首页>
外国专利>
PROXY RE-ENCRYPTION SYSTEM, TRANSFER INFORMATION GENERATION DEVICE, TRANSFERRED INFORMATION GENERATION DEVICE, CONVERSION KEY GENERATION DEVICE, CIPHERTEXT CONVERSION DEVICE, PROXY RE-ENCRYPTION METHOD, AND PROGRAM THEREOF
PROXY RE-ENCRYPTION SYSTEM, TRANSFER INFORMATION GENERATION DEVICE, TRANSFERRED INFORMATION GENERATION DEVICE, CONVERSION KEY GENERATION DEVICE, CIPHERTEXT CONVERSION DEVICE, PROXY RE-ENCRYPTION METHOD, AND PROGRAM THEREOF
PROBLEM TO BE SOLVED: To provide a high-safety system which is free of leakage of a conversion key as a proxy re-encryption system applied to a lattice problem-based public key encryption system.;SOLUTION: A conversion key ((i, Ai, Pi), (j, Aj, Pj), T) is generated by calculating T=C-B from (Ai, Pi, B) and (Aj, Pj, C) obtained by calculating R selected at random from a public key (Ai, Pi) and a secret key Si of a user (i) as a decryption authority transferrer, and a public key (Aj,Pj) and secret keys Sj and Zqng of a user (j) as a decryption authority transferee, and B=R+Si and C=Sj+R. Then ci'=ci-uiT is calculated from a ciphertext Ci=(ui, ci) encrypted with the public key (Ai, Pi) of the user (i) using the conversion key, a mask ciphertext Cj'=(uj', cj') is calculated, uj=ui+uj' and cj=ci'+cj' are calculated, and (uj, cj) is output as a ciphertext Cj for the user (j).;COPYRIGHT: (C)2012,JPO&INPIT
展开▼
机译:要解决的问题:提供一种高安全性的系统,作为用于基于格网问题的公钥加密系统的代理重新加密系统,不会泄漏任何转换密钥;解决方案:转换密钥(( A i Sub>,P i Sub>),(j,A j Sub>,P j Sub>),T)由以下生成根据(A i Sub>,P i Sub>,B)和(A j Sub>,P j Sub>计算T = CB, C)通过计算从用户的公钥(A i Sub>,P i Sub>)和秘密密钥S i Sub>中随机选择的R来获得(i)作为解密授权转移者,以及公共密钥(A j Sub>,P j Sub>)和秘密密钥S j Sub>和Z q Sub> ng Sup>作为解密授权受让人,并且B = R + S i Sub>和C = S j 子> + R。然后根据密文C i Sub> =(u <来计算c i Sub>'= c i Sub> -u i Sub> T用用户(i)的公钥(A i Sub>,P i Sub>)加密的Sub> i Sub>,c i Sub>)使用转换密钥,计算掩码密文C j Sub>'=(u j Sub>',c j Sub>'),u j Sub> = u i Sub> + u j Sub>'和c j Sub> = c i Sub>'+ c j Sub>',并为用户输出(u j Sub>,c j Sub>)作为密文C j Sub>( j).;版权:(C)2012,JPO&INPIT
展开▼