Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
認証子生成装置、検証装置、およびプログラム
Document Type and Number:
Japanese Patent JP5871826
Kind Code:
B2
Abstract:
PROBLEM TO BE SOLVED: To provide a message authenticator technique in which safety to a related key attack is improved without being self-destructed.SOLUTION: When a message authenticator is generated, a message authenticator generation device 130 acquires label information corresponding to the information including a corresponding key and a message and acquires a message authenticator which includes an image to a random number corresponding value, a secret key corresponding value, and the label information, and the random number corresponding value. However, the secret key and the corresponding key are a pair of keys, the random number corresponding value corresponds to the information including the random number, and the secret key corresponding value corresponds to the information including the secret key. At the time of verification, a verification device 140 acquires verification label information corresponding to the information including the corresponding key and the message, and verifies the message using the message authenticator, secret key corresponding value, and the verification label information.

Inventors:
Keita Kusagawa
Application Number:
JP2013003625A
Publication Date:
March 01, 2016
Filing Date:
January 11, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
Nippon Telegraph and Telephone Corporation
International Classes:
H04L9/32
Other References:
Bellare, M., Paterson, G. and Thomson, S.,RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures,Cryptology ePrint Archive,[online],2012年 9月,Report 2012/514,[2015年10月26日検索],URL,https://eprint.iacr.org/2012/514/20120905:205131
Wee, H.,Public Key Encryption against Related Key Attacks,Lecture Notes in Computer Science,2012年 5月,Vol,7293,p.262-279
Dodi Y. et al.,Message Authentication, Revisited,Lecture Notes in Computer Science,2012年 4月,Vol.7237,p.355-374
Applebaum, B., Harnik, D. and Ishai, Y.,Semantic Security Under Related-Key Attacks and Applications,Cryptology ePrint Archive,[online],2010年10月,Report 2010/544,[2015年10月26日検索],URL,https://eprint.iacr.org/2010/544
Bellare, M. and Cash, D.,Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks,Lecture Notes in Computer Science,2010年 8月,Vol.6223,p.666-684
Attorney, Agent or Firm:
Naoki Nakao
Yukio Nakamura
Yoshimura Munehiro