OWNER IDENTITY CONFIRMATION SYSTEM AND OWNER IDENTITY CONFIRMATION METHOD
20220272087 · 2022-08-25
Inventors
Cpc classification
H04L63/0442
ELECTRICITY
H04L9/3263
ELECTRICITY
H04L9/3234
ELECTRICITY
H04L9/088
ELECTRICITY
H04L63/0876
ELECTRICITY
International classification
H04L9/00
ELECTRICITY
H04L9/08
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
The owner sameness confirmation system determines whether or not the owners of two terminals (200A, 200B) are the same. Authentication station servers (100A, 100B) store electronic certificates issued to the terminals and identity confirmation information of the owners of the terminals in association with each other. The terminal (200B) transmits information obtained by encrypting the identity confirmation information of the owner of the terminal (200B) through homomorphic encryption and the electronic certificate of the partner terminal (200A) to the authentication station server (100A). The authentication station server (100A) transmits response encrypted information including information obtained by encrypting the identity confirmation information of the owner of the terminal (200A) as a response. The terminal (200B) decrypts the response encrypted information and determines the sameness of the owners based on whether or not the decryption result matches a predetermined value.
Claims
1. An owner sameness confirmation system including a plurality of terminals and a plurality of authentication station servers, wherein each of the terminals includes: a first storage unit configured to store identity confirmation information of an owner of the terminal; and a confirmation request unit, including one or more processors, configured to transmit a confirmation request message including encrypted information obtained by encrypting the identity confirmation information of the owner of the terminal using a public key for homomorphic encryption, an electronic certificate of a partner terminal that is a target of owner sameness confirmation, and the public key, to an authentication station server that issued the electronic certificate to the partner terminal, the authentication station server that issued the electronic certificate to the partner terminal includes: a second storage unit configured to store the electronic certificate issued to the partner terminal and identity confirmation information of an owner of the partner terminal in association with each other; and a confirmation response unit, including one or more processors, configured to, upon receiving the confirmation request message, acquire the identity confirmation information of the owner of the partner terminal from the electronic certificate of the partner terminal, and transmit a confirmation response message including response encrypted information, which is the result of calculating an encrypted text obtained by encrypting the identity confirmation information using the public key and the encrypted information through computation corresponding to the homomorphic encryption, as a response to the terminal, and each of the terminals further includes a sameness determination unit, including one or more processors, configured to decrypt the response encrypted information, and determine whether or not the identity confirmation information of the owner of the terminal and the identity confirmation information of the owner of the partner terminal match each other based on whether or not the decryption result matches a predetermined value.
2. The owner sameness confirmation system according to claim 1, wherein the identity confirmation information is constituted by one or more items, the confirmation request unit is configured to calculate the encrypted information by encrypting the identity confirmation information for an item for confirming the sameness using the public key, the item being selected from among the one or more items, and transmits the item in a state of being included in the confirmation request message, the confirmation response unit is configured to generate the encrypted text obtained by encrypting the identity confirmation information for the item of the owner of the partner terminal using the public key, calculate the response encrypted information, and transmit the calculated response encrypted information as a response, and the sameness determination unit is configured to decrypt the response encrypted information and determines whether or not the identity confirmation information for the item of the owner of the terminal and the identity confirmation information for the item of the owner of the partner terminal match each other based on whether or not the decryption result matches the predetermined value.
3. The owner sameness confirmation system according to claim 1, wherein E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1+M2) is satisfied for unencrypted texts M1 and M2, the confirmation request unit is configured to transmit E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal, the confirmation response unit is configured to generate a random number r for identity confirmation information V2 of the owner of the partner terminal and transmits E(V1)r×E(V2)−r as the response encrypted information as a response, and the sameness determination unit is configured to determine whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 0, which is the predetermined value.
4. The owner sameness confirmation system according to claim 1, wherein E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1×M2) is satisfied for unencrypted texts M1 and M2, the confirmation request unit is configured to transmit E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal, the confirmation response unit is configured to generate a random number r for identity confirmation information V2 of the owner of the partner terminal and transmit E(V1)r×E(V2)−r as the response encrypted information as a response, and the sameness determination unit is configured to determine whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 1, which is the predetermined value.
5. The owner sameness confirmation system according to claim 1, wherein the confirmation request unit is configured to transmit the confirmation request message via the partner terminal to the authentication station server that issued the electronic certificate to the partner terminal, and the confirmation response unit is configured to transmit the confirmation response message via the partner terminal to the terminal.
6. The owner sameness confirmation system according to claim 1, wherein a value of a key owner included in the electronic certificate issued to the terminal is identification information of the terminal that is unrelated to the identity confirmation information of the owner of the terminal.
7. The owner sameness confirmation system according to claim 1, wherein the confirmation request message transmitted by the terminal is signed using at least any one of a secret key corresponding to the electronic certificate and a secret key corresponding to a model number electronic certificate indicating a model number of the terminal.
8. An owner sameness confirmation method for an owner sameness confirmation system including a plurality of terminals and a plurality of authentication station servers, wherein each of the terminals includes a first storage unit configured to store identity confirmation information of an owner of the terminal, the method comprises: transmitting, by the terminal, a confirmation request message including encrypted information obtained by encrypting the identity confirmation information of the owner of the terminal using a public key for homomorphic encryption, an electronic certificate of a partner terminal that is a target of owner sameness confirmation, and the public key, to an authentication station server that issued the electronic certificate to the partner terminal, the authentication station server that issued the electronic certificate to the partner terminal includes a second storage unit configured to store the electronic certificate issued to the partner terminal and identity confirmation information of an owner of the partner terminal in association with each other, and the method further comprises: executing, by the authentication station server, upon receiving the confirmation request message, acquiring the identity confirmation information of the owner of the partner terminal from the electronic certificate of the partner terminal, and transmitting a confirmation response message including response encrypted information, which is the result of calculating an encrypted text obtained by encrypting the identity confirmation information using the public key and the encrypted information through computation corresponding to the homomorphic encryption, as a response to the terminal, and decrypting, by the terminal, the response encrypted information, and determining whether or not the identity confirmation information of the owner of the terminal and the identity confirmation information of the owner of the partner terminal match each other based on whether or not the decryption result matches a predetermined value.
9. The owner sameness confirmation method according to claim 8, wherein the identity confirmation information is constituted by one or more items, and the method further comprises: calculating, by the terminal, the encrypted information by encrypting the identity confirmation information for an item for confirming the sameness using the public key, the item being selected from among the one or more items, and transmits the item in a state of being included in the confirmation request message, generating, by the authentication station server, the encrypted text obtained by encrypting the identity confirmation information for the item of the owner of the partner terminal using the public key, calculates the response encrypted information, and transmits the calculated response encrypted information as a response, and decrypting, by the terminal, the response encrypted information and determines whether or not the identity confirmation information for the item of the owner of the terminal and the identity confirmation information for the item of the owner of the partner terminal match each other based on whether or not the decryption result matches the predetermined value.
10. The owner sameness confirmation method according to claim 8, wherein E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1+M2) is satisfied for unencrypted texts M1 and M2, and the method further comprises: transmitting, by the terminal, E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal, generating, by the authentication station server, a random number r for identity confirmation information V2 of the owner of the partner terminal and transmits E(V1)r×E(V2)−r as the response encrypted information as a response, and determining, by the terminal whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 0, which is the predetermined value.
11. The owner sameness confirmation method according to claim 8, wherein E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1×M2) is satisfied for unencrypted texts M1 and M2, and the method further comprises: transmitting, by the terminal, E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal, generating, by the authentication station server, a random number r for identity confirmation information V2 of the owner of the partner terminal and transmits E(V1)r×E(V2)−r as the response encrypted information as a response, and determining, by the terminal, whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 1, which is the predetermined value.
12. The owner sameness confirmation method according to claim 8, further comprises: transmitting, by the terminal, the confirmation request message via the partner terminal to the authentication station server that issued the electronic certificate to the partner terminal, and transmitting, by the authentication station server, the confirmation response message via the partner terminal to the terminal.
13. The owner sameness confirmation method according to claim 8, wherein a value of a key owner included in the electronic certificate issued to the terminal is identification information of the terminal that is unrelated to the identity confirmation information of the owner of the terminal.
14. The owner sameness confirmation method according to claim 8, wherein the confirmation request message transmitted by the terminal is signed using at least any one of a secret key corresponding to the electronic certificate and a secret key corresponding to a model number electronic certificate indicating a model number of the terminal.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
DESCRIPTION OF EMBODIMENTS
[0024] Hereinafter, an owner sameness confirmation system for confirming the sameness of an owner of a terminal according to a mode for carrying out the present invention (embodiment) will be described. The owner sameness confirmation system is constituted by including a terminal and an authentication station server for issuing an electronic certificate (also written simply as “certificate”) to the terminal. The authentication station server holds identity confirmation information that was referenced in owner confirmation performed when the electronic certification was issued to the terminal. The terminal also stores the identity confirmation information of the owner of the terminal.
[0025] There are two types of electronic certification, namely an owner electronic certification and a one-time electronic certification. First, the identity confirmation information of the user of the terminal is confirmed, and the authentication station server issues an owner electronic certificate to the terminal and stores the owner electronic certificate in association with the identity confirmation information.
[0026] When the sameness between the owner of the terminal and the owner of another terminal (partner terminal) is to be confirmed, the terminal requests issuance of the one-time electronic certificate to the authentication station server that issued the owner electronic certificate (the authentication station server of the terminal). The issuance request is signed with a secret key corresponding to the owner electronic certificate. The authentication station server issues the one-time electronic certificate to the terminal and stores the one-time electronic certificate in association with the owner electronic certificate, and consequently, in association with the identity confirmation information.
[0027] With the owner sameness confirmation system, the terminal and the authentication station server of the partner terminal determine whether or not the owners of the terminal and the partner terminal are the same. In the determination, the terminal transmits encrypted information obtained by encrypting the identity confirmation information held by the terminal through homomorphic encryption to the authentication station server of the partner terminal via the partner terminal. Upon receiving the encrypted information, the authentication station server of the partner terminal encrypts the identity confirmation information of the partner terminal held by the authentication station server through homomorphic encryption and transmits a response encrypted information obtained by multiplying together the encrypted identity confirmation information and the received encrypted information as a response to the terminal via the partner terminal. The terminal decrypts the received data, and if it matches a predetermined value, the terminal determines that the identity confirmation information held by the terminal and the identity confirmation information of the partner terminal held by the authentication station server of the partner terminal are the same, and determines that the owners of the terminals are the same. Since the identity confirmation information is compared while encrypted through homomorphic encryption, the identity confirmation information does not leak out between the terminal and the authentication station server.
[0028] Overall Configuration of Owner Sameness Confirmation System
[0029]
[0030] Hardware Configuration of Authentication Station Server
[0031] The NIC 105 is connected to the network 900. A display and a user interface apparatus 198 (written as “UI (User Interface) apparatus” in
[0032] Functional Configuration of Authentication Station Server
[0033]
[0034] Electronic Certificate Database of Authentication Station Server
[0035]
[0036] The identification information 131 is identification information of the electronic certificate (e.g., a serial number included in the electronic certificate). The type 132 is the type of the electronic certificate. The type 132 includes “owner”, which indicates an owner electronic certificate issued to the terminal 200 after the owner was confirmed, “one-time”, which indicates an electronic certificate issued temporarily to a terminal in order to confirm the sameness of the user, and the like. The key owner 133 is the issuance destination of the electronic certificate and indicates the owner (Subject field of the electronic certificate) of the key pair (secret key and public key). The related certificate 134 is the identification information 131 of a related electronic certificate. A related electronic certificate is, for example, an owner electronic certificate of the terminal that is the issuance destination of the one-time electronic certificate in the one-time electronic certificate.
[0037] The identity confirmation information 135 is identity confirmation information that was confirmed when the owner electronic certificate was issued. Information indicated in a residence certificate, a driver's license, or the like is an example of the identity confirmation information, and the identity confirmation information 135 includes data (image data, electronic data) of the identity confirmation information, an address, a name, a driver's license number, or information for accessing the identity confirmation information. The electronic certificate 136 is electronic certificate data issued by the authentication station server 100. Note that in addition to the public key (Subject Public Key Info field of the electronic certificate), the electronic certificate includes a key owner 133 (Subject field), identification information (Issuer field) of the authentication station that performed issuance, a validity period (Validity field), a serial number (Serial Number field), and the like.
[0038] The record 138 is a record of the owner certificate whose identification information 131 is “38473857”, the key owner 133 is the name of the owner, and the address of the owner is included as the identity confirmation information 135. The record 139 is a record of the one-time electronic certificate whose identification information 131 is “84736401”, and is related to the electronic certificate indicated in the record 138. Specifically, the electronic certificate of the record 139 is a one-time electronic certificate that was issued to the terminal, which is the issuance destination of the electronic certificate of the record 138. The record 139 of the one-time electronic certificate does not include the identity confirmation information in the identity confirmation information 135, but the authentication station server 100 can acquire the identity confirmation information from the identity confirmation information 135 of the record 138 of the owner electronic certificate indicated in the related certificate 134.
[0039] Control Unit of Authentication Station Server Returning to
[0040] The electronic certificate issuance unit 111 issues an electronic certificate in response to a request from the terminal 200 (see
[0041] The confirmation reception unit 112 receives a terminal-issued confirmation request start message (see step S401 in
[0042] From the terminal 200, the confirmation response unit 113 receives a confirmation request transfer message (see step S411 in
[0043] Hardware Configuration of Terminal
[0044]
[0045] Functional Configuration of Terminal
[0046]
[0047] The input/output unit 250 is constituted by including an NIC 205, an input/output interface 206, and a media drive 207 (see
[0048] The control unit 210 is constituted by including an electronic certificate request unit 211, a terminal authentication unit 212, a confirmation request start unit 213, a confirmation request start response unit 214, a confirmation request unit 215, a confirmation request transfer unit 216, a confirmation response transfer unit 217, and a sameness determination unit 218.
[0049] The electronic certificate request unit 211 requests issuance of the electronic certificate to the authentication station server 100.
[0050] The terminal authentication unit 212 authenticates the partner terminal 200 for which the sameness of the owner is to be confirmed, and decides on the identity confirmation information for confirming the sameness of the owners of the terminal 200 and the partner terminal 200 in order to confirm the owner sameness.
[0051] The identity confirmation information for confirming the sameness is an item (type) of the identity confirmation information for confirming that the owners are the same, such as the address, name, or driver's license number. For example, the terminal authentication unit 212 uses an item of the identity confirmation information 222 that is stored in common in both the terminal 200 and the partner terminal 200 as the item for confirming the sameness.
[0052] The confirmation request start unit 213 transmits a later-described terminal-issued confirmation request start message (see step S401 in
[0053] The confirmation request start response unit 214 transmits the random number received from the authentication station server 100 to the partner terminal 200 (see step S405).
[0054] The confirmation request unit 215 transmits a confirmation request message (see step S408) including information (encrypted information) obtained by encrypting the identity confirmation information of the owner stored by the terminal 200 using a public key for homomorphic encryption to the partner terminal 200.
[0055] The confirmation request transfer unit 216 signs the above-described confirmation request message and transfers the signed confirmation request message as a confirmation request transfer message to the authentication station server 100 of the terminal 200 (see step S411 in
[0056] The confirmation response transfer unit 217 signs the confirmation response message (see step S416) transmitted by the authentication station server 100, and transfers the signed confirmation response message as a confirmation response transfer message to the partner terminal (see step S417).
[0057] The sameness determination unit 218 receives the confirmation response transfer message and determines whether or not the owners of the two terminals 200 are the same.
[0058] Symbols
[0059] The symbols to be used in the description will be described before starting the description of the owner sameness confirmation processing.
[0060] I.sub.d.sup.(O) is the owner electronic certificate of a terminal d. The owner electronic certificate is issued by the authentication station server 100 to the terminal 200. The issued owner electronic certificate is stored in the electronic certificate database 130.
[0061] I.sub.d.sup.(P) is the one-time electronic certificate of the terminal d. The one-time electronic certificate is issued by the authentication station server 100 that issued the owner electronic certificate to the terminal 200. The issued one-time electronic certificate is stored in the electronic certificate database 130. The one-time electronic certificate need only be valid during the sameness confirmation processing, and the validity period thereof is shorter than the validity period of the owner electronic certificate.
[0062] I.sub.d.sup.(M) is the model number electronic certificate of the terminal d. The model number electronic certificate is issued by the authentication station server 100 to the terminal 200. The issued model number electronic certificate is stored in the electronic certificate database 130. The authentication station server 100 that issues the model number electronic certificate is not limited to being the same as the authentication station server 100 that issues the owner electronic certificate. There may also be an authentication station server 100 that issues only the model number electronic certificate and does not issue other types of electronic certificate.
[0063] I.sub.d.sup.(C) is the electronic certificate of the authentication station server d. The electronic certificate of the authentication station server 100 is issued by the route authentication station 300 (server of the route authentication station, see
[0064] N.sub.d1,d2 is a random number (nonce) generated from the authentication station d2 to the terminal d1.
[0065] V+W is data obtained by combining data V and data W.
[0066] M.sub.S(M,K) is signed data obtained by signing the data M with the secret key K.
[0067] M.sub.S(M,K1,K2) is double-signed data obtained by signing data M with a secret key K1 and further signing the signed data with a secret key K2.
[0068] Q.sub.d is an issuance request application for the one-time electronic certificate transmitted from the terminal d to the authentication station server 100. Q.sub.d includes a public key that is generated by the terminal d and is included in the one-time electronic certificate.
[0069] S.sub.d.sup.(O) is a secret key corresponding to the owner electronic certificate I.sub.d.sup.(O) of the terminal d.
[0070] S.sub.d.sup.(P) is the secret key corresponding to the one-time electronic certificate I.sub.d of the terminal d.
[0071] S.sub.d.sup.(M) is the secret key corresponding to the model number electronic certificate I.sub.d.sup.(M) of the terminal d.
[0072] S.sub.d.sup.(C) is the secret key corresponding to the electronic certificate I.sub.d.sup.(C) of the authentication station d.
[0073] E.sub.PK is an encryption formula for homomorphic encryption using a public key PK.
[0074] D.sub.SK is a decryption formula for homomorphic encryption using a secret key SK. The pair of the public key PK and the secret key SK is generated by the terminal 200.
[0075] C.sub.d1 is the result (written also as “encrypted information”) of performing encryption using the encryption formula E.sub.PK for homomorphic encryption on the identity confirmation information calculated by the terminal d1. The details of the calculation method for the encryption information C.sub.d1 will be described later.
[0076] C.sub.d2′ is calculated by the authentication station d2 that received the encryption information C.sub.d1. C.sub.d2′ is the result (written also as “response encrypted information”) of calculating the encrypted information C.sub.d1 and the result of performing encryption using the encryption formula E.sub.PK for homomorphic encryption on the identity confirmation information through computation corresponding to homomorphic encryption. Details of the method for calculating the response encrypted information C.sub.d2′ will be described later.
[0077] L.sub.d1,d2 is a list of items of the identity confirmation information for performing owner sameness confirmation between the terminal d1 and the terminal d2.
[0078] Homomorphic Encryption
[0079] The homomorphic encryption E.sub.PK is encryption according to which E.sub.PK(M1+M2) can be calculated based on an encrypted text E.sub.PK(M1) for unencrypted text M1 and an encrypted text E.sub.PK(M2) for unencrypted text M2. Here, + is not limited to addition, and is some kind of binomial computation. For example, with RSA encryption, E.sub.PK(M1)×E.sub.PK(M2)=E.sub.PK(M1×M2) is satisfied. That is, the decrypted product of the encrypted texts is the product of the unencrypted texts. ElGamal encryption is another example.
[0080] Also, in Paillier encryption, E.sub.PK(M1)×E.sub.PK(M2)=E.sub.PK(M1+M2) is satisfied. That is, the decrypted product of the encrypted texts is the sum of the unencrypted texts. Elliptic curve cryptography is another example.
[0081] Hereinafter, a method for calculating the encrypted information C.sub.d1 and the response encrypted information C.sub.d2′ using Paillier encryption will be described. The secret keys for Paillier encryption are a prime number p and a prime number q with the same length. The public key is N=p×q.
[0082] The encryption function is written as E.sub.N, and the decryption function is written as D.sub.p,q.
[0083] The encrypted text for the unencrypted text M generates a random number r and satisfies E.sub.N.sup.(M)=(1+N).sup.M×r.sup.N mod N.sup.2. Hereinafter, description of mod N.sup.2 will be omitted.
[0084] E.sub.N (M1)=(1+N).sup.M1×r.sup.N, and E.sub.N (M2)=(1+N).sup.M2×s.sup.N are satisfied. Here, the random number r and the random number s are random numbers that are generated when an unencrypted text M1 and an unencrypted text M2 are respectively encrypted. Upon doing so,
is satisfied, and therefore Paillier encryption is homomorphic encryption.
[0085] Next, a method for calculating the encrypted information C.sub.d1 and the response encrypted information C.sub.d2′ will be described. Hereinafter, the terminal 200B will be described as generating encrypted information C.sub.d1 and the authentication station server 100A of the partner terminal 200A will be described as generating the response encrypted information C.sub.d2′ (see
[0086] The identity confirmation information stored by the terminal 200B for which sameness is to be confirmed is VB, and the identity confirmation information stored by the authentication station server 100A is VA. Note that the pieces of identity confirmation information VA and VB are pieces of identity confirmation information that correspond to items included in the item list L.sub.d1,d2 of the identity confirmation information.
[0087] Also, it is assumed that the terminal 200B calculates the encrypted information C.sub.B, and the authentication station server 100A that has received the encrypted information C.sub.B and the public key N of the terminal 200B calculates response encrypted information C.sub.CA_A′. The terminal 200B generates a random number r, calculates encrypted information C.sub.B=E.sub.N(VB)=(1+N).sup.VB×r.sup.N, which is the encrypted text of the identity confirmation information VB, and transmits the encrypted information C.sub.B together with the public key N to the authentication station server 100A via the terminal 200A.
[0088] The authentication station server 100A generates a random number s and a random number t and calculates an encrypted text E.sub.N(VA) by encrypting the identity confirmation information VA stored in the authentication station server 100A. Next, the authentication station server 100A calculates the response encrypted information C.sub.CA_A′ as described below based on the encrypted information C.sub.B(=E.sub.N(VB)) and the encrypted text E.sub.N(VA) and transmits the calculated response encrypted information C.sub.CA_A′ to the terminal 200B.
is satisfied, and therefore the result of the terminal 200B encrypting the response encrypted information C.sub.CA_A′ is D.sub.p,q(C.sub.CA_A′)=s(VB−VA). Accordingly, if the decryption result is 0, it can be understood that the pieces of identity confirmation information VB and VA held by the terminal 200B and the authentication station server 100A are the same.
[0089] If the decryption result is not 0, the terminal 200B understands that the identity confirmation information does not match. Since the random number s is the random number generated by the authentication station server 100A and D.sub.p,q(C.sub.CA_A′)=s(VB−VA) is a random number, the terminal 200B cannot obtain the information regarding the identity confirmation information VA and the identity confirmation information VA does not leak out. Conversely, regarding the identity confirmation information VB of the terminal 200B, the authentication station server 100A acquires only the encrypted information C.sub.B that was encrypted, and therefore the information cannot be obtained and the identity confirmation information VB does not leak out. That is, if the identity confirmation information does not match, neither the terminal 200B nor the authentication station server 100A leaks the identity confirmation information to its partner.
[0090] Although the foregoing is an example of sameness confirmation for identity confirmation information using Paillier encryption, it can be similarly carried out also through homomorphic encryption in which the product of the encrypted texts is the encryption of the sum of the unencrypted texts. E.sub.PK is homomorphic encryption in which E.sub.PK(M1)×E.sub.PK(M2)=E.sub.PK(M1+M2) is satisfied.
[0091] The terminal 200B calculates the encrypted information C.sub.B=E.sub.PK(VB) by encrypting the identity confirmation information VB and transmits the encrypted information C.sub.B to the authentication station server 100A via the terminal 200A.
[0092] The authentication station server 100A generates the random number s, calculates the response encrypted information C.sub.CA_A′ as described below, and transmits the result to the terminal 200B.
is satisfied, and therefore upon decrypting the response encrypted information C.sub.CA_A′, the terminal 200B obtains D.sub.SK(C.sub.CA_A′)=s(VB−VA) and can determine the sameness between the identity confirmation information VB and the identity confirmation information VA based on whether or not the decryption result is 0.
[0093] This is also similarly possible with homomorphic encryption in which the product of the encrypted texts is the encryption of the product of the unencrypted texts. E.sub.PK is homomorphic encryption in which E.sub.PK(M1)×E.sub.PK(M2)=E.sub.PK(M1×M2) is satisfied.
[0094] The terminal 200B calculates the encrypted information C.sub.B=E.sub.PK(VB) by encrypting the identity confirmation information VB and transmits the result to the authentication station server 100A.
[0095] The authentication station server 100A generates the random number s, calculates the response encrypted information C.sub.CA_A′ as described below, and transmits the result to the terminal 200B.
is satisfied, and therefore upon decrypting the response encrypted information C.sub.CA_A′, the terminal 200B obtains D.sub.SK (C.sub.CA_A′)=(VB−VA) s and can determine the sameness between the identity confirmation information VB and the identity confirmation information VA based on whether or not the decryption result is 1.
[0096] As described above, the terminal 200B encrypts the identity confirmation information VB stored in the terminal 200B using homomorphic encryption and transmits the result as the encrypted information C.sub.B(=E.sub.PK(VB)) to the authentication station server 100A. The authentication station server 100A calculates the response encrypted information C.sub.CA_A′ by multiplying together the result (E.sub.PK(VA)) of encrypting the identity confirmation information VA stored in the authentication station server 100A and the received encrypted information C.sub.B, and transmits the calculated response encrypted information C.sub.CA_A′ to the terminal 200B. If the result of decrypting the response encrypted information C.sub.CA_A′ is a predetermined value (0 or 1 in the above-described example), the terminal 200B determines that the pieces of identity confirmation information stored in both the terminal 200B and the authentication station server 100A are the same.
[0097] In the following description, when a signature generated using a secret key S is verified, a public key is acquired from the electronic certificate corresponding to the secret key S, and the signature is verified using the public key. If verification of the signature fails, processing for issuing an owner electronic certificate, processing for issuing a one-time electronic certificate, and processing for confirming the sameness of the owners are canceled.
[0098] Note that a signature of the authentication station server 100 is given to the electronic certificate, and the signature of the electronic certificate is verified using the public key of the authentication station server 100. The public key of the authentication station server 100 is acquired after the signature of the electronic certificate of the authentication station server 100 issued by the route authentication station 300 (see
[0099] The electronic certificate includes identification information of the authentication station (authentication station server 100) that issued the electronic certificate as the issuer (Issuer field), and the authentication station of the electronic certificate from which the public key is to be acquired is understood.
[0100] Processing for Issuing Owner Electronic Certificate
[0101]
[0102] In step S101, the electronic certificate request unit 211 of the terminal 200A generates a key pair (a secret key and a public key) for public key encryption.
[0103] In step S102, the electronic certificate request unit 211 transmits the public key generated in step S101 and information on the identity confirmation document to the authentication station server 100A, and requests issuance of the owner electronic certificate. This transmitted message may also be signed with the secret key generated in step S101.
[0104] In step S103, the electronic certificate issuance unit 111 of the authentication station server 100A confirms that the identity confirmation document received in step S102 is authentic. Next, the electronic certificate issuance unit 111 confirms that the owner of the terminal 200A and the person described in the identity confirmation document match each other.
[0105] In step S104, the electronic certificate issuance unit 111 adds a record to the electronic certificate database 130 (see
[0106] In step S105, the electronic certificate issuance unit 111 issues an owner electronic certificate I.sub.A.sup.(O) including the public key received in step S102. The key owner (Subject field) of the owner electronic certificate is the entirety or part of the identity confirmation information of the owner, such as the name or address, which was confirmed in step S103. The electronic certificate issuance unit 111 stores the serial number of the issued owner electronic certificate in the identification information 131 of the record added in step S104. Furthermore, the electronic certificate issuance unit 111 stores “owner” in the type 132, the key owner in the key owner 133, “-” in the related certificate 134, and the data of the issued owner electronic certificate in the electronic certificate 136.
[0107] In step S106, the electronic certificate issuance unit 111 transmits the issued owner electronic certificate I.sub.A.sup.(O) as a response to the request made in step S102 to the terminal 200A.
[0108] In step S107, the electronic certificate request unit 211 of the terminal 200A verifies the signature of the authentication station server 100A of the received owner electronic certificate I.sub.A.sup.(O).
[0109] In step S108, the electronic certificate request unit 211 of the terminal 200A stores the received owner electronic certificate I.sub.A.sup.(O) in the storage unit 220. Also, the electronic certificate request unit 211 stores the identity confirmation information included as the value of the key owner (Subject field) of the owner electronic certificate I.sub.A.sup.(O) in the identity confirmation information 222 (see
[0110] The foregoing described processing in which the authentication station server 100A issues an owner electronic certificate to the terminal 200A. Similarly, the authentication station server 100B issues the owner electronic certificate to the terminal 200B. The processing in which the authentication station server 100B issues the owner electronic certificate to the terminal 200B is similar to that of
[0111] Processing for Issuing One-Time Electronic Certificate
[0112]
[0113] In step S201, the electronic certificate request unit 211 of the terminal 200A generates a key pair (a secret key and a public key) for public key encryption.
[0114] In step S202, the electronic certificate request unit 211 transmits a request to issue the one-time electronic certificate including the public key generated in step S201 to the authentication station server 100A. Specifically, the electronic certificate request unit 211 generates M.sub.S(Q.sub.A,S.sub.A.sup.(P)), which includes a public key and is obtained by signing an issuance request application Q.sub.A for the one-time electronic certificate with the secret key generated in step S201. Next, the electronic certificate request unit 211 generates M.sub.S(M.sub.S(Q.sub.A,S.sub.A.sup.(P))+I.sub.A.sup.(O)+I.sub.A.sup.(M),S.sub.A.sup.(O),S.sub.A.sup.(M)) by combining the owner electronic certificate I.sub.A.sup.(O) and model number electronic certificate I.sub.A.sup.(M) of the terminal 200A with the signed data, and signing the result using the secret key S.sub.A.sup.(O) of the owner electronic certificate and the secret key S.sub.A.sup.(M) of the model number electronic certificate of the terminal 200A. The electronic certificate request unit 211 transmits M.sub.S(M.sub.S(Q.sub.A,S.sub.A.sup.(P))+I.sub.A.sup.(O)+I.sub.A(M),S.sub.A.sup.(O),S.sub.A.sup.(M)) to the authentication station server 100A as a request to issue the one-time electronic certificate.
[0115] In step S203, the electronic certificate issuance unit 111 of the authentication station server 100A verifies the signatures provided using the secret keys S.sub.A(M),S.sub.A.sup.(O), and S.sub.A.sup.(P) of the request to issue the one-time electronic certificate received in step S202.
[0116] In step S204, the electronic certificate issuance unit 111 issues the one-time electronic certificate I.sub.A.sup.(P) including the public key included in Q.sub.A received in step S202. The key owner of the one-time electronic certificate is a random character string.
[0117] In step S205, the electronic certificate issuance unit 111 stores the one-time electronic certificate I.sub.A.sup.(P) in association with the owner electronic certificate I.sub.A.sup.(O). Specifically, the electronic certificate issuance unit 111 adds a record to the electronic certificate database 130 (see
[0118] In step S206, the electronic certificate issuance unit 111 sends the issued one-time electronic certificate I.sub.A.sup.(P) as a response to the terminal 200A. Specifically, the electronic certificate issuance unit 111 combines the electronic certificate I.sub.A.sup.(C) of the authentication station server 100A with the one-time electronic certificate I.sub.A.sup.(P) and transmits M.sub.S(I.sub.A.sup.(P)+I.sub.A.sup.(C),S.sub.A.sup.(C)) signed using the secret key S.sub.A.sup.(C) corresponding to the electronic certificate I.sub.A.sup.(C) as a response to the request made in step S202.
[0119] In step S207, the electronic certificate request unit 211 of the terminal 200A verifies the signature provided using the secret key S.sub.A.sup.(C) of the received M.sub.S(I.sub.A.sup.(P)+I.sub.A.sup.(C),S.sub.A.sup.(C)) and the signature of the one-time electronic certificate I.sub.A.sup.(P). In step S208, the electronic certificate request unit 211 of the terminal 200A stores the one-time electronic certificate I.sub.A.sup.(P) in the storage unit 220.
[0120] The foregoing described processing in which the authentication station server 100A issues a one-time electronic certificate to the terminal 200A. Similarly, the authentication station server 100B issues the one-time electronic certificate to the terminal 200B. The processing in which the authentication station server 100B issues the one-time electronic certificate to the terminal 200B is similar to that of
[0121] Owner Sameness Confirmation Processing: Processing Between Terminals
[0122] The terminal 200B and the partner terminal 200A for which the sameness of the owner is to be confirmed obtain the one-time electronic certificate, and thereafter the terminal 200B requests owner sameness confirmation to the authentication station server 100A via the partner terminal 200A. Before the request is made, the terminals 200A and 200B perform mutual authentication, and thereafter determine the item of the identity confirmation information for which the sameness is to be confirmed. For example, the terminals 200A and 200B use an item held in common in the pieces of identity confirmation information 222 (see
[0123] Processing performed up to when the terminals 200A and 200B decide on the item of the identity confirmation information for confirming the sameness will be described with reference to
[0124]
[0125] In step S301, the terminal authentication unit 212 of the terminal 200A transmits the one-time electronic certificate I.sub.A.sup.(P) to the partner terminal 200B. The terminal 200B verifies the signature of the received one-time electronic certificate I.sub.A.sup.(P).
[0126] In step S302, the terminal authentication unit 212 of the terminal 200B transmits the one-time electronic certificate I.sub.B.sup.(P) to the partner terminal 200A. The terminal 200A verifies the signature of the received one-time electronic certificate I.sub.B.sup.(P).
[0127] In step S303, the terminal authentication units 212 of the terminal 200A and 200B authenticate each other using the secret keys S.sub.A.sup.(P) and S.sub.B.sup.(P) corresponding to the one-time electronic certificate. For example, the terminal 200A generates the random number, transmits the random number to the terminal 200B, and requests a signature provided using the secret key corresponding to the one-time electronic certificate I.sub.B.sup.(P) for the random number. The terminal 200A can authenticate that the terminal 200B has a secret key corresponding to the one-time electronic certificate I.sub.B.sup.(P) by verifying the signature generated by the terminal 200B. Similarly, the terminal 200B can authenticate that the terminal 200A has the secret key corresponding to the one-time electronic certificate I.sub.A.sup.(P).
[0128] In step S304, the terminal authentication unit 212 determines the item list L.sub.A,B of the identity confirmation information for which the sameness is to be confirmed. Specifically, the terminal authentication unit 212 uses items that are held in common between the pieces of identity confirmation information 222 (see
[0129] Owner Sameness Confirmation Processing: Processing Between Terminal and Authentication Station Server
[0130]
[0131] In step S401, the confirmation request start unit 213 of the terminal 200A transmits the terminal-issued confirmation request start message to the authentication station server 100A. Specifically, the confirmation request start unit 213 generates M.sub.S(L.sub.A,B+I.sub.A.sup.(P)+I.sub.B.sup.(P)+I.sub.A.sup.(M),S.sub.A.sup.(P),S.sub.A.sup.(M)) by combining the item list L.sub.A,B of the identity confirmation information, the one-time electronic certificates I.sub.A.sup.(P) and I.sub.B.sup.(P) of the terminals 200A and 200B, and the model number electronic certificate I.sub.A.sup.(M) and signing using the secret key S.sub.A.sup.(P)) of the one-time electronic certificate and the secret key S.sub.A.sup.(M) of the model number electronic certificate of the terminal 200A. The confirmation request start unit 213 transmits M.sub.S(L.sub.A,B+I.sub.A.sup.(P)+I.sub.B.sup.(P)+I.sub.A.sup.(M),S.sub.A.sup.(P),S.sub.A.sup.(M)) as the terminal-issued confirmation request start message to the authentication station server 100A.
[0132] In step S402, the confirmation reception unit 112 of the authentication station server 100A verifies the signatures provided using the secret keys S.sub.A.sup.(M) and S.sub.A.sup.(P) of the terminal-issued confirmation request start message.
[0133] In step S403, the confirmation reception unit 112 generates a random number N.sub.A,A and a random number N.sub.B,A.
[0134] In step S404, the confirmation reception unit 112 transmits the random number N.sub.A,A and the random number N.sub.B,A as a response to the request made in step S401.
[0135] In step S405, the confirmation request start response unit 214 of the terminal 200A transmits the random number N.sub.B,A to the terminal 200B.
[0136] In step S406, the confirmation request unit 215 of the terminal 200B generates a key pair for homomorphic encryption.
[0137] In step S407, the confirmation request unit 215 calculates encrypted information C.sub.B using homomorphic encryption. Specifically, the confirmation request unit 215 calculates the encrypted information C.sub.B by acquiring, from the identity confirmation information 222 (see
[0138] In step S408, the confirmation request unit 215 transmits the confirmation request message to the terminal 200A. Specifically, the confirmation request unit 215 transmits, to the terminal 200A, M.sub.S(L.sub.A,B+I.sub.B.sup.(P)+I.sub.A.sup.(P)+N.sub.B,A+PK.sub.B+C.sub.B.sup.(M)+I.sub.B.sup.(M),S.sub.B.sup.(P),S.sub.B.sup.(M)), which is obtained by combining the item list L.sub.A,B of the identity confirmation information stored in the terminal 200B, the one-time electronic certificates I.sub.B.sup.(P), I.sub.A.sup.(P) of the terminal 200B and the partner terminal 200A, the random number N.sub.B,A, a public key PK.sub.B for homomorphic encryption, the encrypted information C.sub.B, and a model number electronic certificate I.sub.B.sup.(M), and signing using the secret keys S.sub.B.sup.(P) and S.sub.B.sup.(M). Hereinafter, M.sub.S(L.sub.A,B+I.sub.B.sup.(P)+I.sub.A.sup.(P)+N.sub.B,A+PK.sub.B+C.sub.B+I.sub.B.sup.(M),S.sub.B.sup.(P),S.sub.B.sup.(M)) will be written also as U.sub.A,B.
[0139] In step S409, the confirmation request transfer unit 216 of the terminal 200A verifies the signature provided using the secret keys S.sub.B.sup.(M) and S.sub.B.sup.(P) of U.sub.A,B.
[0140] In step S410, the confirmation request transfer unit 216 confirms that the item list L.sub.A,B received in step S408 and the item list L.sub.A,B that was determined in step S304 (see
[0141] The description of the owner sameness confirmation processing will be continued with reference to
[0142] In step S411, the confirmation request transfer unit 216 transmits a confirmation request transfer message to the authentication station server 100A. Specifically, the confirmation request transfer unit 216 transmits M.sub.S(U.sub.A,B+N.sub.A,A+I.sub.A.sup.(P)+I.sub.A.sup.(M),S.sub.A.sup.(P),S.sub.A.sup.(M)), which is obtained by combining U.sub.A,B, the random number N.sub.A,A, the one-time electronic certificate I.sub.A.sup.(P), and the model number electronic certificate I.sub.A.sup.(M), and signing using the secret keys S.sub.A.sup.(P) and S.sub.A.sup.(M), as a confirmation request transfer message to the authentication station server 100A.
[0143] In step S412, the confirmation response unit 113 of the authentication station server 100A verifies the signatures provided using the secret keys S.sub.A.sup.(M) and S.sub.A.sup.(M) of the confirmation request transfer message. Also, the confirmation response unit 113 verifies the signatures provided using the secret keys S.sub.B.sup.(M) and S.sub.B.sup.(P) of U.sub.A,B, which is included in the confirmation request transfer message.
[0144] In step S413, the confirmation response unit 113 compares whether or not the one-time electronic certificate I.sub.A.sup.(P) included in the confirmation request transfer message is the same as the one-time electronic certificate I.sub.A.sup.(P) that was included in step S401 (see
[0145] In step S414, the confirmation response unit 113 verifies whether or not the random number N.sub.A,A included in the confirmation request transfer message and the random number N.sub.B,A included in U.sub.A,B in the confirmation request transfer message are respectively the same as the random number N.sub.A,A and the random number N.sub.B,A transmitted in step S404 (see
[0146] In step S415, the confirmation response unit 113 generates the response encrypted information C.sub.CA_A′ based on the received encrypted information C.sub.B and the identity confirmation information held by the authentication station server 100A. Specifically, the confirmation response unit 113 acquires the one-time electronic certificate I.sub.A.sup.(P) included in U.sub.A,B and the item list L.sub.A,B of the identity confirmation information in the confirmation request transfer message. The confirmation response unit 113 specifies the owner electronic certificate I.sub.A.sup.(O) of the terminal 200A from the related certificate 134 of the record of the one-time electronic certificate I.sub.A.sup.(P) in the electronic certificate database 130, and acquires the identity confirmation information 135 thereof. Next, the confirmation response unit 113 acquires the identity confirmation information in the item list L.sub.A,B of the identity confirmation information from the identity confirmation information 135. Finally, the confirmation response unit 113 generates the response encrypted information C.sub.CA_A′ based on the encrypted information C.sub.B, the public key PK.sub.B, and the acquired identity confirmation information.
[0147] In step S416, the confirmation response unit 113 transmits M.sub.S(I.sub.B.sup.(P)+I.sub.A.sup.(P)+C.sub.CA_A′+I.sub.A.sup.(C),S.sub.A.sup.(C)), which is obtained by combining the one-time electronic certificates I.sub.B.sup.(P) and I.sub.A.sup.(P), the response encrypted information C.sub.CA_A′, and the authentication station electronic certificate I.sub.A.sup.(C), and signing using the secret key S.sub.A.sup.(C), as a confirmation response message to the terminal 200A as a response.
[0148] In step S417, the confirmation response transfer unit 217 of the terminal 200A transfers the confirmation response message received from the authentication station server 100A in step S416 to the terminal 200B.
[0149] In step S418, the sameness determination unit 218 of the terminal 200B verifies the signature provided using S.sub.A.sup.(C) in the confirmation response message.
[0150] In step S419, the sameness determination unit 218 decrypts the response encrypted information C.sub.CA_A′ using the secret key for homomorphic encryption.
[0151] In step S420, if the decryption result is 0 (step S420.fwdarw.YES), the sameness determination unit 218 advances to step S421, and if the decryption result is not 0 (step S420.fwdarw.NO), the sameness determination unit 218 advances to step S422. Note that a decryption result of 0 is a predetermined value in the case where the homomorphic encryption is Paillier encryption (homomorphic encryption in which the product of the encrypted texts is encryption of the sum of unencrypted texts). In the case of homomorphic encryption in which the product of the encrypted texts is the encryption of the product of the unencrypted texts, determination is performed based on whether or not the decryption result is 1.
[0152] In step S421, the sameness determination unit 218 determines that the owners are the same.
[0153] In step S422, the sameness determination unit 218 determines that the owners are different.
[0154] With that, the terminal 200B ends the owner sameness confirmation processing for confirming that the owner of the terminal 200B and the owner of the terminal 200A match each other in the authentication station server 100A via the terminal 200A. Next, the terminals 200B and 200A are switched, and the terminal 200A confirms that the owner of the terminal 200A and the owner of the partner terminal 200B match each other. Specifically, similarly to the steps of step S401 and onward, the terminal 200A confirms that the owner of the terminal 200A and the owner of the partner terminal 200B match each other in the authentication station server 100B via the terminal 200B. This processing for confirming is similar to that shown in
[0155] Both of the terminals 200A and 200B confirm that the owners are the same, whereby the owner sameness confirmation processing ends. After the end of the owner sameness confirmation processing, the terminals 200A and 200B performs sharing (copy) processing of a secret key to be used for authentication during, for example, service usage, data that is needed for content copyright management, and the like.
[0156] Features of Owner Sameness Certificate Processing
[0157] The one-time electronic certificate and the model number electronic certificate are examples of terminal information of the terminal that is to be transmitted to the partner terminal for which the sameness of the owner is to be confirmed. Information regarding the owner is not included in any electronic certificate. For this reason, there is no risk that personal information including the identity confirmation information of the owner will leak out to the partner terminal.
[0158] Even if the authentication station servers are different, it is possible to confirm whether or not the owners of two terminals are the same by comparing the item of the identity confirmation information that is stored in common. Also, the identity confirmation information (see the identity confirmation information 135 in
[0159] The terminal and the authentication station server compare the items of the identity confirmation information respectively stored in the terminal and the authentication station server in a state of being encrypted using homomorphic encryption. For this reason, it is possible to confirm whether or not the identity confirmation information matches without the identity confirmation information flowing out to the partner.
[0160] The authentication station server acquires the model number electronic certificate, and therefore it is possible to find out the model numbers (models) of the two terminals for which the sameness of the owners is to be confirmed, and it is possible to obtain information for improving the service.
[0161] Variation: Item List of Identity Confirmation Information
[0162] The item list L.sub.A,B of the identity confirmation information is items of the identity confirmation information 222 stored in both terminals 200A and 200B (see the description of the terminal authentication unit 212 in
[0163] Note that if the identity confirmation information (item of the identity confirmation information) for which sameness is to be confirmed has been determined in advance, the terminal 200 or the authentication station server 100 may also execute the processing for owner sameness confirmation without using the item list L.sub.A,B.
[0164] Variation: Model Number Electronic Certificate
[0165] The terminal-issued confirmation request message (step S401 in
[0166] Variation: Electronic Certificate Database
[0167] In the above-described embodiment, there is no information in the identity confirmation information 135 in the record of the one-time electronic certificate stored in the electronic certificate database 130 (
[0168] In contrast to this, the identity confirmation information 135 of the record of the owner electronic certificate shown in the related certificate 134 may also be stored in the identity confirmation information 135 of the record of the one-time electronic certificate. The authentication station server 100 can acquire the identity confirmation information directly from the record of the one-time electronic certificate.
[0169] Variation: Communication Route Between Terminal and Authentication Station Server
[0170] In the above-described embodiment, the terminal 200B and the authentication station server 100A exchange messages via the terminal 200A, but they may also exchange messages directly. Specifically, the confirmation request message transmitted by the terminal 200B (see step S408 in
[0171] Variation: Identity Confirmation Information of Terminal
[0172] In the above-described embodiment, the identity confirmation information 222 (see
[0173] Other Variations
[0174] Note that the present invention is not limited to the above-described embodiment and can be modified without departing from the gist of the invention.
[0175] For example, although the terminal 200 generates the key pair for homomorphic encryption each time owner sameness confirmation processing is performed (see step S406 of
[0176] Also, the key owner of the one-time electronic certificate is a random character string, but need only be information that is unrelated to the identity confirmation information of the owner, and for example, may also be information generated based on the address of the terminal, a time at which there was a request to issue the electronic certificate, and the like.
[0177] In addition, in the above-described embodiment, the server that issues the electronic certificate and the server that confirms the sameness of the owners were the same authentication station server 100, but they may also be separate servers.
[0178] Also, in step S103 (see
[0179] Although several embodiments of the present invention were described above, these embodiments are merely exemplary and do not limit the technical scope of the present invention. The present invention can take various other embodiments, and furthermore, various modifications such as omission and replacement can be performed without departing from the gist of the present invention. These embodiments and variations are encompassed in the scope and gist of the invention described in the present specification and the like, and are encompassed in the invention described in the patent claims and its range of equivalency.
[0180] Effects
[0181] Hereinafter, effects of the owner sameness confirmation system 10 will be described.
[0182] The owner sameness confirmation system 10 according to the present embodiment is an owner sameness confirmation system 10 constituted by including a plurality of terminals 200 and a plurality of authentication station servers 100, in which each of the terminals 200B includes: a storage unit 220 configured to store identity confirmation information 222 of an owner of the terminal 200B; and a confirmation request unit 215 configured to transmit a confirmation request message including encrypted information obtained by encrypting the identity confirmation information of the owner of the terminal 200B using a public key for homomorphic encryption, an electronic certificate of a partner terminal 200A that is a target of owner sameness confirmation, and the public key, to an authentication station server 100A that issued the electronic certificate to the partner terminal 200A, the authentication station server 100A that issued the electronic certificate to the partner terminal 200A includes: a storage unit 120 configured to store the electronic certificate issued to the partner terminal 200A and identity confirmation information of an owner of the partner terminal 200A in association with each other; and a confirmation response unit 113 configured to, upon receiving the confirmation request message, acquire the identity confirmation information of the owner of the partner terminal 200A from the electronic certificate of the partner terminal 200A, and transmit a confirmation response message including response encrypted information, which is the result of calculating an encrypted text obtained by encrypting the identity confirmation information using the public key and the encrypted information through computation corresponding to the homomorphic encryption, as a response to the terminal 200B, and each of the terminals 200B further includes a sameness determination unit 218 configured to decrypt the response encrypted information, and determine whether or not the identity confirmation information of the owner of the terminal 200B and the identity confirmation information of the owner of the partner terminal 200A match each other based on whether or not the decryption result matches a predetermined value.
[0183] With this kind of owner sameness confirmation system 10, it is possible to determine whether or not the owners are the same for the terminal 200B and the partner terminal 200A, for which the authentication station servers 100 that issued the electronic certificates are different. Specifically, the terminal 200B can perform determination through processing with the authentication station server 100A that issued the electronic certificate to the partner terminal 200A. Also, the identity confirmation information is encrypted and exchanged (encrypted information and response encrypted information), and thus it is possible to confirm whether or not the identity confirmation information matches without the identity confirmation information flowing out between the terminal 200B and the authentication station server 100A. The same applies also for the terminal 200A, and it is possible to determine whether or not the owners are the same through processing with the authentication station server 100B without the identity confirmation information flowing out.
[0184] Accordingly, with the owner sameness confirmation system 10, it is possible to enable owner sameness confirmation between terminals while ensuring security.
[0185] In the owner sameness confirmation system 10 according to the present embodiment, the identity confirmation information is constituted by one or more items, the confirmation request unit 215 calculates the encrypted information by encrypting the identity confirmation information for an item for confirming the sameness using the public key, the item being selected from among the one or more items, and transmits the item in a state of being included in the confirmation request message, the confirmation response unit 113 generates the encrypted text obtained by encrypting the identity confirmation information for the item of the owner of the partner terminal 200A using the public key, calculates the response encrypted information, and transmits the calculated response encrypted information as a response, and the sameness determination unit 218 decrypts the response encrypted information and determines whether or not the identity confirmation information for the item of the owner of the terminal 200B and the identity confirmation information for the item of the owner of the partner terminal 200A match each other based on whether or not the decryption result matches the predetermined value.
[0186] According to this kind of owner sameness confirmation system 10, it is possible to confirm the sameness of the owner using part (an item) of the identity confirmation information instead of the entirety thereof. For this reason, even if the registered pieces of identity confirmation information are different, it is possible to confirm the sameness of the owners due to parts of the identity confirmation information matching each other.
[0187] In the owner sameness confirmation system 10 according to the present embodiment, E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1+M2) is satisfied for unencrypted texts M1 and M2, the confirmation request unit 215 transmits E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal 200B, the confirmation response unit 113 generates a random number r for identity confirmation information V2 of the owner of the partner terminal 200A and transmits E(V1).sup.r×E(V2).sup.−r as the response encrypted information as a response, and the sameness determination unit 218 determines whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 0, which is the predetermined value.
[0188] According to this kind of owner sameness confirmation system 10, the terminal 200 can confirm whether or not the pieces of identity confirmation information match each other using homomorphic encryption E, in which E(M1)×E(M2)=E(M1+M2) is satisfied for unencrypted texts M1 and M2.
[0189] Also, when the pieces of identity confirmation information V1 and V2 are different from each other, (V1−V2)≠0 is satisfied, and therefore r(V1−V2), which is the result of decrypting the response encrypted information, is a random number for the terminal 200B. For this reason, even if the terminal 200B knows the identity confirmation information V1, the information of the identity confirmation information V2 cannot be obtained, and thus the identity confirmation information V2 of the owner of the partner terminal 200B does not leak out. The same applies even if the terminals 200B and 200A are switched.
[0190] In the owner sameness confirmation system 10 according to the present embodiment, E, which is the homomorphic encryption, is homomorphic encryption in which E(M1)×E(M2)=E(M1×M2) is satisfied for unencrypted texts M1 and M2, the confirmation request unit 215 transmits E(V1) as the encrypted information for identity confirmation information V1 of the owner of the terminal 200B, the confirmation response unit 113 generates a random number r for identity confirmation information V2 of the owner of the partner terminal 200A and transmits E(V1).sup.r×E(V2).sup.−r as the response encrypted information as a response, and the sameness determination unit 218 determines whether or not V1 and V2 match each other based on whether or not the decryption result of the response encrypted information is 1, which is the predetermined value.
[0191] According to this kind of owner sameness confirmation system 10, the terminal 200 can confirm whether or not the pieces of identity confirmation information match each other using homomorphic encryption E, in which E(M1)×E(M2)=E(M1×M2) is satisfied for unencrypted texts M1 and M2.
[0192] Also, when the pieces of identity confirmation information V1 and V2 are different from each other, (V1/V2)≠1 is satisfied, and therefore (V1/V2).sup.r, which is the result of decrypting the response encrypted information, is a random number for the terminal 200B. For this reason, even if the terminal 200B knows the identity confirmation information V1, the information of the identity confirmation information V2 cannot be obtained, and thus the identity confirmation information V2 of the owner of the partner terminal 200B does not leak out. The same applies even if the terminals 200B and 200A are switched.
[0193] In the owner sameness confirmation system 10 according to the present embodiment, the confirmation request unit 215 transmits the confirmation request message via the partner terminal 200A to the authentication station server 100A that issued the electronic certificate to the partner terminal 200A, and the confirmation response unit 113 transmits the confirmation response message via the partner terminal 200A to the terminal 200B.
[0194] According to this kind of owner sameness confirmation system 10, the authentication station server 100 can limit the terminal 200 that is the communication partner to the terminal 200 to which the authentication station server 100 issued the electronic certificate. Consequently, communication from an unspecified terminal 200 can be avoided, whereby security is improved.
[0195] In the owner sameness confirmation system 10 according to the present embodiment, a value of a key owner included in the electronic certificate issued to the terminal 200 is identification information of the terminal 200 that is unrelated to the identity confirmation information of the owner of the terminal 200.
[0196] According to this kind of owner sameness confirmation system 10, it is possible to determine whether or not the owners of the two terminals 200 are the same using the one-time certificate that does not include the identity confirmation information of the owner. For this reason, the terminal 200 can confirm the sameness of the owners without leaking the identity confirmation information of the owner of the terminal 200 to the authentication station server 100 of the partner terminal 200.
[0197] In the owner sameness confirmation system 10 according to the present embodiment, the confirmation request message transmitted by the terminal 200 is signed using at least any one of a secret key corresponding to the electronic certificate and a secret key corresponding to a model number electronic certificate indicating a model number of the terminal 200.
[0198] According to this kind of owner sameness confirmation system 10, the authentication station server 100 can acquire the model number (model) of the terminal 200. For this reason, the operator of the authentication station server 100 can obtain information for service improvement.
REFERENCE SIGNS LIST
[0199] 10 Owner sameness confirmation system [0200] 100, 100A, 100B Authentication station server [0201] 111 Electronic certificate issuance unit [0202] 112 Confirmation reception unit [0203] 113 Confirmation response unit [0204] 130 Electronic certificate database [0205] 200, 200A, 200B Terminal [0206] 211 Electronic certificate request unit [0207] 212 Terminal authentication unit [0208] 213 Confirmation request start unit [0209] 214 Confirmation request start response unit [0210] 215 Confirmation request unit [0211] 216 Confirmation request transfer unit [0212] 217 Confirmation response transfer unit [0213] 218 Sameness determination unit [0214] 222 Identity confirmation information