发明名称 KEY SHARING METHOD, FIRST DEVICE, SECOND DEVICE, AND THEIR PROGRA
摘要 PROBLEM TO BE SOLVED: To provide a key sharing technique that has efficiency equal to that of a conventional system and is CCA-safe (also safe for an active attack) in a standard model (a model for fixing a hash function to a concrete function). SOLUTION: A second device selects a random integer (r), performs an operation of C1=g1<SP>r</SP>, C2=g2<SP>r</SP>, d=H(z, w, C1, C2),σ=z<SP>r</SP>×w<SP>r×d</SP>, and calculates a key K=F<SB>σ</SB>(g1, g2, z, w, C1, C2). C1, C2 are transmitted to a first device. The first device performs an operation of d=H(z, w, C1, C2),σ=C1<SP>(x1+d×y1)</SP>×C2<SP>(x2+d×y2)</SP>, and calculates the key K=F<SB>σ</SB>(g1, g2, z, w, C1, C2). COPYRIGHT: (C)2009,JPO&INPIT
申请公布号 JP2009130871(A) 申请公布日期 2009.06.11
申请号 JP20070306737 申请日期 2007.11.28
申请人 NIPPON TELEGR & TELEPH CORP <NTT> 发明人 OKAMOTO TATSUAKI
分类号 H04L9/08;G09C1/00 主分类号 H04L9/08
代理机构 代理人
主权项
地址