摘要 |
PROBLEM TO BE SOLVED: To make it clear when and who shares asymmetrical private key corresponding to an interaction key by verifying the relation between information and a public key (interaction key) which are transmitted and received in a key shared protocol. SOLUTION: A plurality of user terminals (Alice and Bob) are provided and the asymmetrical shared key CK is secretly shared by using the key shared protocol Z. A center (Charley), which is an observer, calculates, by using an algorithmα, a group public key (interaction key IK) corresponding to the secretly shared asymmetrical shared key CK from intercepted communication (interaction sentence IM) between the terminals. At the point in time when the asymmetrical shared key CK is secretly shared, the interaction key IK is also already becomes calculable and a real time nature is guaranteed. The relation between the information to be transmitted and received by using the key shared protocol Z and the public key (interaction key) is verified by the center and it is made clear when and who secretly shares the asymmetrical shared key CK corresponding to the interaction key IK. COPYRIGHT: (C)2005,JPO&NCIPI
|