Cryptographic processing method and cryptographic processing device
09871652 ยท 2018-01-16
Assignee
Inventors
Cpc classification
G09C1/00
PHYSICS
International classification
G09C1/00
PHYSICS
H04L9/00
ELECTRICITY
Abstract
A computer generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial by a second encrypted polynomial, and outputs cryptographic information that represents the third encrypted polynomial. The first encrypted polynomial is a polynomial obtained by encrypting a first polynomial that corresponds to a first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked.
Claims
1. A cryptographic processing method comprising: generating a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by a computer, by use of a result of multiplying a first encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector by a second encrypted polynomial obtained by encrypting a second polynomial that corresponds to a second vector, the third polynomial including a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, wherein the computer masks a coefficient of the second term by performing cryptographic masking on the result of multiplying the first encrypted polynomial by the second encrypted polynomial; and outputting cryptographic information that represents the third encrypted polynomial.
2. The cryptographic processing method according to claim 1, wherein coefficients in one or more terms including the second term from among a plurality of terms included in the third polynomial are masked by random numbers.
3. The cryptographic processing method according to claim 1, wherein the first encrypted polynomial and the second encrypted polynomial are generated by a homomorphic encryption of lattice dimension n, and by use of a dimension d of the first vector and an integer k not less than 0, a degree of the first term is represented by an integer one less than a remainder obtained by dividing d+k+1 by n.
4. The cryptographic processing method according to claim 3, wherein the computer sends the cryptographic information to a decryption device, the third polynomial corresponds to a result of decrypting the third encrypted polynomial, the integer k is an integer not less than 1, and the decryption device obtains the coefficient of the first term included in the third polynomial by use of the integer k, the lattice dimension n and the dimension d.
5. The cryptographic processing method according to claim 1, wherein the coefficient based on the inner product represents the dissimilarity or similarity between the first vector and the second vector.
6. A cryptographic processing device comprising: a memory; and a processor coupled to the memory and that generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector by a second encrypted polynomial obtained by encrypting a second polynomial that corresponds to a second vector, the third polynomial including a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, wherein the processor masks a coefficient of the second term by performing cryptographic masking on the result of multiplying the first encrypted polynomial by the second encrypted polynomial; and a communication interface coupled to the memory and the processor and that outputs cryptographic information that represents the third encrypted polynomial.
7. The cryptographic processing device according to claim 6, wherein coefficients in one or more terms from among a plurality of terms included in the third polynomial are masked by random numbers.
8. The cryptographic processing device according to claim 6, wherein the first encrypted polynomial and the second encrypted polynomial are generated by a homomorphic encryption of lattice dimension n, and by use of a dimension d of the first vector and an integer k not less than 0, a degree of the first term is represented by an integer one less than a remainder obtained by dividing d+k+1 by n.
9. The cryptographic processing device according to claim 8, wherein the output interface sends the cryptographic information to a decryption device, the third polynomial corresponds to a result of decrypting the third encrypted polynomial, the integer k is an integer not less than 1, and the decryption device obtains the coefficient of the first term included in the third polynomial by use of the integer k, the lattice dimension n and the dimension d.
10. The cryptographic processing device according to claim 6, wherein the coefficient based on the inner product represents the dissimilarity or similarity between the first vector and the second vector.
11. A non-transitory computer-readable recording medium having stored therein a cryptographic processing program that causes a computer to execute a process comprising: generating a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector by a second encrypted polynomial obtained by encrypting a second polynomial that corresponds to a second vector, the third polynomial including a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, wherein the computer masks a coefficient of the second term by performing cryptographic masking on the result of multiplying the first encrypted polynomial by the second encrypted polynomial; and outputting cryptographic information that represents the third encrypted polynomial.
12. The non-transitory computer-readable recording medium according to claim 11, wherein coefficients in one or more terms from among a plurality of terms included in the third polynomial are masked by random numbers.
13. The non-transitory computer-readable recording medium according to claim 11, wherein the first encrypted polynomial and the second encrypted polynomial are generated by a homomorphic encryption of lattice dimension n, and by use of a dimension d of the first vector and an integer k not less than 0, a degree of the first term is represented by an integer one less than a remainder obtained by dividing d+k+1 by n.
14. The non-transitory computer-readable recording medium according to claim 13, wherein the computer sends the cryptographic information to a decryption device, the third polynomial corresponds to a result of decrypting the third encrypted polynomial, the integer k is an integer not less than 1, and the decryption device obtains the coefficient of the first term included in the third polynomial by use of the integer k, the lattice dimension n and the dimension d.
15. The non-transitory computer-readable recording medium according to claim 11, wherein the coefficient based on the inner product represents the dissimilarity or similarity between the first vector and the second vector.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
DESCRIPTION OF EMBODIMENTS
(15) Embodiments of the present invention will now be described in detail with reference to the drawings.
(16) Section 3.2 of Non Patent Document 3 discloses a constructing method of a somewhat homomorphic encryption scheme that is an extended version of the somewhat homomorphic encryption scheme disclosed in Non Patent Document 2. According to this method, three key-generating parameters (n, q, t) are mainly used to generate an encryption key. n is an integer that is a power of two, and is referred to as a lattice dimension. q is a prime, and t is an integer that is less than the prime q.
(17) In the process of the encryption key generation, first, a polynomial sk of degree n1 in which each coefficient is very small is generated as a secret key at random. The value of each coefficient is restricted by a certain parameter . Next, a polynomial al of degree n1 in which each coefficient is less than q and a polynomial e of degree n1 in which each coefficient is very small are generated at random. Then, the following formula for a polynomial a0 is calculated, and a pair of polynomials (a0, a1) is defined as a public key pk.
a0=(a1*sk+t*e)(1)
(18) However, in a calculation of the polynomial a0, a polynomial whose degree is lower than n is always calculated by using x.sup.n=1, x.sup.n+1=x, . . . with respect to a polynomial whose degree is higher than or equal to n. Further, as a coefficient in each term included in a polynomial, a remainder obtained by dividing the coefficient by a prime q is used. A space in which such a polynomial operation is performed is often technically represented as R.sub.q:=F.sub.q[x]/(x.sup.n+1).
(19) Next, for plaintext data m that is represented by a polynomial of degree n1 in which each coefficient is less than t and a public key pk, three polynomials u, f, and g of degree n1 in which each coefficient is very small are generated at random, and cryptographic data Enc(m,pk) of the plaintext data m is defined by the following formulas:
Enc(m,pk)=(c0,c1)(2)
c0=a0*u+t*g+m(3)
c1=a1*u+t*f(4)
(20) The polynomial operation in the space R.sub.q is also used for a calculation of the polynomial c0 and the polynomial c1. In this case, a cryptographic addition for cryptographic data Enc(m1, pk)=(c0, c1) and cryptographic data Enc(m 2, pk)=(d0, d1) is performed by the following formula:
Enc(m1,pk)+Enc(m2,pk)=(c0+d0,c1+d1)(5)
(21) Further, a cryptographic multiplication for the cryptographic data Enc(m1, pk) and the cryptographic data Enc(m2, pk) is performed by the following formula:
Enc(m1,pk)*Enc(m2,pk)=(c0*d0,c0*d1+c1*d0,c1*d1)(6)
(22) When performing the cryptographic multiplication by Formula (6), the cryptographic data changes from that of a two-dimensional vector to that of three-dimensional vector. If the cryptographic multiplication is repeated several times, there is a further increase in the elements of the cryptographic data that is a multiplication result.
(23) Next decryption is described. The cryptographic data c=(c0, c1, c2, . . . ) in which the elements have increased as a result of an operation such as a several-times cryptographic multiplication is decrypted by calculating the following formula for a decryption result Dec(c, sk) by use of a secret key sk.
Dec(c,sk)=[c0+c1*sk+c2*sk.sup.2+ . . . ].sub.q mod t(7)
(24) In Formula (7), [f(x)].sub.q mod t represents a polynomial in which each coefficient z.sub.i in a polynomial f(x) is replaced with [z.sub.i].sub.q mod t. A value of [z].sub.q for an integer z is defined by the following formula by use of a remainder w obtained by dividing z by q:
[z].sub.q=w (in case of w<q/2)(8)
[z].sub.q=wq (in case of wq/2)(9)
(25) Thus, the range of values of [z].sub.1 is [q/2,q/2). Further, a mod t represents a remainder obtained by dividing an integer a by t.
(26) Taking (n,q,t)=(4,1033,20) for example, the following polynomial is a simple example of a secret key sk, a public key pk, and cryptographic data Enc(m,pk):
sk=Mod(Mod(4,1033)*x.sup.3+Mod(4,1033)*x.sup.2+Mod(1,1033)*x,x.sup.4+1)(10)
pk=(a0,a1)(11)
a0=Mod(Mod(885,1033)*x.sup.3+Mod(519,1033)*x.sup.2+Mod(621,1033)*x+Mod(327,1033),x.sup.4+1)(12)
a1=Mod(Mod(661,1033)*x.sup.2+Mod(625,1033)*x.sup.2+Mod(861,1033)*x+Mod(311,1033),x.sup.4+1)(13)
Enc(m,pk)=(c0,c1)(14)
m=3+2x+2x.sup.2+2x.sup.3(15)
c0=Mod(Mod(822,1033)*x.sup.3+Mod(1016,1033)*x.sup.2+Mod(292,1033)*x+Mod(243,1033),x.sup.4+1)(16)
c1=Mod(Mod(840,1033)*x.sup.2+Mod(275,1033)*x.sup.2+Mod(628,1033)*x+Mod(911,1033),x.sup.4+1)(17)
(27) In Formulas (10) to (17), Mod(a,q) represents a remainder obtained by dividing an integer a by a prime q, and Mod(f(x),x.sup.4+1) represents a remainder (polynomial) obtained by dividing a polynomial f(x) by a polynomial x.sup.4+1. For example, Mod(f(x),x.sup.4+1) for f(x)=x.sup.4 is equal to Mod(f(x),x.sup.4+1) for f(x)=1, and Mod(f(x),x.sup.4+1) for f(x)=x.sup.5 is equal to Mod(f(x),x.sup.4+1) for f(x)=x.
(28) The above-mentioned somewhat homomorphic encryption scheme is superior to a fully homomorphic encryption scheme in terms of performance, but it does not have satisfactory performance for practical purposes because, still, it takes much processing time and a size of cryptographic data becomes large when processing vector data (a plurality of strings of data) at one time.
(29) For the above problem, a cryptographic processing device of Patent Document 1 permits a great improvement in processing time and a size of cryptographic data by performing a polynomial transformation to represent the vector data as one polynomial and encrypting the polynomial by a homomorphic encryption.
(30) In this cryptographic processing device, for example, the following two d-dimensional vectors are used as input data:
A=(a.sub.1,a.sub.2,a.sub.3, . . . ,a.sub.d)(21)
B=(b.sub.1,b.sub.2,b.sub.3, . . . ,b.sub.d)(22)
(31) The following two types of polynomial transformation, an ascending-order transformation and a descending-order transformation, are used to calculate a distance between two vectors at a high speed in a state in which those two vectors remain encrypted.
(32) [Ascending-Order Transformation]
A=(a.sub.1, a.sub.2,a.sub.3, . . . ,a.sub.d)pm1(A)=a.sub.1+a.sub.2x+a.sub.3x.sup.2+ . . . +a.sub.dx.sup.d1(23)
[Descending-Order Transformation]
B=(b.sub.1,b.sub.2,b.sub.3, . . . ,b.sub.d)pm2(B)=b.sub.1x.sup.d+b.sub.2x.sup.d1+. . . +b.sub.dx(24)
(33) When encrypting a polynomial pm1(A) and a polynomial pm2(B) by a homomorphic encryption E, an encrypted polynomial E1(A) and an encrypted polynomial E2(B) are generated.
E1(A)=E(pm1(A))(25)
E2(B)=E(pm2(B))(26)
(34) Using characteristics of a homomorphic encryption for the encrypted polynomial E1(A) and the encrypted polynomial E2(B), an inner product of a vector A and a vector B can be calculated at a high speed by the following cryptographic multiplication:
(35)
(36) A polynomial D which a decryptor having a secret key can obtain by decrypting a multiplication result E (D) of the cryptographic multiplication is equivalent to a polynomial obtained by the multiplication pm1(A)*pm2(B). Thus, an inner product of the vector A and the vector B, a.sub.1b.sub.1+a.sub.2b.sub.2+ . . . +a.sub.db.sub.d, is obtained from the coefficient in the term x.sup.d included in the polynomial D.
(37) For example, when the vector A and the vector B are binary vectors, all the elements a.sub.1 to a.sub.d of the vector A are 0 or 1, and all the elements b.sub.1 to b.sub.d of the vector B are 0 or 1. In this case, using characteristics of the cryptographic multiplication performed in Formula (27), a Hamming distance between the vector A and the vector B can be calculated by the following formula in a state in which E1(A) and E2(B) remain homomorphically encrypted:
E(D.sub.H)=E1(A)*E2(C)+E1(C)*E2(B)2*E1(A)*E2(B)(28)
(38) In Formula (28), a vector C is a vector of which all the elements are 1.
C=(1,1, . . . ,1)(29)
(39) A polynomial D.sub.H obtained by decrypting the encrypted Hamming distance E (D.sub.H) is equivalent to a polynomial obtained by calculating the following formula:
pm1(A)*pm2(C)+pm1(C)*pm2(B)2*pm1(A)*pm2(B)(30)
(40) Thus, a Hamming distance HD between the vector A and the vector B is obtained from the coefficient in the term x.sup.d included in the polynomial D.sub.H.
HD=a.sub.1+a.sub.2+ . . . +a.sub.d+b.sub.1+b.sub.2+ . . . +b.sub.d2(a.sub.1b.sub.1+a.sub.2b.sub.2+ . . . +a.sub.db.sub.d)(31)
(41) An ideal-lattice-based homomorphic encryption, a ring-Lauter-Naehrig-Vaikuntanathan-based (ring-LWE-based) homomorphic encryption or the like can be used as a homomorphic encryption.
(42) According to these cryptographic operations, a secured calculation to obtain an inner product or a Hamming distance between two vectors can be performed at a higher speed and at a smaller data size. These cryptographic operations are used in, for example, a biometric system for comparing pieces of data acquired from living individuals or a tag-search system for searching from many tags a tag that has certain characteristics.
(43) When it is not a problem if a decryptor who has a secret key is aware of all the elements of the vector A and the vector B, the decryptor may calculate an inner product or a Hamming distance directly using the vector A and the vector B instead of performing a cryptographic operation. However, a security requirement is often imposed such that it is not preferable for a decryptor to know the elements themselves of the vector A and the vector B even though he or she may be aware of the inner product or the Hamming distance of the vector A and the vector B.
(44) Using the cryptographic processing device of Patent Document 1, a decryptor is able to know, by decrypting an encrypted secured distance, not only a secured distance between two vectors but also the information on the elements of each of the vectors that are input data. As a result, the elements of the vectors may be leaked to the decryptor.
(45) In the cryptographic processing device of Patent Document 1, the information on the input data before encryption is left in a result of a cryptographic operation as a by-product of the cryptographic operation. Thus, when decrypting the result of the cryptographic operation, the decryptor is able to know not only a result of an operation of, for example, an inner product or a Hamming distance but also much more information on a relationship between pieces of input data. In this case, the decryptor is able to obtain from the above-mentioned information a part of or all the input data to be secured, which does not meet the security requirement.
(46) For example, the polynomial D that corresponds to the multiplication result E(D) in Formula (27) includes, as a coefficient in the term x.sup.d, the inner product of the vector A and the vector B, a.sub.1b.sub.1+a.sub.2b.sub.2+ . . . +a.sub.db.sub.d, as well as the coefficients in the terms of the other degrees of x. For example, the term x.sup.0 (constant term) includes a.sub.1, the coefficient in the term x.sup.1 includes a.sub.1b.sub.d, and the coefficient in the term x.sup.2 includes a.sub.1b.sub.d1+a.sub.2b.sub.d2. Which value appears in which term is determined according to a lattice dimension n of the space R.sub.q in which a polynomial operation is performed.
(47) The values of these coefficients are derived from the values of each of the elements of the original vectors A and B, and a part of or all the elements of the vectors A and B can be definitely or stochastically derived from these coefficients. As a result, not only the result of the operation to be reported but also the information on the vectors A and B to be secured are leaked to the decryptor who decrypts the result of the cryptographic operation to obtain the result of the operation.
(48) In particular, when the decryptor knows one of the vector A and the vector B, or when the decryptor can intentionally determine one of the vector A and the vector B, there is a significant leakage of information. Further, anyone can prepare cryptographic data on an intentionally created vector because the vector A and the vector B are encrypted by a public key. Thus, it is difficult to prevent the information from being leaked by the protection provided by the encryption.
(49) The above-mentioned problem may occur not only when an encrypted secured distance is decrypted but also when cryptographic information that represents a result of multiplying two encrypted polynomials is decrypted.
(50)
(51)
(52) The first encrypted polynomial is a polynomial obtained by encrypting the first polynomial that corresponds to the first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked. The output unit 113 outputs cryptographic information that represents the third encrypted polynomial (Step 202).
(53) Such a cryptographic processing device 101 permits preventing of a leakage of a vector element when the cryptographic information generated by a cryptographic multiplication of vectors is decrypted.
(54)
(55) The terminal 301-1 and the terminal 301-2 encrypt biometric information and send it to the cryptographic processing device 101, and are, for example, a device of a user who knows a vector that represents the biometric information and a public key.
(56) The cryptographic processing device 101 performs a cryptographic operation using encrypted vectors and sends a result of the cryptographic operation to the authentication device 302, and is, for example, a device of a service provider who knows a public key. The authentication device 302 performs authentication by decrypting the result of the cryptographic operation, and is, for example, a device of a decryptor who knows a secret key.
(57)
(58) In the encryption 401-1, the terminal 301-1 transforms the vector A into a polynomial pm1(A) as described in Formula (23), and encrypts the polynomial pm1(A) using a homomorphic encryption so as to generate an encrypted polynomial E1(A). Then, the terminal 301-1 sends cryptographic information that represents the encrypted polynomial E1(A) to the cryptographic processing device 101, and the cryptographic processing device 101 stores the cryptographic information received from the terminal 301-1 in the storage 111 as registered cryptographic information 311. As cryptographic information that represents an encrypted polynomial, for example, a coefficient included in each term of the encrypted polynomial can be used.
(59) In an authentication mode, the terminal 301-2 obtains biometric information on a target to be authenticated, transforms characteristic information extracted from the biometric information into a vector B as described in Formula (22), and performs encryption 401-2. In the encryption 401-2, the terminal 301-2 transforms the vector B into a polynomial pm2(B) as described in Formula (24), and encrypts the polynomial pm2(B) using a homomorphic encryption so as to generate an encrypted polynomial E2(B). Then, the terminal 301-2 sends cryptographic information that represents the encrypted polynomial E2(B) to the cryptographic processing device 101.
(60) The cryptographic processing device 101 performs a cryptographic operation 402 by use of the encrypted polynomial E1(A) represented by the registered cryptographic information 311 and the encrypted polynomial E2(B) represented by the cryptographic information received from the terminal 301-1, and performs cryptographic masking 403 on a result of the cryptographic operation 402. Then, the cryptographic processing device 101 sends the cryptographic information generated by the cryptographic masking 403 to the authentication device 302.
(61) The authentication device 302 performs decryption 404 that decrypts the cryptographic information received from the cryptographic processing device 101 by use of a secret key, so as to generate a result of an operation of the vector A and the vector B. Then, the authentication device 302 authenticates the target to be authenticated on the basis of the generated result of the operation, and outputs an authentication result.
(62) The result of the operation of the vector A and the vector B may be an inner product of the vector A and the vector B, or may be a similarity based on the inner product (such as cosine similarity), or may be a dissimilarity based on the inner product (such as a Hamming distance and an Euclidean distance).
(63) For example, when the result of the operation is a similarity based on the inner product of the vector A and the vector B, the authentication device 302 can determine whether authentication has been successful by comparing the similarity to a threshold. In this case, it is determined that the authentication of the target to be authenticated has been successful when the similarity is greater than the threshold, and it is determined that the authentication has been unsuccessful when the similarity is not greater than the threshold.
(64) When the result of the operation is a dissimilarity based on the inner product of the vector A and the vector B, the authentication device 302 can determine whether authentication has been successful by comparing the dissimilarity to the threshold. In this case, it is determined that the authentication of the target to be authenticated has been successful when the dissimilarity is less than the threshold, and it is determined that the authentication has been unsuccessful when the dissimilarity is not less than the threshold.
(65)
(66) The result of the operation of the vector A and the vector B includes an inner product of the vector A and the vector B. This result of the operation may be the inner product of the vector A and the vector B, may be a sum of the inner product and another value, or may be a Hamming distance HD. A polynomial L that corresponds to the result of the cryptographic operation E(L) may be a polynomial D that corresponds to E(D) in Formula (27), or may be a polynomial D.sub.H that corresponds to E(D.sub.H) in Formula (28)
(67) Next, the generator 112 performs cryptographic masking on the result of the cryptographic operation E(L) so as to mask, by random numbers, coefficients in one or more terms included in the polynomial L other than the term having a coefficient that represents the result of the operation of the vector A and the vector B (Step 502). Vector elements are less likely to be leaked by a decryption result if there are more masked coefficients.
(68)
(69) The polynomial pm1(A) is a polynomial of degree d1 and the polynomial pm2(B) is a polynomial of degree d, so the degree of the polynomial L is at most 2d1. Further, when n is less than 2d, the degree of the polynomial L is at most n1 if x.sup.n=1 is used.
(70) Then, when n is less than 2d (Step 601, YES), the generator 112 sets n as a variable N that represents the number of random numbers (Step 602), and when n is not less than 2d (Step 601, NO), the generator 112 sets 2d as a variable N (Step 603).
(71) Next, in the polynomial L, d+1 mod n is set as a variable M that indicates a term x.sup.M1 having a coefficient that represents the result of the operation of the vector A and the vector B (Step 604), so as to generate an n-dimensional random vector R like the following formula (Step 605):
R=(r.sub.1,r.sub.2,r.sub.3, . . . ,r.sub.N)(41)
(72) r.sub.1 to r.sub.M1 and r.sub.M+1 to r.sub.N in Formula (41) are random numbers, and r.sub.M is a constant 0.
(73) Next, the generator 112 transforms the random vector R into a mask polynomial pm(R) like the following formula by an ascending-order transformation that is similar to Formula (23) (Step 606).
pm(R)=r.sub.1+r.sub.2x+r.sub.3x.sup.2+ . . . +r.sub.M1x.sup.M2+r.sub.M+1x.sup.M+ . . . r.sub.Nx.sup.N1(42)
(74) The mask polynomial pm(R) is a polynomial of degree N1 in which only a coefficient in the term x.sup.M1 is 0. For example, when n is not less than 2d, N=2d and M=d+1, and a result of the operation of the vector A and the vector B appears in the term x.sup.d in the polynomial L, with the result that r.sub.d+1 becomes 0. On the other hand, when n is less than 2d, N=d and M=d+1 mod n. In particular, N=d=n and M=1 when n=d, and the result of the operation of the vector A and the vector B does not appear in the term x.sup.d but in the term x.sup.0 (constant term) in the polynomial L, so the constant term r.sub.1 in the mask polynomial pm(R) becomes 0.
(75) The generator 112 encrypts the mask polynomial pm(R) by a homomorphic encryption so as to generate an encrypted mask polynomial E(pm(R)).
(76) Next, the generator 112 adds the encrypted mask polynomial E(pm(R)) to the result of the cryptographic operation E(L), so as to generate an encrypted polynomial E(L) that corresponds to an encrypted result in which the coefficients in the terms other than the term x.sup.M1 in the polynomial L are masked (Step 607).
E(L)=E(L)+E(pm(R))(43)
(77) Then, the output unit 113 sends cryptographic information that represents the encrypted polynomial E(L) to the authentication device 302.
(78) The cryptographic operation at Step 501 in
(79)
(80) Then, the authentication device 302 determines whether authentication has been successful by comparing the obtained result of the operation to a threshold, and outputs an authentication result about the target to be authenticated (Step 704).
(81) According to the cryptographic masking in
(82) The vector A and the vector B are vectors based on biometric information on a user, so it may be highly confidential. Further, a person who knows the vector A is able to be successful in authenticating by accessing the cryptographic processing device 101 spoofing a registrant who has registered the encrypted polynomial E1(A). Thus, it is important to secure the information on the vector A and the vector B in the biometric system. It is possible to effectively secure the information on the vector A and the vector B by performing cryptographic masking on the result of the cryptographic operation E(L).
(83) Further, it is also possible to shift a degree M1 of a term that is not masked in the polynomial L by an integer k not less than 1 using k as the number of shifts. For example, in the encryption 401-1 in
(84)
(85)
(86) The operation of multiplying the polynomial pm1(A) by x.sup.k can be considered a shift operation (rotation operation).
(87) Next, the terminal 301-1 encrypts the polynomial pm1(A) by a homomorphic encryption so as to generate an encrypted polynomial E(pm1(A)) (Step 803). Then, the terminal 301-1 generates cryptographic information using the encrypted polynomial E(pm1(A)) as an encrypted polynomial E1(A), and sends the generated cryptographic information to the cryptographic processing device 101.
(88) On the other hand, the terminal 301-2 generates an encrypted polynomial E2(B) without shifting a degree of a polynomial pm2(B) in the encryption 401-2.
(89) The cryptographic processing device 101 performs the cryptographic operation 402 by use of the encrypted polynomial E1(A) and the encrypted polynomial E2(B) so as to generate a result of the cryptographic operation E(L). In this case, the generator 112 performs the cryptographic operation 402 so that the degree of the term in which a result of the operation of the vector A and the vector B appears in the polynomial L is shifted by k. For example, when the polynomial L corresponds to a polynomial D of an inner product, the generator 112 generates a result of the cryptographic operation E(D) by Formula (27).
(90) On the other hand, when the polynomial L corresponds to a polynomial D.sub.H of a Hamming distance, the generator 112 generates a polynomial pm1(C) by multiplying a polynomial pm1(C) by x.sup.k.
(91)
(92) Then, the generator 112 generates an encrypted polynomial E(pm1(C)) and generates a result of the cryptographic operation E(D.sub.H) by Formula (28) using the encrypted polynomial E(pm1(C)) as an encrypted polynomial E1(C).
(93)
(94) When the value of N has been set, the generator 112 sets d+k+1 mod n as a variable M which indicates the term x.sup.M1 in the polynomial L (Step 904), and performs the processes at and after Step 905.
(95) Then, the output unit 113 sends to the authentication device 302 cryptographic information that represents the encrypted polynomial E(L). Also, in the polynomial L, the degree of the term in which a result of the operation of the vector A and the vector B appears is shifted by k.
(96)
(97) When the polynomial L has been generated, the authentication device 302 obtains the value of M performing a process similar to Step 904 in
(98)
(99) The authentication device 302 encrypts x.sup.k using a homomorphic encryption so as to generate E(x.sup.k), and multiplies the encrypted polynomial E(L) by E (x.sup.k) (Step 1101). As a result, the degree of the term in which a result of the operation of the vector A and the vector B appears in the polynomial L is shifted by -k, and the effect of the shift operation performed by the terminal 301-1 is canceled. After that, the authentication device 302 performs the processes at and after Step 1102.
(100) According to the shift operation described above, a cryptographic processing device that does not store therein a value of k does not perform proper cryptographic masking, and an authentication device that does not store therein the value of k does not perform proper authentication processing. Thus, when a cryptographic processing device or authentication device that does not store therein a value of k is involved, a correct result of an operation of the vector A and the vector B is not generated, which results in enhancing the confidentiality of the result of the operation.
(101) In the encryption in
A=(0,0, . . . ,0,a.sub.1,a.sub.2,a.sub.3, . . . ,a.sub.d)(53)
(102) The first to the kth elements of the vector A in Formula (53) are 0, and the (k+1)th to the (k+d)th elements are a.sub.1to a.sub.d. In this case, the polynomial pm1(A) is equivalent to the polynomial pm1(A).
(103) Further, instead of the terminal 301-1 shifting the degree d1 of the polynomial pm1(A) by k, the terminal 301-2 may shift the degree d of the polynomial pm2(B) by k. As a result, the degree M1 of the term in which the result of the operation appears in the polynomial L can be shifted by k.
(104) In this case, the terminal 301-1 generates an encrypted polynomial E1(A) without shifting the degree of the polynomial pm1(A).
(105) On the other hand, the terminal 301-2, the cryptographic processing device 101, and the authentication device 302 store therein a value of k, and the terminal 301-2 performs encryption as in
(106)
(107) Then, the terminal 301-2 generates cryptographic information using an encrypted polynomial E(pm2(B)) as an encrypted polynomial E2(B), and sends the generated cryptographic information to the cryptographic processing device 101.
(108) When the polynomial L corresponds to a polynomial D of an inner product, the generator 112 of the cryptographic processing device 101 generates a result of the cryptographic operation E(D) by using Formula (27). On the other hand, when the polynomial L corresponds to a polynomial D.sub.H of a Hamming distance, the generator 112 generates a polynomial pm2(C) by multiplying a polynomial pm2(C) by x.sup.k.
(109)
(110) Then, the generator 112 generates an encrypted polynomial E(pm2(C)) and generates a result of the cryptographic operation E(D.sub.H) by using Formula (28) using the encrypted polynomial E(pm2(C)) as an encrypted polynomial E2(C).
(111) The cryptographic masking performed by the cryptographic processing device 101 is similar to that in
(112) The polynomial pm2(B) may be generated after the vector B is transformed into a (d+k) -dimensional vector B like the following formula instead of the polynomial pm2(B) being multiplied by x.sup.k.
B=(b.sub.1,b.sub.2,b.sub.3, . . . ,b.sub.d,0,0, . . . ,0)(56)
(113) The first to the dth elements of the vector B in Formula (56) are b.sub.1 to b.sub.d, and the (d+1) th to the (d+k)th elements are 0. In this case, the polynomial pm2(B) is equivalent to the polynomial pm2 (B).
(114) The operation of multiplying the polynomial pm1(A) or the polynomial pm2(B) by x.sup.k can also be performed on the encrypted polynomial E1(A) or the encrypted polynomial E2(B) in a state in which the polynomial remains encrypted. Thus, instead of the terminal 301-1 or the terminal 301-2, the cryptographic processing device 101 may multiply the encrypted polynomial E1(A) or the encrypted polynomial E2(B) by E(x.sup.k). Alternatively, the cryptographic processing device 101 may multiply a result of the cryptographic operation E (L) by E (x.sup.k).
(115) The processes at Steps 901 to 906 in
(116) The process at Step 1101 in
(117) The operation of shifting the degrees that are not to be masked in the polynomial L can also be performed in a plurality of steps, not at one time. For example, the terminal 301-1 may shift a degree d1 of a polynomial pm1(A) by k1 and the cryptographic processing device 101 may shift a degree of a result of a cryptographic operation E(L) by k2 using k1 and k2 (k1 and k2 are integers not less than 1) that satisfy k=k1+k2. As a result, a degree M1 of the term in which a result of the operation appears in the polynomial L can be shifted by k.
(118) In this case, the terminal 301-1 stores therein the value of k1, and the cryptographic processing device 101 and the authentication device 302 store therein the values of k1 and k2.
(119)
(120)
(121) When the result of the cryptographic operation E(L) is generated, the generator 112 encrypts x.sup.k2 by a homomorphic encryption so as to generate E(x.sup.k2), and multiplies the result of the cryptographic operation E(L) by E(x.sup.k2) (Step 1302). As a result, the degree of the result of the cryptographic operation E(L) is shifted by k2. After that, the generator 112 performs the cryptographic masking at Step 1303. The authentication processing performed by the authentication device 302 is similar to the processing in
(122) The shift operation at Step 1302 can also be performed after Step 1303. In this case, the generator 112 performs the cryptographic masking at Step 1303, replacing k with k1, and then multiplies the generated encrypted polynomial E(L) by E(x.sup.k2).
(123) Instead of the terminal 301-1 shifting the degree d1 of the polynomial pm1(A) by k1, the terminal 301-2 may shift the degree d of the polynomial pm2(B) by k1.
(124) As described above, various methods are considered for which device performs a shift operation and in how many steps the shift operation is performed. However, a shift operation and a mask operation can be combined in any of the methods.
(125) The encrypted mask polynomial E(pm(R)) is generated depending on a public key pk, a dimension d of the vector A and the vector B, and the number of shifts k, and does not depend on the elements of the vector A and the vector B. Thus, for some applications, the encrypted mask polynomial E(pm(R)) can be generated before the vector A and the vector B are encrypted.
(126) If the encrypted mask polynomial E(pm(R)) has been generated in advance, it is possible to reduce the time for cryptographic masking.
(127) At Step 605 in
(128) The configurations of the cryptographic processing device 101 in
(129) In the biometric system in
(130) Further, the cryptographic processing device 101 in
(131) The flowcharts illustrated in
(132) Further, in the cryptographic masking in
(133) Formulas (1) to (17), (21) to (31), (41) to (43), and (51) to (56) are merely examples, and other formulations may be used. For example, instead of the ascending-order transformation in Formula (23) being used for the vector A for a registrant and the descending-order transformation in Formula (24) being used for the vector B for a target to be authenticated, the ascending-order transformation may be used for the vector B and the descending-order transformation for the vector A.
(134) The cryptographic processing device 101, the terminal 301-1, the terminal 301-2, and the authentication device 302 in
(135) The cryptographic processing device 101, the terminal 301-1, the terminal 301-2, and the authentication device 302 can also be realized by using an information processing device (computer) as illustrated in
(136) The information processing device in
(137) The memory 1402 is, for example, a semiconductor memory such as a read only memory (ROM), a random access memory (RAM), and a flash memory. The memory 1402 stores therein a program and data used for processing performed by the cryptographic processing device 101, the terminal 301-1, the terminal 301-2, or the authentication device 302. The memory 1402 can be used as the storage 111.
(138) When the information processing device is the cryptographic processing device 101, the CPU 1401 (processor) operates as the generator 112 to perform cryptographic processing by executing the program by use of the memory 1402.
(139) When the information processing device is the terminal 301-1, the terminal 301-2, or the authentication device 302, the CPU 1401 performs the processing to be performed by the terminal 301-1, the terminal 301-2, or the authentication device 302 by executing the program by use of the memory 1402.
(140) The input device 1403 is, for example, a keyboard or a pointing device, and is used for inputting instructions or information from a user or an operator. The output device 1404 is, for example, a display, a printer, or a speaker, and is used for outputting inquiries to the user or the operator, or a result of processing. The result of processing may be a determination result of the authentication processing performed by the authentication device 302.
(141) The auxiliary storage 1405 is, for example, a magnetic disk device, an optical disk device, a magneto-optical disk device, or a tape device. The auxiliary storage 1405 may be a hard disk drive or a flash memory. The information processing device stores the program and the data in the auxiliary storage 1405 so as to load them into the memory 1402 and use them. The auxiliary storage 1405 can be used as the storage 111.
(142) The medium driving device 1406 drives a portable recording medium 1409 so as to access the recorded content. The portable recording medium 1409 is, for example, a memory device, a flexible disk, an optical disc, or a magneto-optical disk. The portable recording medium 1409 may be, for example, a compact disk read only memory (CD-ROM), a digital versatile disk (DVD), or a universal serial bus (USB) memory. The operator or the user can store the program and the data in the portable recording medium 1409 so as to load them into the memory 1402 and use them.
(143) As described above, a computer-readable recording medium that stores therein a program and data is a physical (non-transitory) recording medium such as the memory 1402, the auxiliary storage 1405, and the portable storage medium 1409.
(144) The network connecting device 1407 is a communication interface that is connected to a communication network such as a local area network (LAN) or the Internet and makes a data conversion associated with communication. The information processing device can receive the program and the data from an external device via the network connecting device 1407 so as to load them into the memory 1402 and use them. The network connecting device 1407 can be used as the output unit 113.
(145) The information processing device does not necessarily include all the components in
(146) All examples and conditional language provided herein are intended for the pedagogical purposes of aiding the reader in understanding the invention and the concepts contributed by the inventor to further the art, and are not to be construed as limitations to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although one or more embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.