摘要:
Each of the embodiments of the present invention relieves a service provider of the burden of managing personal information. A group administration organization device 10 admits a user device to an authorized group by request and sends authority permission information to the user device 20. The user device 20 holds the authority permission information received from the group administration organization device 10 and, on access, sends authority proof information created from the authority permission information using a group signature scheme to a service provider device 30 as requested by it. The service provider device 30, upon being accessed, requests the authority proof information and verifies the authority proof information received from the user device in accordance with the request on the basis of the group signature scheme. When the verification result indicates validity, the service provider device provides a service. Thus, there is no need for the service provider to manage personal information of the user because the user device proves to the service provider device using the group signature scheme that it belongs to the authorized group.
摘要:
A group administration organization device admits a user device to an authorized group by request and sends authority permission information to the user device. The user device holds the authority permission information received from the group administration organization device and, on access, sends authority proof information created from the authority permission information using a group signature scheme to a service provider device as requested by it. The service provider device, upon being accessed, requests the authority proof information and verifies the authority proof information received from the user device in accordance with the request on the basis of the group signature scheme. When the verification result indicates validity, the service provider device provides a service. Thus, there is no need for the service provider to manage personal information of the user because the user device proves to the service provider device using the group signature scheme that it belongs to the authorized group.
摘要:
A device that relieves a service provider of the burden of managing personal information. A group administration organization device admits a user device to an authorized group by request and sends authority permission information to the user device. The user device holds the authority permission information received from the group administration organization device and, on access, sends authority proof information created from the authority permission information using a group signature scheme to a service provider device as requested by it. The service provider device, upon being accessed, requests the authority proof information and verifies the authority proof information received from the user device in accordance with the request on the basis of the group signature scheme. When the verification result indicates validity, the service provider device provides a service. Thus, there is no need for the service provider to manage personal information of the user because the user device proves to the service provider device using the group signature scheme that it belongs to the authorized group.
摘要:
Each embodiment of this invention implements step-by-step and empirical authentication of devices upon digital authentication among a plurality of devices. Each of a plurality of authentication devices of each embodiment can unidirectionally generate a hash value of a low experience rank from a hash value of a high experience rank, and receives a set of high experience rank and hash value in accordance with an experience. Upon receiving a certification request of the experience rank from another authentication device, the authentication device transmits a corresponding hash value to the authentication device as a request source. Upon sending a certification request of an experience rank to another authentication device, the authentication device verifies a hash value obtained from the other authentication device on the basis of a self hash value. In this way, the authentication devices authenticate each other's experience ranks.
摘要:
Disclosed are an etching solution for a substrate and a substrate-etching method, which can prevent the contamination of a substrate, particularly a semiconductor substrate, with metal impurities. The etching solution comprises a dicarboxylic acid represented by the general formula (1) or a salt thereof and 20% (W/W) or more of an alkali metal hydroxide. The substrate-etching method comprises the step of etching a substrate with said etching solution. (wherein T1 and T2 independently represent a hydrogen atom, a hydroxyl group, a carboxyl group or an alkyl group having 1 to 3 carbon atoms, or T1 and T1 together form a bond; and R1 to R4 independently represent a hydrogen atom, a hydroxyl group, a carboxyl group or an alkyl group having 1 to 3 carbon atoms, provided that, when T1 and T2 do not together form a bond, any two of T1, T2 and R1 to R4 represent a carboxyl group, and any one of the remainder represents a hydroxyl group, and the others independently represent a hydrogen atom or an alkyl group having 1 to 3 carbon atoms, and when T1 and T2 together form a bond, any two of R1 to R4 represent a carboxyl group, and the others independently represent a hydrogen atom or an alkyl group having 1 to 3 carbon atoms.)
摘要:
On a recording medium, first information obtained by enciphering data with the first key and second information obtained by enciphering the first key with each of the predetermined second keys are recorded. A deciphering method is characterized by comprising the steps of inputting the first and second information, deciphering the first key using at least one of the second keys, determining by a specific method that the obtained first key is correct, and then deciphering the data using the first key to obtain the data.
摘要:
A source of MPEG2 video data is connected with a dedicated AV device or personal computer by means of an IEEE 1394 interface. A transmission unit in the source has an IEEE 1394 encryption unit and a sending I/F unit. A reception unit varies between the dedicated AV unit and the personal computer. In the reception unit of the dedicated AV device, a receiving I/F unit and a decryptor are integrally incorporated into one semiconductor chip and an MPEG2 decoder is incorporated into one semiconductor chip. In the reception unit of the personal computer, the receiving I/F unit is formed of one semiconductor chip, and the decryptor connected to the I/F unit through a bus, and the MPEG2 decoder are formed of one semiconductor chip. Thus, data before decryption will not appear on the bus, which prevents MPEG2 video data from being taken out of the computer for illegal copying purposes. In addition, the reception unit is made to have a different physical configuration depending on whether it is to be mounted in the dedicated AV device or the personal computer. This will prevent the reception unit (including the decryptor) of the dedicated AV device from being connected in the personal computer in place of its associated reception unit (excluding the decryptor).
摘要:
A semiconductor integrated circuit for cryptographic process according to the present invention, comprises a randomizing unit for randomizing first input data which is one of two divided parts of input data based on configuration information to identify an algorithm in randomizing process, a function F portion for receiving data which have been subjected to the randomizing process and then applying coding process to the data, and an exclusive logical sum circuit for receiving second input data which is other of two divided parts of the input data and output data from the function F portion and then outputting an exclusive logical sum of the second input data and the output data.
摘要:
A purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including an order ID and zero knowledge proving information that a purchaser knows the purchaser identity proving secret information, from a purchaser apparatus to a shop apparatus. A shop apparatus verifies the zero knowledge proving information, based on purchaser identity verifying information retrieved from an order ID included in the request. Therefore, the unlinkability for past use is eliminated if necessary, and inconvenience caused by the unlinkability is eliminated.
摘要:
A secret sharing apparatus according to the present invention is based on a (k,n)-threshold scheme with a threshold of at least 4. The secret sharing apparatus generates a generator matrix (G) of GF(2) in which any k of n column vectors are at a full rank, divides secret information into n−1 pieces to generate divided secret data (K(1), . . . , K(n−1)), generates random data (U(0,1), . . . , U(k−2,n−1)), calculates the product of matrixes of the divided secret data, the random data, and the generator matrix (G), assigns the j×(n−1)+ith column of the calculation result to sharing partial data (D(j,i)) to calculate sharing partial data (D(j,1)), generates header information (H(j)), and individually distributes n pieces of sharing information (D(0), . . . , D(n−1)) made up of the header information (H(j)) and sharing partial data (D(j,i)) to n storage apparatuses.
摘要翻译:根据本发明的秘密共享装置基于具有至少4的阈值的(k,n)阈值方案。秘密共享装置生成GF(2)的生成矩阵(G),其中任何k n个列向量处于满秩,将秘密信息划分为n-1个部分,以产生分割的秘密数据(K(1),...,K(n-1)),生成随机数据(U(0,1) ,...,U(k-2,n-1))计算分割的秘密数据,随机数据和生成矩阵(G)的矩阵的乘积,分配jx(n-1)+ i 计算结果的列以共享部分数据(D(j,i))以计算共享部分数据(D(j,1)),生成头信息(H(j)),并且分别分配n个共享信息 (H(j))和共享部分数据(D(j,i))组成的D(0),...,D(n-1))。