6)


The changer (changing apparatus 130) creates the random number r′ for an MCH corresponding to the new plain text m′ by using the plain text m, the random number r, and the private key sksan for the changers, replace the random number r used for the hash computation with the random number r′, and passes the resultant to the verifier (verifying apparatus 150) as presented in Expression (7) below.





[Math. 7]





Sign(sksig,mFIX∥MCH(pksan,mFULL′,r′))  (7)


The verifier (verifying apparatus 150) recalculates an MCH hash value and verifies a signature σ by using the plain text m, the random number r, and the public key pksig for the signer and the public key pksan for the changers.


As described above, in the present example embodiment, with the characteristics of the MCH, the changer can calculate the random number r′ for the plain text m′FULL having the same MCH hash value by using the private key sksan.


Next, general key generation, signature, and verification algorithms will be described.


A key generation algorithm outputs, with an input of a security parameter λ, the public key pk and the private key sk as presented in Expression (8) below.





[Math. 8]





(pk,sk)←S.KeyG(1λ)  (8)


The signature algorithm outputs, with inputs of the private key sk and the plain text m, the signature cr for the plain text m as presented in Expression (9) below.





[Math. 9]





σ←S.Sign(sk,m)  (9)


With inputs of the public key pk, the plain text m, and the signature σ, the verification algorithm returns True when the signature is valid while returning False when the signature is invalid as presented in Expression (10) below.





[Math. 10]





{true,false}←S.Verify(pk,m,σ)  (10)


Next, each algorithm in the plain text change chameleon hash (MCH) will be described.


A key generation algorithm outputs, with an input of a security parameter λ, the public key pk and the private key sk as presented in Expression (11) below.





[Math. 11]





(pk,sk)←MCH.KeyGen(1λ)  (11)


A hash algorithm outputs, with inputs of the public key pk and the plain text m, a hash value h and the random number r as presented in Expression (12) below.





[Math. 12]





(h,r)←MCH.Hash(pk,m)  (12)


A rehash algorithm outputs the hash value h, with inputs of the public key pk, the plain text m, and the random number r, as presented in Expression (13) below.





[Math. 13]






h←MCH.ReHash(pk,m,r)  (13)


An adaptive algorithm outputs, with inputs of the private key sk, the plain text m, the plain text m′ after change, and the random number r, a new random number r′ satisfying Expression (15) below, as presented in Expression (14) below.





[Math. 14]






r′←MCH.Adapt(sk,m,m′,r)  (14)





[Math. 15]






MCH.ReHash(pk,m,r)=MCH.ReHash(pk,m′,r′)  (15)


Next, each algorithm in the key and plain text change chameleon hash (KMCH) will be described.


A key generation algorithm outputs, with an input of a security parameter λ, the public key pk and the private key sk as presented in Expression (16) below.





[Math. 16]





(pk,sk)←KMCH.KeyGen(1λ)  (16)


A hash algorithm outputs, with inputs of the public key pk and the plain text m, a hash value h and the random number r as presented in Expression (17) below.





[Math. 17]





(h,r)←KMCH.Hash(pk,m)  (17)


A rehash algorithm outputs the hash value h, with inputs of the public key pk, the plain text m, and the random number r, as presented in Expression (18) below.





[Math. 18]






h←KMCH.ReHash(pk,m,r)  (18)


An adaptive algorithm outputs, with inputs of the private key sk′, the plain text m, the plain text m′ after change, and the random number r, a new random number r′ satisfying Expression (20) below as presented in Expression (19) below.





[Math. 19]






r′←KMCH.Adapt(sk′,m,m′,r)  (19)





[Math. 20]





KMCH.ReHash(pk,m,r)=KMCH.ReHash(pk′,m′,r′)  (20)


In the following, algorithms in the kinds of processing according to the present example embodiment will be described concretely.


The following table presents key generation algorithms for the signer, changers, and changers of the delegator.









TABLE 1







(Signer) Signer key generation algorithm (pksig, sksig) ←


DSS.SigKeyGen(1λ)








 1.
(pksig, sksig) ← S.KeyGen(1λ)







(Changer) Changer key generation algorithm (pksan, sksan) ←


DSS.SanKeyGen(1λ)








 1.
(pksantext missing or illegible when filed mch, sksantext missing or illegible when filed mch) ← MCH.KeyGen(1λ),



 (pksantext missing or illegible when filed kmch, sksantext missing or illegible when filed kmch) ← KMCH.KeyGen(1λ)


 2.
(pksan, sksan) = ((pksantext missing or illegible when filed mch, pksantext missing or illegible when filed kmch),(sksantext missing or illegible when filed mch, sksantext missing or illegible when filed kmch))







(Changer of delegator) Delegator changer key generation algorithm


(pkdel, skdel) ← DSS.DelKeyGen(1λ)








 1.
(pkdeltext missing or illegible when filed kmch, skdeltext missing or illegible when filed kmch) ← KMCH.KeyGen(1λ)


 2.
(pkdel, skdel) = (pkdeltext missing or illegible when filed kmch, skdeltext missing or illegible when filed kmch)






text missing or illegible when filed indicates data missing or illegible when filed







Here, for a key pair for the signer, with an input of the security parameter λ, the public key pksig and the private key Sksig are output. For a key pair for the changers, with an input of the security parameter λ, the public key pksan and the private key sksan are output. For a key pair for the changers of the delegator, with an input of the security parameter λ, the public key pkdel and the private key skdel are output.


The following table presents a signature algorithm for the signer.











TABLE 2









(Signer) Signature algorithm σ ← DSS.Sign(sksig, pksan, m)










 1.
(hmch, rmch) ← MCH.Hash(pksantext missing or illegible when filed mch, pksantext missing or illegible when filed kmch),




 (hkmch, rkmch) ← KMCH.Hash(pksantext missing or illegible when filed kmch, m)



 2.
s ← S.Sign(sksig, hmch||mFIX||hkmch)









 3. Output σ = (s, rmch, rkmch, FIX) . Here, mFIX ← FIX(m) .








text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the private key sksig for the signer, the public key pksan for the changers, and the plain text m, the signature σ for the plain text m is output.


The following table presents a sanitizable signature algorithm for the changers.











TABLE 3









(Changer) Sanitizable algorithm σ′ ← DSS.Sanit(sksan, m, m′, σ)



 1. r′kmch ← KMCH.Adapt(sksantext missing or illegible when filed kmch, m, m′, rkmch)



 2. σ′ = (s, rmch, r′kmch)








text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the private key sksan for the changers, the plain text m, the plain text m′ after change, and the signature σ for the plain text m, a signature σ′ for the plain text m′ after change is output.


The following table presents a verification algorithm for the verifier.









TABLE 4







(Verifier) Verification algorithm d ∈ {True, False} ← DSS.Verify(pksig,


pksan, m, σ)


 1. hmch ← MCH.ReHash(pksantext missing or illegible when filed mch, pksantext missing or illegible when filed kmch, rmch)


 2. hkmch ← KMCH.ReHash(pksantext missing or illegible when filed kmch, m, rkmch)


 3. mFIX ← FIX(mFULL)


 4. d ← S.Verify(pksig, hmch||mFIX||hkmch)


 5. If d = True . return True . If d = False . return False .






text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the public key pksig for the signer, the public key pksan for the changers, the plain text m, and the signature σ, True is returned when the signature is valid while False is returned when the signature is invalid.


The following table presents a delegation algorithm for the changers.









TABLE 5







(Changer) Delegation algorithm σ′ ← DSS.Delegate(pksan, sksan,


pkdel, σ)


 1. r′mch ← KMCH.Adapt(sksantext missing or illegible when filed kmch, pksantext missing or illegible when filed kmch, pkdeltext missing or illegible when filed kmch, rmch)


 2. σ′ = (s, r′mch, rkmch)






text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the public key pksan for the changers, the private key sksan for the changers, the public key pksan for the changers of the delegator, and the signature σ before delegation, the signature σ′ after delegation is output.


The following table presents a sanitizable signature algorithm for the changers of the delegator.











TABLE 6









(Changer of delegator) Delegator santizable algorithm σ′ ←



DSS.DelSanit(skdel, m, m′, σ)



 1. r′kmch ← KMCH.Adapt(skdeltext missing or illegible when filed kmch, m, m′, rkmch)



 2. σ′ = (s, rmch, r′kmch)








text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the private key skdel for the changers of the delegator the plain text m, the plain text m′ after change, and the signature σ for the plain text m, the signature σ′ for the plain text m′ after change is output.


The following table presents a delegator verification algorithm for the verifier.









TABLE 7







(Verifier) Delegator verification algorithm


    d ∈ {True, False} ← DSS.DelVerify(pksig, pksan, pkdel, m, σ)


 1. hmch ← MCH.ReHash(pksantext missing or illegible when filed mch, pkdeltext missing or illegible when filed kmch, rmch)


 2. hkmch ← KMCH.ReHash(pkdeltext missing or illegible when filed kmch, m, rkmch)


 3. mFIX ← FIX(mFULL)


 4. d ← S.Verify(pksig, hmch||mFIX||hkmch)


 5. If d = True . return True . If d = False . return False .






text missing or illegible when filed indicates data missing or illegible when filed







Here, with inputs of the public key pksig for the signer, the public key pksan for the changers, the public key pkdel for the changers of the delegator, the plain text m, and the signature σ, True is returned when the signature is valid while False is returned when the signature is invalid.


Note that since the KMCH includes the MCH, the MCH may be replaced with the KMCH.


2.4. Hardware Configuration


FIG. 6 is a schematic block diagram illustrating an example of a hardware configuration of a computer according to the present example embodiment. The computer illustrated in FIG. 6 may operate as each of the apparatuses configuring the signature verification system according to the present example embodiment.


A computer 600 includes a CPU 601, a main storage apparatus 602, an auxiliary storage apparatus 603, an interface 604, and a communication interface 605.


Operations of the computer 600 are stored in the auxiliary storage apparatus 603 in a form of program. The CPU 601 reads the program from the auxiliary storage apparatus 603 and develops the program to the main storage apparatus 602, and performs, according to the program, operations of each of the apparatuses described in the present example embodiment.


The auxiliary storage apparatus 603 is an example of a non-transitory tangible medium. Other examples of the non-transitory tangible medium include a magnetic disk, a magneto-optical disk, a compact disk read only memory (CD-ROM), a digital versatile disk read only memory (DVD-ROM), and a semiconductor memory connected via the interface 604. When the program is distributed to the computer 600 through a communication line, the computer 600 that has received the distribution may develop the program to the main storage apparatus 602 and operate according to the program.


Part or all of the constituent elements of each of the apparatuses may be implemented with general-purpose or dedicated circuitry, processor, or the like, or a combination of these. These may be configured of a single chip or may be configured of a plurality of chips connected via a bus. Part or all of the constituent elements may be implemented with a combination of the circuitry or the like and the program described above.


2.5. Description of Effects

According to the present example embodiment, it is possible to delegate the capability of changing data without increasing a signature size and computation cost for verification.


3. SECOND EXAMPLE EMBODIMENT

Next, a description will be given of a second example embodiment of the present invention with reference to FIG. 7. The above-described first example embodiment is a concrete example embodiment, whereas the second example embodiment is a more generalized example embodiment.


3.1. System Configuration


FIG. 7 is a functional block diagram illustrating an example of a concrete configuration of a signature verification system according to the second example embodiment. A signature verification system 700 according to the present example embodiment includes a signature apparatus 710, a changing apparatus 720, a delegator changing apparatus 730, and a verifying apparatus 740. Note that the number of signature apparatuses 710, the number of changing apparatuses 720, the number of delegator changing apparatuses 730, and the number of verifying apparatuses 740 are not limited to the numbers illustrated in FIG. 7. The signature apparatus 710, the changing apparatus 720, the delegator changing apparatus 730, and the verifying apparatus 740 may be connected to each other via a communication network.


The signature apparatus 710 includes a signature section 711. The signature section 711 signs a first chameleon hash value calculated using a public key for changers of data and a temporary public key for changers of a delegator, to which change of the data is delegated, an unmodifiable part of the data, and a second chameleon hash value for an entirety of the data calculated using the public key for the changers.


The changing apparatus 720 includes a delegator designating section 721. The delegator designating section 721 receives the signed data after signing and changes a temporary public key for the changers of the delegator to a public key for changers of an actual delegator, using a private key for the changers.


The delegator changing apparatus 730 includes a data changing section 731. The data changing section 731 receives the signed data designated the changers of the actual delegator and changes a modifiable part of the data, using a private key for the changers of the actual delegator.


The verifying apparatus 740 includes a verifying section 741. The verifying section 741 receives the signed data with the changed modifiable part of the data and verifies the signature, using the public key for the changers and the public key for the changers of the actual delegator.


Each of the processing sections of the apparatuses described above is implemented with a central processing unit (CPU) of a computer configured to operate according to a program and a communication interface of the computer, for example. For example, the CPU reads the program from a program recording medium, such as a program storage apparatus of the computer, and uses, as necessary, the communication interface to operate as each of the processing sections of the apparatuses described above according to the program.


3.2. Operation Example

Next, an operation example according to the second example embodiment will be described.


According to the second example embodiment, the signature apparatus 710 (signature section 711) signs a first chameleon hash value calculated using a public key for changers of data and a temporary public key for changers of a delegator, to which change of the data is delegated, an unmodifiable part of the data, and a second chameleon hash value for an entirety of the data calculated using the public key for the changers. The changing apparatus 720 (delegator designating section 721) receives the signed data after signing and changes a temporary public key for the changers of the delegator to a public key for changers of an actual delegator, using a private key for the changers. The delegator changing apparatus 730 (data changing section 731) receives the signed data designated the changers of the actual delegator and changes a modifiable part of the data, using a private key for the changers of the actual delegator. The verifying apparatus 740 (verifying section 741) receives the signed data with the changed modifiable part of the data and verifies the signature, using the public key for the changers and the public key for the changers of the actual delegator.


Relationship with First Example Embodiment

As an example, the signature apparatus 710, the changing apparatus 720, the delegator changing apparatus 730, and the verifying apparatus 740 according to the second example embodiment are the signature apparatus 120, the changing apparatus 130, the delegator changing apparatus 140, and the verifying apparatus 150 according to the first example embodiment, respectively. In this case, the descriptions of the first example embodiment may also be applicable to the second example embodiment.


Note that the second example embodiment is not limited to this example.


3.3. Description of Effects

According to the second example embodiment, it is possible to delegate the capability of changing data without increasing a signature size and computation cost for verification.


4. OTHER EXAMPLE EMBODIMENTS

Note that the present invention is not limited to the example embodiments described above. It should be understood by those of ordinary skill in the art that the example embodiments described above are merely examples and that various alterations are possible without departing from the scope and the spirit of the present invention.


For example, the kinds of processing described in the Specification may not necessarily be executed in time series in the order described above. For example, the kinds of processing may be executed in an order different from that described above or may be executed in parallel. Some of the kinds of processing may not necessarily be performed, or more kinds of processing may be added.


An apparatus including constituent elements of the signature verification system described in the Specification (e.g., one or more apparatuses (or units) among a plurality of apparatuses (or units) constituting the signature verification system or a module for one of the plurality of apparatuses (or units)) may be provided. Moreover, methods including processing of the constituent elements may be provided, and programs for causing a processor to execute processing of the constituent elements may be provided. Moreover, non-transitory computer readable recording media (non-transitory computer readable media) having recorded thereon the programs may be provided. It is apparent that such apparatuses, modules, methods, programs, and non-transitory computer readable recording media are also included in the present invention.


The example embodiments of the present invention can be described as, but not limited to, the following supplementary notes.


(Supplementary Note 1)


A signature verification system including:


a signature apparatus configured to sign a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers;


a changing apparatus configured to receive the signed data, and to change the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers;


a delegator changing apparatus configured to receive the signed data designated the changers of the actual delegator, and to change a modifiable part of the data, using a private key for the changers of the actual delegator; and


a verifying apparatus configured to receive the signed data with the changed modifiable part of the data, and to verify the signature using the public key for the changers and the public key for the changers of the actual delegator.


(Supplementary Note 2)


The signature verification system according to supplementary note 1, wherein the changing apparatus is configured to replace a random number used for calculation of the first chameleon hash value, with a random number corresponding to the public key for the changers of the actual delegator.


(Supplementary Note 3)


The signature verification system according to supplementary note 1 or 2, wherein the delegator changing apparatus is configured to replace a random number used for calculation of the second chameleon hash value, with a random number calculated using the private key for the changers of the actual delegator and corresponding to the changed data.


(Supplementary Note 4)


The signature verification system according to any one of supplementary notes 1 to 3, wherein the verifying apparatus is configured to regenerate the first chameleon hash value, using the public key for the changers, the public key for the changers of the actual delegator, and the random number corresponding to the public key for the changers of the actual delegator, to regenerate the second chameleon hash value, using the changed data, the public key for the changers of the actual delegator, and the random number for the changed data, and to verify the signature, using the regenerated first chameleon hash value, the unmodifiable part of the data, the second chameleon hash value, and a public key for a signer.


(Supplementary Note 5)


The signature verification system according to any one of supplementary notes 1 to 4, wherein the changing apparatus is configured to change the modifiable part of the data, using the private key for the changers.


(Supplementary Note 6)


The signature verification system according to any one of supplementary notes 1 to 5, wherein the signature apparatus is configured to calculate the first chameleon hash value, using the public key for the changers, as the public key for the changers of the temporary delegator.


(Supplementary Note 7)


A signature apparatus configured to sign a first chameleon hash value calculated using a public key for changers of data and a public key for changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value for an entirety of the data calculated using the public key for the changers.


(Supplementary Note 8)


A signature verification method including:


a signature step of signing a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers;


a first changing step of receiving the signed data, and changing the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers;


a second changing step of receiving the signed data designated the changers of the actual delegator, and changing a modifiable part of the data, using a private key for the changers of the actual delegator; and


a verifying step of receiving the signed data with the changed modifiable part of the data, and verifying the signature using the public key for the changers and the public key for the changers of the actual delegator.


(Supplementary Note 9)


A program for causing a computer to execute the signature verification method according to supplementary note 8.


INDUSTRIAL APPLICABILITY

The present invention can be preferably applied to a signature verification system using a sanitizable signature possible to designate changers of a delegator of data.


REFERENCE SIGNS LIST




  • 100 Signature Verification System


  • 110 Key Generating Apparatus


  • 111 Key Generating Section


  • 112 Key Providing Section


  • 120 Signature Apparatus


  • 121 Data Generating Section


  • 122 Signature Section


  • 123 Data Transmitting Section


  • 130 Changing Apparatus


  • 131 Data Changing Section


  • 132 Signature Section


  • 133 Delegator Designating Section


  • 134 Data Transmitting Section


  • 150 Verifying Apparatus


  • 151 Verifying Section


Claims
  • 1. A signature verification system comprising: a signature apparatus comprising a memory storing instructions and one or more processors configured to execute the instructions to sign a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers;a changing apparatus comprising a memory storing instructions and one or more processors configured to execute the instructions to receive the signed data, and to change the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers;a delegator changing apparatus comprising a memory storing instructions and one or more processors configured to execute the instructions to receive the signed data designated the changers of the actual delegator, and to change a modifiable part of the data, using a private key for the changers of the actual delegator; anda verifying apparatus comprising a memory storing instructions and one or more processors configured to execute the instructions to receive the signed data with the changed modifiable part of the data, and to verify the signature using the public key for the changers and the public key for the changers of the actual delegator.
  • 2. The signature verification system according to claim 1, wherein the changing apparatus is configured to replace a random number used for calculation of the first chameleon hash value, with a random number corresponding to the public key for the changers of the actual delegator.
  • 3. The signature verification system according to claim 1, wherein the delegator changing apparatus is configured to replace a random number used for calculation of the second chameleon hash value, with a random number calculated using the private key for the changers of the actual delegator and corresponding to the changed data.
  • 4. The signature verification system according to claim 1, wherein the verifying apparatus is configured to regenerate the first chameleon hash value, using the public key for the changers, the public key for the changers of the actual delegator, and the random number corresponding to the public key for the changers of the actual delegator, to regenerate the second chameleon hash value, using the changed data, the public key for the changers of the actual delegator, and the random number for the changed data, and to verify the signature, using the regenerated first chameleon hash value, the unmodifiable part of the data, the second chameleon hash value, and a public key for a signer.
  • 5. The signature verification system according to claim 1, wherein the changing apparatus is configured to change the modifiable part of the data, using the private key for the changers.
  • 6. The signature verification system according to claim 1, wherein the signature apparatus is configured to calculate the first chameleon hash value, using the public key for the changers, as the public key for the changers of the temporary delegator.
  • 7. A signature apparatus comprising: a memory storing instructions; andone or more processors configured to execute the instructions to sign a first chameleon hash value calculated using a public key for changers of data and a public key for changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value for an entirety of the data calculated using the public key for the changers.
  • 8. A signature verification method comprising: a signature step of signing a first chameleon hash value calculated using a public key for changers of data and a public key for the changers of a temporary delegator of the data, an unmodifiable part of the data, and a second chameleon hash value of an entirety of the data calculated using the public key for the changers;a first changing step of receiving the signed data, and changing the public key for the changers of the temporary delegator to a public key for changers of an actual delegator, using a private key for the changers;a second changing step of receiving the signed data designated the changers of the actual delegator, and changing a modifiable part of the data, using a private key for the changers of the actual delegator; anda verifying step of receiving the signed data with the changed modifiable part of the data, and verifying the signature using the public key for the changers and the public key for the changers of the actual delegator.
  • 9. A non-transitory computer readable recording medium storing a program for causing a computer to execute the signature verification method according to claim 8.
PCT Information
Filing Document Filing Date Country Kind
PCT/JP2020/021825 6/2/2020 WO