ANONYMOUS BROADCAST METHOD, KEY EXCHANGE METHOD, ANONYMOUS BROADCAST SYSTEM, KEY EXCHANGE SYSTEM, COMMUNICATION DEVICE, AND PROGRAM
20220337428 · 2022-10-20
Assignee
Inventors
- Reo YOSHIDA (Musashino-shi, JP)
- Tetsutaro KOBAYASHI (Musashino-shi, JP)
- Yuto KAWAHARA (Musashino-shi, JP)
- Hitoshi FUJI (Musashino-shi, JP)
- Kazuki YONEYAMA (Hitachi-shi, JP)
Cpc classification
H04L9/30
ELECTRICITY
H04L9/0841
ELECTRICITY
H04L9/3073
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
H04L9/08
ELECTRICITY
Abstract
A key exchange technique of performing a key exchange among N (≥2) parties, which can conceal metadata on communication, is provided. A key exchange method includes: a first key generation step in which a communication device U.sub.i generates a first key; a first anonymous broadcast step in which the communication device U; anonymously broadcasts the first key with a set R-{U.sub.i} being designated for i∈{1, . . . , n} and the communication device U.sub.i anonymously broadcasts the first key with φ being designated for i∈{n+1, . . . , N}; a second key generation step in which the communication device U.sub.i generates a second key; a second anonymous broadcast step in which the communication device U.sub.i anonymously broadcasts the second key with the set R-{U.sub.i} being designated for i∈{1, . . . , n} and the communication device U.sub.i anonymously broadcasts the second key with φ being designated for i∈{n+1, . . . , N}; and a session key generation step in which the communication device U.sub.i generates a session key SK for i∈{1, . . . , n} if a predetermined condition is satisfied.
Claims
1. A key exchange method, wherein N is assumed to be an integer greater than or equal to 2 and L is assumed to be an integer greater than or equal to 1, the key exchange method allows communication devices of N communication devices U.sub.1, . . . , U.sub.N, the communication devices included in a set R of communication devices={U.sub.1, . . . , U.sub.n} (2≤n≤N), to share a session key SK, ID.sub.i (1≤i≤N) is assumed to be an identifier of a communication device U.sub.i, MPK.sub.j(1≤j≤L) is assumed to be a master public key of an anonymous ID-based broadcast encryption scheme, SMPK.sub.j(1≤j≤L) is assumed to be a master public key of an ID-based signature scheme, dk.sub.i.sup.(j) (1≤i≤N, 1≤j≤L) is assumed to be a decryption key of the anonymous ID-based broadcast encryption scheme, sk.sub.i.sup.(j) (1≤i≤N, 1≤j≤L) is assumed to be a signature key of the ID-based signature scheme, G is assumed to be a finite cyclic group of prime number order p with generators g and h, and ∥ is assumed to be a concatenation operator, secret strings st.sub.i and st′.sub.i are recorded on a recording unit of the communication device U.sub.i (1≤i≤N), and the key exchange method includes a first key generation step in which for i∈{1, . . . , n}, the communication device U.sub.i calculates r.sub.i, k.sub.i, and s.sub.i using the secret strings st.sub.i and st′.sub.i by a twisted pseudo-random function and generates a first key (R.sub.i, c.sub.i) by calculating R.sub.i=g.sup.r_i and c.sub.i=g.sup.k_ih.sup.s_i and for i∈{n+1, . . . , N}, the communication device U.sub.i randomly selects R.sub.i, c.sub.i ∈.sub.RG and generates a first key (R.sub.i, c.sub.i), a first anonymous broadcast step in which for i∈{1, . . . , n}, the communication device U.sub.i anonymously broadcasts the first key (R.sub.i, c.sub.i) with a set R-{U.sub.i} being designated, and for i∈{n+1, . . . , N}, the communication device U.sub.i anonymously broadcasts the first key (R.sub.i, c.sub.i) with φ, which means no recipient, being designated, a second key generation step in which for i∈{2, . . . , n}, the communication device U.sub.i calculates a session ID sid using c.sub.k (1≤k≤n) by a target-collision resistant hash function, calculates K.sub.i.sup.(l) using (sid, R.sub.i−1.sup.r_i) by a pseudo-random function, calculates K.sub.i.sup.(r) using (sid, R.sub.i+1.sup.r_i) by a pseudo-random function, calculates T.sub.i by an exclusive OR of K.sub.i.sup.(l) and K.sub.i.sup.(r), randomly selects T′.sub.i∈.sub.RZ.sub.p.sup.2, generates a signature σ.sub.i←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i)) from a master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), and a message (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i), and generates a second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i), for i=1, a communication device U.sub.1 calculates a session ID sid from c.sub.k (1≤k≤n) by a target-collision resistant hash function, calculates K.sub.1.sup.(l) using (sid, R.sub.n.sup.r_1) by a pseudo-random function, calculates K.sub.1.sup.(r) using (sid, R.sub.2.sup.r_1) by a pseudo-random function, calculates T.sub.1 by an exclusive OR of K.sub.1.sup.(l) and K.sub.1.sup.(r), calculates T′ by an exclusive OR of K.sub.1.sup.(l) and k.sub.1∥s.sub.1, randomly selects k″.sub.1, s″.sub.1 ∈.sub.RZ.sub.p, generates a signature σ.sub.1←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′)) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), and a message (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′), and generates a second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1), and for i∈{n+1, . . . , N}, the communication device U.sub.i randomly selects k.sub.i, s.sub.i∈.sub.RZ.sub.p, T.sub.i, T′.sub.i∈.sub.RZ.sub.p.sup.2, and σ.sub.i ∈.sub.RΣ (where Σ is a signature space) and generates a second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i), a second anonymous broadcast step in which for i∈{2, . . . , n}, the communication device U.sub.i anonymously broadcasts the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with the set R-{U.sub.i} being designated, for i=1, the communication device U.sub.1 anonymously broadcasts the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) with a set R-{U.sub.1} being designated, and for i∈{n+1, . . . , N}, the communication device U.sub.i anonymously broadcasts the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with the φ being designated, and a session key generation step in which for i∈{2, . . . , n}, when the communication device U.sub.i obtains the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) and a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) (2≤k≤n, k≠i), the communication device U.sub.i generates a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), and a signature σ.sub.k, if the signature σ.sub.k is successfully verified, calculates K.sub.1.sup.(l) by an exclusive OR of K.sub.i.sup.(l) and an exclusive OR of T.sub.j (1≤j≤i−1), calculates k.sub.1∥s.sub.1 by an exclusive OR of T′ and K.sub.1.sup.(l) and, if c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n, generates the session key SK using the sid and an exclusive OR of the k.sub.i (1≤i≤n) by a pseudo-random function, and for i=1, when the communication device U.sub.1 obtains a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) (2≤k≤n), the communication device U.sub.1 generates a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), and a signature σ.sub.k and, if the signature σ.sub.k is successfully verified and c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n, generates the session key SK using the sid and an exclusive OR of the k.sub.i (1≤i≤n) by a pseudo-random function.
2. A key exchange system, wherein N is assumed to be an integer greater than or equal to 2 and L is assumed to be an integer greater than or equal to 1, the key exchange system allows communication devices of N communication devices U.sub.1, . . . , U.sub.N, the communication devices included in a set R of communication devices={U.sub.1, . . . , U.sub.n} (2≤n≤N), to share a session key SK, ID.sub.i (1≤i≤N) is assumed to be an identifier of a communication device U.sub.i, MPK.sub.j (1≤j≤L) is assumed to be a master public key of an anonymous ID-based broadcast encryption scheme, SMPK.sub.j (1≤j≤L) is assumed to be a master public key of an ID-based signature scheme, dk.sub.i.sup.(j) (1≤i≤N, 1≤j≤L) is assumed to be a decryption key of the anonymous ID-based broadcast encryption scheme, sk.sub.i.sup.(j) (1≤i≤N, 1≤j≤L) is assumed to be a signature key of the ID-based signature scheme, G is assumed to be a finite cyclic group of prime number order p with generators g and h, and ∥ is assumed to be a concatenation operator, and the communication device U.sub.i (1≤i≤N) includes a recording unit on which secret strings st.sub.i and st′.sub.i are recorded, a first key generation unit that calculates, for i∈{1, . . . , n}, r.sub.i, k.sub.i, and s.sub.i using the secret strings st.sub.i and st′.sub.i by a twisted pseudo-random function and generates a first key (R.sub.i, c.sub.i) by calculating R.sub.i=g.sup.r_i and c.sub.i=g.sup.k_ih.sup.s_i, and randomly selects, for i∈{n+1, . . . , N}, R.sub.i, c.sub.i ∈.sub.RG and generates a first key (R.sub.i, c.sub.i), a first anonymous broadcast unit that anonymously broadcasts, for i∈{1, . . . , n}, the first key (R.sub.i, c.sub.i) with a set R-{U.sub.i} being designated, and anonymously broadcasts, for i∈{n+1, . . . , N}, the first key (R.sub.i, c.sub.i) with φ, which means no recipient, being designated, a second key generation unit that calculates, for i∈{2, . . . , n}, a session ID sid using c.sub.k (1≤k≤n) by a target-collision resistant hash function, calculates K.sub.i.sup.(l) using (sid, R.sub.i−1.sup.r_i) by a pseudo-random function, calculates K.sub.i.sup.(r) using (sid, R.sub.i+1.sup.r_i) by a pseudo-random function, calculates T.sub.i by an exclusive OR of K.sub.i.sup.(l) and K.sub.i.sup.(r), randomly selects T′i∈.sub.RZ.sub.p.sup.2, generates a signature σ.sub.i←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=, . . . , Lsk.sub.i.sup.(j), (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i)) from a master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), and a message (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i), and generates a second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i), calculates, for i=1, a session ID sid from c.sub.k (1≤k≤n) by a target-collision resistant hash function, calculates K.sub.1.sup.(l) using (sid, R.sub.n.sup.r_1) by a pseudo-random function, calculates K.sub.1.sup.(r) using (sid, R.sub.2.sup.r_1) by a pseudo-random function, calculates T.sub.1 by an exclusive OR of K.sub.1.sup.(l) and K.sub.1.sup.(r), calculates T′ by an exclusive OR of K.sub.1.sup.(l) and k.sub.1∥s.sub.1, randomly selects k″.sub.1, s″.sub.1 ∈.sub.RZ.sub.p, generates a signature σ.sub.1←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′)) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), and a message (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′), and generates a second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1), and randomly selects, for i∈{n+1, . . . , N}, k.sub.i, s.sub.i ∈.sub.RZ.sub.p, T.sub.i, T′.sub.i ∈.sub.RZ.sub.p.sup.2, and σ.sub.i ∈.sub.RΣ (where Σ is a signature space) and generates a second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i), a second anonymous broadcast unit that anonymously broadcasts, for i∈{2, . . . , n}, the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with the set R-{U.sub.i} being designated, anonymously broadcasts, for i=1, the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) with a set R-{U.sub.1} being designated, and anonymously broadcasts, for i∈{n+1, . . . , N}, the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with the φ being designated, and a session key generation unit that generates, for i∈{2, . . . , n}, when obtaining the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) and a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) (2≤k≤n, k≠i), a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, S.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), and a signature σ.sub.k, if the signature σ.sub.k is successfully verified, calculates K.sub.1.sup.(l) by an exclusive OR of K.sub.i.sup.(l) and an exclusive OR of T.sub.j (1≤j≤i−1), calculates k.sub.1∥s.sub.1 by an exclusive OR of T′ and K.sub.1.sup.(l), and, if c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n, generates the session key SK using the sid and an exclusive OR of the k.sub.i (1≤i≤n) by a pseudo-random function, and generates, for i=1, when obtaining a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) (2≤k≤n), a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), and a signature σ.sub.k and, if the signature σ.sub.k is successfully verified and c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n, generates the session key SK using the sid and an exclusive OR of the k.sub.i (1≤i≤n) by a pseudo-random function.
3. A communication device with which the key exchange system according to claim 2 is configured.
4. A program for making a computer function as a communication device with which the key exchange system according to claim 2 is configured.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0023] Hereinafter, an embodiment of the present invention will be described in detail. It is to be noted that component units having the same function will be identified with the same reference character and overlapping explanations will be omitted.
[0024] <Notation System>
[0025] Prior to explanations of the embodiment, a notation system which is used in this specification will be explained.
[0026] An underscore (_) represents a subscript. For example, x.sup.y_z denotes that y.sub.z is a superscript attached to x and x.sub.y_z denotes that y.sub.z is a subscript attached to x.
[0027] Randomly selecting an element in from a given set Set is written as m∈.sub.RSet.
[0028] When a given algorithm ALG outputs y for input x and a random number r, this output is written as y←ALG(x;r). It is to be noted that, if ALG is a deterministic algorithm, the random number r is a null.
[0029] κ is assumed to be a security parameter.
[0030] [Pseudo-Random Function (PRF)]
[0031] F={F.sub.κ:Dom.sub.κ×FS.sub.κ.fwdarw.Rng.sub.κ}.sub.κ is assumed to be a family of functions with a domain of definition {Dom.sub.κ}.sub.κ, a key space {FS.sub.κ}.sub.κ, and a range {Rng.sub.κ}.sub.κ. In this case, if it is impossible for a discriminator D in arbitrary polynomial time to discriminate between a function F.sub.κ and a true random function RF.sub.κ:Dom.sub.κ.fwdarw.Rng.sub.κ, F={F.sub.κ}.sub.κ is referred to as a family of pseudo-random functions. A specific example of a pseudo-random function is described in, for example, Reference Non-patent Literature 1 below. [0032] (Reference Non-patent Literature 1: O. Goldreich, “Modern Cryptography, Probabilistic Proofs and Pseudorandomness”, Springer-Verlag Tokyo, 2001)
[0033] [Target-Collision Resistant Hash Function]
[0034] H={H.sub.κ:Dom.sub.κ.fwdarw.Rng.sub.k}.sub.k is assumed to be a family of hash functions with a domain of definition {Dom.sub.k}.sub.k and a range {Rng.sub.κ}.sub.k. In this case, if it is impossible for an attacker A, who is provided with x∈.sub.RDom.sub.κ, in arbitrary polynomial time to find x′ (≠x) which makes H.sub.κ(x)=H.sub.κ(x′) hold, H={H.sub.κ}.sub.κ is referred to as a family of target-collision resistant hash functions. A specific example of a target-collision resistant hash function is described in, for example, Reference Non-patent Literature 2 below. [0035] (Reference Non-patent Literature 2: J. A. Buchmann, “Introduction to Cryptography—Edition 3”, Maruzen Publishing Co., Ltd., 2007)
[0036] [Twisted Pseudo-Random Function (Twisted PRF)]
[0037] A function tPRF: {0, 1}.sup.κ×FS.sub.κ×FS.sub.κ×{0, 1}.sup.κ.fwdarw.Rng.sub.κ is referred to as a twisted pseudo-random function and is defined as follows using a pseudo-random function F.sub.κ.
tPRF(a,a′,b,b′):=F.sub.κ(a,b)⊕F.sub.κ(b′,a′)
[0038] Here, a, b′∈{0, 1}.sup.κ and a′, b∈FS.sub.κ hold. A specific example of a twisted pseudo-random function is described in, for example, Reference Non-patent Literature 3 below. [0039] (Reference Non-patent Literature 3: Kazuki Yoneyama, “One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary”, IEICE Transactions, vol. E96-A, no. 6, pp. 1124-1138, 2013.)
[0040] [Mix-Net]
[0041] A mix-net system includes M (M is an integer greater than or equal to 2) mix-net servers S.sub.1, . . . , S.sub.M. The mix-net server S.sub.1, which is the first server, receives n (n is an integer greater than or equal to 2) input messages to be processed in one round (that is, a series of processing which is performed by S.sub.1, . . . , S.sub.M). Then, the mix-net servers shuffle the messages in the order of m=1, . . . , M. The mix-net server S.sub.M, which is the last server, outputs N (N is an integer greater than or equal to 2) output messages. Even if an arbitrary outside attacker colludes with an M−1 mix-net server, the attacker cannot know the relationship between the input messages and the output messages. A specific example of a secure mix-net protocol is described in, for example, Reference Non-patent Literature 4 below. [0042] (Reference Non-patent Literature 4: Miyako Ohkubo, Masayuki Abe, “A Length-Invariant Hybrid Mix”, ASIACRYPT'00, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 178-191, 2000.)
[0043] [Anonymous ID-Based Broadcast Encryption (AIBBE) Scheme]
[0044] An anonymous ID-based broadcast encryption scheme consists of the following four algorithms.
[0045] A master key generation algorithm (1.sup.κ) outputs a master secret key MSK and a master public key MPK using the security parameter x as input. A key generation center KGC is provided with the master secret key MSK. Moreover, the master public key MPK is made public.
[0046] A decryption key generation algorithm (MSK, ID.sub.i) outputs a decryption key dk.sub.i using the master secret key MSK and an identifier ID.sub.i of a user i (1≤i≤N) as input. The decryption key dk.sub.i is securely transmitted to the user i.
[0047] An encryption algorithm (MPK, M, R) outputs cipher text CT using the master public key MPK, plaintext M, and a set R of recipients as input. Here, the set R of recipients is a set of identifiers of users who are the recipients of the plaintext M.
[0048] A decryption algorithm (dk.sub.i, CT) outputs, if the identifier ID.sub.i of the user i is included in the set R of recipients, the plaintext M using the decryption key dk.sub.i and the cipher text CT as input.
[0049] A specific example of a secure AIBBE scheme is described in, for example, Reference Non-patent Literature 5 below. [0050] (Reference Non-patent Literature 5: Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng, “Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security”, ASIA CCS'16, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 247-255, 2016.)
[0051] An anytrust anonymous ID-based broadcast encryption (anytrust-AIBBE: AT-AIBBE) scheme is defined by using the anonymous ID-based broadcast encryption scheme. To distribute credibility, the AT-AIBBE scheme includes a plurality of key generation centers (KGC.sub.1, . . . , KGC.sub.L) (L is an integer greater than or equal to 1). A key generation center KGC.sub.j (1≤j≤L) makes a master public key MPK.sub.j public. Moreover, the key generation center KGC.sub.j (1≤j≤L) generates a decryption key dk.sub.i.sup.(j) for a user i (1≤i≤N). The user i (1≤i≤N) encrypts plaintext M and obtains cipher text CT←(Σ.sub.j=1, . . . , LMPK.sub.j, M, R). Furthermore, the user i (1≤i≤N) decrypts the cipher text CT and obtains the plaintext M←(Σ.sub.j=1, . . . , Ldk.sub.i.sup.(j), CT) (only if an identifier ID.sub.i of the user i is included in a set R of recipients). Even if an L−1 key generation center of the key generation center KGC.sub.j (1≤j≤L) has a malicious intention, the L−1 key generation center cannot decrypt the cipher text CT.
[0052] [ID-Based Signature Scheme]
[0053] An ID-based signature scheme consists of the following four algorithms.
[0054] A master key generation algorithm (1.sup.κ) outputs a master secret key SMSK and a master public key SMPK using the security parameter K as input. A key generation center KGC is provided with the master secret key SMSK. Moreover, the master public key SMPK is made public.
[0055] A signature key generation algorithm (SMSK, ID.sub.i) outputs a signature key sk.sub.i using the master secret key SMSK and an identifier ID.sub.i of a user i (1≤i≤N) as input. The signature key sk.sub.i is securely transmitted to the user i.
[0056] A signature generation algorithm (SMPK, sk.sub.i, M) outputs a signature σ using the master public key SMPK, the signature key sk.sub.i, and a message M as input.
[0057] A signature verifying algorithm (SMPK, ID.sub.i, M, σ) outputs a verification result Ver (for example, 0 or 1 as a binary indicating the verification result) using the master public key SMPK, the identifier ID.sub.i of the user i, the message M, and the signature σ as input.
[0058] An anytrust ID-based signature (anytrust-IBS: AT-IBS) scheme is defined by using the ID-based signature scheme. To distribute credibility, the AT-TBS scheme includes a plurality of key generation centers (KGC.sub.1, . . . , KGC.sub.L) (L is an integer greater than or equal to 1). A key generation center KGC.sub.j (1≤j≤L) makes a master public key SMPK.sub.j public. Moreover, the key generation center KGC.sub.j (1≤j≤L) generates a signature key sk.sub.i.sup.(j) for a user i (1≤i≤N). The user i (1≤i≤N) obtains a signature σ←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.=1, . . . , Lsk.sub.i.sup.(j), M) as a signature for a message M. Furthermore, the user i (1≤i≤N) verifies the signature σ and obtains a verification result Ver←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.i, M, σ). Even if an L−1 key generation center of the key generation center KGC.sub.j (1≤j≤L) has a malicious intention, the L−1 key generation center cannot forge the signature σ.
[0059] <System Configuration>
[0060] As illustrated in
[0061] As illustrated in
[0062] Here, the first anonymous broadcast unit 410-1 and the second anonymous broadcast unit 410-2 each provide a function for sharing a message between communication devices belonging to a designated set of communication devices. That is, the first anonymous broadcast unit 410-1 and the second anonymous broadcast unit 410-2 provide the same function. Therefore, the first anonymous broadcast unit 410-1 and the second anonymous broadcast unit 410-2 will be explained as an anonymous broadcast unit 410 in the following description. As illustrated in
[0063] A key exchange method of the embodiment is implemented as a result of these key generation servers 100.sub.1, . . . , 100.sub.L, the release server 200, the mix-net servers 300.sub.1, . . . , 300.sub.M, and the communication devices 400.sub.1, . . . 400.sub.N performing processing in steps illustrated in
[0064] The key generation servers 100.sub.1, . . . , 100.sub.L, the release server 200, the mix-net servers 300.sub.1, . . . , 300.sub.M, and the communication devices 400.sub.1, . . . 400.sub.N are each a special device configured as a result of a special program being read into a publicly known or dedicated computer including, for example, a central processing unit (CPU), a main storage unit (random access memory: RAM), and so forth. Each device executes each processing under the control of the central processing unit, for example. The data input to each device and the data obtained by each processing are stored in the main storage unit, for instance, and the data stored in the main storage unit is read into the central processing unit when necessary and used for other processing. At least part of each processing unit of each device may be configured with hardware such as an integrated circuit.
[0065] Each of the recording units of the key generation servers 100.sub.1, . . . , 100.sub.L, the release server 200, the mix-net servers 300.sub.1, . . . , 300.sub.M, and the communication devices 400.sub.1, . . . , 400.sub.N can be configured with, for example, a main storage unit such as random access memory (RAM), an auxiliary storage unit configured with a hard disk, an optical disk, or a semiconductor memory device such as flash memory, or middleware such as a relational database or a key-value store. When the recording unit stores secret information, it is desirable that the recording unit is a tamper-resistant storage unit (for example, a SIM card).
[0066] In the following explanation, symbols are defined as follows. U.sub.i (i∈{1, . . . , N}) is assumed to denote N communication devices 400.sub.1, . . . , 400.sub.N. Likewise, S.sub.m (m∈{1, . . . , M}) is assumed to denote M mix-net servers 300.sub.1, . . . , 300.sub.M.
[0067] Moreover, p is assumed to be a K-bit prime number and G is assumed to be a finite cyclic group of order p with generators g and h. TCR:{0, 1}*.fwdarw.{0, 1}.sup.κ is assumed to be a target-collision resistant hash function. tPRF:{0, 1}.sup.κ×FS.sub.κ×FS.sub.κ×{0, 1}.sup.κ.fwdarw.Z.sub.p and tPRF′:{0, 1}.sup.κ×FS.sub.κ×FS.sub.κ×{0, 1}.sup.κ.fwdarw.FS.sub.κ are assumed to be twisted pseudo-random functions. F:{0, 1}.sup.κ×G.fwdarw.Z.sub.p.sup.2, F′:{0, 1}.sup.κ×Z.sub.p.fwdarw.FS.sub.κ, F″:{0, 1}.sup.κ×FS.sub.κ.fwdarw.{0, 1}.sup.κ, and F′″:{0, 1}.sup.κ×FS.sub.κ.fwdarw.Z.sub.p are assumed to be pseudo-random functions.
[0068] <System Setup>
[0069] A processing procedure of system setup in the key exchange method of the embodiment will be described with reference to
[0070] The operation of a key generation server 100.sub.j (1≤j≤L) will be described with reference to
[0071] Next, in Step S102, the decryption key and signature key generation unit 102 of the key generation server 100.sub.j (1≤j≤L) generates a decryption key dk.sub.i.sup.(j)←(MSK.sub.j, ID.sub.i) from the master secret key MSK.sub.j and an identifier ID.sub.i of a communication device U.sub.i (1≤i≤N) by the decryption key generation algorithm of the anonymous ID-based broadcast encryption scheme and generates a signature key sk.sub.i.sup.(j)←(SMSK.sub.j, ID.sub.i) from the master secret key SMSK.sub.j and the identifier ID.sub.i of the communication device U.sub.i (1≤i≤N) by the signature key generation algorithm of the ID-based signature scheme. The key generation server 100.sub.j (1≤j≤L) transmits the decryption key dk.sub.i.sup.(j) and the signature key sk.sub.i.sup.(j) to the communication device U.sub.i (1≤i≤N) using the transmitting and receiving unit 198. The communication device U.sub.i records the received decryption key dk.sub.i.sup.(j) and signature key sk.sub.i.sup.(j) (1≤j≤L) on the recording unit 499. Moreover, the communication device U.sub.i obtains the master public keys (MPK.sub.j, SMPK.sub.j) (1≤j≤L) and records the master public keys (MPK.sub.j, SMPK.sub.j) on the recording unit 499.
[0072] It is to be noted that the master secret keys (MSK.sub.j, SMSK.sub.j) which are generated by the key generation server 100.sub.j are periodically updated to ensure the forward confidentiality of metadata. The period of this update can be set so that an update is performed once per day, for example.
[0073] The operation of the release server 200 will be described with reference to
[0074] The operation of the communication device U.sub.i (1≤i≤N) will be described with reference to
[0075] <Anonymous Broadcast>
[0076] A processing procedure of anonymous broadcast in the key exchange method of the embodiment will be described with reference to
[0077] A set of communication devices is assumed to be R={U.sub.i_1, . . . , U.sub.i_n} (where {i.sub.1, . . . , i.sub.n}.Math.{1, . . . , N}), and a communication device U.sub.i_k (1≤k≤n) performs anonymous broadcast so as to share a message M.sub.i_k with each communication device belonging to the set R with the message M.sub.i_k being concealed. That is, each communication device belonging to the set R can receive messages M.sub.i_1, . . . , M.sub.i_n, but each communication device which does not belong to the set R cannot receive the messages M.sub.i_1, . . . , M.sub.i_n.
[0078] Hereinafter, for the sake of simplification, an explanation will be given on the assumption that the set R={U.sub.i_1, . . . , U.sub.i_n}={U.sub.1, . . . , U.sub.n}. This does not lead to loss of generality.
[0079] In anonymous broadcast in one round (one unit of processing), the following three procedures are executed.
[0080] (1) Signature and Encryption
[0081] This procedure is executed separately in two cases: a case where the communication device U.sub.i is included in the set R and a case where the communication device U.sub.i is not included in the set R.
[0082] In Step S411, if U.sub.i∈R, the cipher text generation unit 411 of the communication device U.sub.i generates, from a master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), and a message (ID.sub.i, M.sub.i) (that is, a tuple of the identifier ID.sub.i of the communication device U.sub.i, which is a source, and an original message M.sub.i to be shared), a signature ω.sub.i←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), (ID.sub.i, M.sub.i)) for the message (ID.sub.i, M.sub.i) by the signature generation algorithm of the ID-based signature scheme. The cipher text generation unit 411 of the communication device U.sub.i generates cipher text C.sub.i←(Σ.sub.j=1, . . . , LMPK.sub.j, (ID.sub.i, ω.sub.i, M.sub.i), (R-{U.sub.i})) from a master public key Σ.sub.j=1, . . . , LMPK.sub.j, plaintext (ID.sub.i, ω.sub.i, M.sub.i) (that is, a tuple of the identifier ID.sub.i of the communication device U.sub.i, the signature ω.sub.i, and the original message M.sub.i) and a set R-{U.sub.i} of recipients by the encryption algorithm of the anonymous ID-based broadcast encryption scheme.
[0083] If U.sub.i∈{U.sub.1, . . . , U.sub.N}-R, the cipher text generation unit 411 of the communication device U.sub.i generates cipher text C.sub.i which is a dummy message. For example, the dummy message C.sub.i is the cipher text C.sub.i obtained by encrypting an appropriate message M.sub.i by the master public key Σ.sub.i=1, . . . , LMPK.sub.j with φ, which means no recipient, being designated. By doing so, decryption of the cipher text in Step S415, which will be described later, fails without exception.
[0084] (2) Mix-Net
[0085] The communication device U.sub.i∈{U.sub.1, . . . , U.sub.N} transmits the cipher text C.sub.i generated in S411 to the mix-net server S.sub.1 using the transmitting and receiving unit 498. The mix-net servers S.sub.1, . . . , S.sub.M sequentially shuffle the cipher text (C.sub.1, . . . , C.sub.N) received by the mix-net server S.sub.1. The mix-net server S.sub.M posts the shuffled cipher text (˜C.sub.1, . . . , ˜C.sub.N) obtained by shuffling the cipher text (C.sub.1, . . . , C.sub.N), which is an output message, on a release bulletin board. Here, (C.sub.1, . . . , C.sub.N) and (˜C.sub.1, . . . , ˜C.sub.N) are equal as a set. That is, {˜C.sub.1, . . . , ˜C.sub.N}={C.sub.1, . . . , C.sub.N}. For instance, the mix-net server S.sub.M only has to upload the shuffled cipher text (˜C.sub.1, . . . , ˜C.sub.N) to the release server 200 to post the shuffled cipher text (˜C.sub.1, . . . , ˜C.sub.N). This allows the communication device U.sub.i (1≤i≤N) to obtain the shuffled cipher text (˜C.sub.1, . . . , ˜C.sub.N).
[0086] (3) Downloading and Check
[0087] In Step S414, the cipher text obtaining unit 414 of the communication device U.sub.i ∈{U.sub.1, . . . , U.sub.N} obtains the cipher text {C.sub.1, . . . , C.sub.N} by downloading the shuffled cipher text (˜C.sub.1, . . . , ˜C.sub.N) from the bulletin board.
[0088] In Step S415, the message reconstruction unit 415 of the communication device U.sub.i∈{U.sub.1, . . . , U.sub.N} generates plaintext (ID.sub.k, ω.sub.k, M.sub.k)←(Σ.sub.j=1, . . . , Ldk.sub.i.sup.(j), C.sub.k) from a decryption key Σ.sub.j=1, . . . , Ldk.sub.i.sup.(i) and cipher text C.sub.k(1≤k≤N) by the decryption algorithm of the anonymous ID-based broadcast encryption scheme (only if U.sub.i ∈R-{U.sub.k}). If the cipher text C.sub.k is successfully decrypted, the message reconstruction unit 415 of the communication device U.sub.i generates a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, M.sub.k, ω.sub.k) from the master public key Σ.sub.i=1, . . . , LSMPK.sub.j and a message (ID.sub.k, ω.sub.k, M.sub.k) by the signature verifying algorithm of the ID-based signature scheme and verifies a signature ω.sub.k. If the signature ω.sub.k is successfully verified, the message reconstruction unit 415 of the communication device U.sub.i regards a message M.sub.k as a message transmitted from a communication device U.sub.k with an identifier ID.sub.k. As a result, the communication device U.sub.i∈R obtains messages M.sub.1, . . . , M.sub.n (including the message M.sub.i which the communication device U.sub.i itself has transmitted). On the other hand, the communication device U.sub.i∈{U.sub.1, . . . , U.sub.N}-R cannot obtain the messages M.sub.1, . . . , M.sub.n.
[0089] As described above, the communication device U.sub.i does not need to use a public key infrastructure because the communication device U.sub.i encrypts the information on destinations (the set R-{U.sub.i} of recipients) along with the original message by the encryption algorithm of the anonymous ID-based broadcast encryption scheme. This makes it possible to conceal the information on destinations, which is one of metadata. Moreover, since each communication device receives the cipher text via a mix-net and reconstructs the original message, it is possible to conceal the information on a source (the sender U.sub.i), which is one of metadata. That is, a plurality of users can share messages with metadata being concealed.
[0090] <Session Key Generation>
[0091] A processing procedure of session key generation in the key exchange method of the embodiment will be described with reference to
[0092] A new session is started between the communication devices of the set R of communication devices={U.sub.i_1, . . . , U.sub.i_n} (where {i.sub.1, . . . , i.sub.n}.Math.{1, . . . , N}) and a session key is shared among the communication devices.
[0093] Hereinafter, for the sake of simplification, an explanation will be given on the assumption that the set R={U.sub.i_1, . . . , U.sub.i_n}={U.sub.1, . . . , U.sub.n} and a communication device U.sub.i_1=U.sub.1 in the same fashion as described above. This does not lead to loss of generality.
[0094] A communication device U.sub.1 which desires to share the session key with each communication device belonging to the set R with the session key being concealed is referred to as a representative communication device. Moreover, communication devices of a set R-{U.sub.1} are referred to as general communication devices.
[0095] (1) Round 1: First Broadcast
[0096] This procedure is executed separately in two cases: a case where the communication device U.sub.i is included in the set R and a case where the communication device U.sub.i is not included in the set R.
[0097] In Step S421, if U.sub.i ∈R, the first key generation unit 421 of the communication device U.sub.i generates ˜r.sub.i ∈.sub.R{0, 1}.sup.κ, ˜r′.sub.i∈.sub.RFS.sub.κ, ˜k.sub.i ∈.sub.R{0, 1}.sup.κ, ˜k′.sub.i ∈.sub.RFS.sub.κ, ˜s.sub.i ∈.sub.R{0, 1}, and ˜s′.sub.i∈.sub.RFS.sub.κ and calculates r.sub.i=tPRF(˜r.sub.i, ˜r′.sub.i, st.sub.i, st′.sub.i), k.sub.i=tPRF(˜k.sub.i, ˜k′.sub.i, st.sub.i, st′.sub.i), and s.sub.i=tPRF(˜s.sub.i, ˜s′.sub.i, st.sub.i, st′.sub.i). Furthermore, the first key generation unit 421 of the communication device U.sub.i calculates R.sub.i=g.sup.r_i and c.sub.i=g.sup.k_ih.sup.s_i and generates a first key (R.sub.i, c.sub.i).
[0098] If U.sub.i ∈{U.sub.1, . . . , U.sub.N}-R, the first key generation unit 421 of the communication device U.sub.i randomly selects R.sub.i, c.sub.i ∈.sub.RG and generates a first key (R.sub.i, c.sub.i).
[0099] In Step S410-1, if U.sub.i ∈R, the first anonymous broadcast unit 410-1 of the communication device U.sub.i anonymously broadcasts the first key (R.sub.i, c.sub.i) with the set R-{U.sub.i} being designated.
[0100] If U.sub.i∈{U.sub.1, . . . , U.sub.N}-R, the first anonymous broadcast unit 410-1 of the communication device U.sub.i anonymously broadcasts the first key (R.sub.i, c.sub.i) with φ, which means no recipient, being designated.
[0101] (2) Round 2: Second Broadcast
[0102] This procedure is executed separately in three cases: a case where the communication device U.sub.i is included in the set R-{U.sub.1}, a case where the communication device U.sub.i is U.sub.1, and a case where the communication device U.sub.i is not included in the set R.
[0103] In Step S423, if U.sub.i ∈R-{U.sub.1 }, when the communication device U.sub.i receives a first key (R.sub.k, c.sub.k) from each communication device U.sub.k (1≤k≤n, k≠i) belonging to the set R-{U.sub.i}, the second key generation unit 423 of the communication device U.sub.i calculates sid=TCR(c.sub.1, . . . , c.sub.n). Here, sid is referred to as a session ID. Next, the second key generation unit 423 of the communication device U.sub.i calculates K.sub.i.sup.(l), K.sub.i.sup.(r), and T.sub.i by the following formulae and randomly selects T′.sub.i∈.sub.RZ.sub.p.sup.2.
K.sub.i.sup.(l)=F(sid,R.sub.i−1.sup.r.sup.
K.sub.i.sup.(r)=F(sid,R.sub.i+1.sup.r.sup.
T.sub.i=K.sub.i(l)⊕K.sub.i.sup.(r)
[0104] That is, T.sub.i is the exclusive OR of K.sub.i.sup.(l) and K.sub.i.sup.(r).
[0105] The second key generation unit 423 of the communication device U.sub.i generates, from the master public key Σ=.sub.j=1, . . . , LSMPK.sub.j, the signature key Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), and a message (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i) (that is, a tuple of the set R of recipients, R.sub.i, c.sub.i, k.sub.i, and s.sub.i generated in S421, and T.sub.i and T′.sub.i just generated), a signature σ.sub.i←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.i.sup.(j), (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i)) for the message (R, R.sub.i, c.sub.i, k.sub.i, s.sub.i, T.sub.i, T′.sub.i) by the signature generation algorithm of the ID-based signature scheme. The second key generation unit 423 of the communication device U.sub.i generates (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) as a second key.
[0106] If U.sub.i=U.sub.1, when the communication device U.sub.1 receives a first key (R.sub.k, c.sub.k) from each communication device U.sub.k (2≤k≤n) belonging to the set R-{U.sub.1}, the second key generation unit 423 of the communication device U.sub.i calculates sid=TCR(c.sub.1, . . . , c.sub.n). Next, the second key generation unit 423 of the communication device U.sub.i calculates K.sub.1.sup.(l), K.sub.1.sup.(r), T.sub.1, and T′ by the following formulae and randomly selects k″.sub.1, s″.sub.1 ∈.sub.RZ.sub.p.
K.sub.1.sup.(l)=F(sid,R.sub.n.sup.r.sup.
K.sub.1.sup.(r)=F(sid,R.sub.2.sup.r.sup.
T.sub.1=K.sub.1.sup.(l)⊕K.sub.1.sup.(r)
T′=K.sub.1.sup.(l)⊕(k.sub.1∥s.sub.1)
[0107] Here, ∥ is a concatenation operator.
[0108] The second key generation unit 423 of the communication device U.sub.i generates, from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, a signature key Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), and a message (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′) (that is, a tuple of the set R of recipients, R.sub.1 and c.sub.1 generated in S421, and k″.sub.1, s″.sub.1, T.sub.1, and T′ just generated), a signature σ.sub.1←(Σ.sub.j=1, . . . , LSMPK.sub.j, Σ.sub.j=1, . . . , Lsk.sub.1.sup.(j), (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′)) for the message (R, R.sub.1, c.sub.1, k″.sub.1, s″.sub.1, T.sub.1, T′) by the signature generation algorithm of the ID-based signature scheme. The second key generation unit 423 of the communication device U.sub.i generates (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) as a second key.
[0109] If U.sub.i ∈{U.sub.1, . . . , U.sub.N}-R, the second key generation unit 423 of the communication device U.sub.i randomly selects k.sub.i, s.sub.i∈.sub.RZ.sub.p, T.sub.i, T′.sub.i ∈.sub.RZ.sub.p.sup.2, and a signature σ.sub.i which is an element of a signature space Σ. The second key generation unit 423 of the communication device U.sub.i generates (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) as a second key.
[0110] In Step S410-2, if U.sub.i ∈R-{U.sub.1}, the second anonymous broadcast unit 410-2 of the communication device U.sub.i anonymously broadcasts the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with the set R-{U.sub.i} being designated.
[0111] If U.sub.i=U.sub.1, the second anonymous broadcast unit 410-2 of the communication device U.sub.i anonymously broadcasts the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.i) with the set R-{U.sub.1} being designated.
[0112] If U.sub.i∈{U.sub.1, . . . , U.sub.N}-R, the second anonymous broadcast unit 410-2 of the communication device U.sub.i anonymously broadcasts the second key (k.sub.i, s.sub.i, T.sub.i, T′.sub.i, σ.sub.i) with φ, which means no recipient, being designated.
[0113] (3) Session Key Generation
[0114] This procedure is executed separately in three cases: a case where the communication device U.sub.i is included in the set R-{U.sub.1}, a case where the communication device U.sub.i is U.sub.1, and a case where the communication device U.sub.i is not included in the set R.
[0115] It is to be noted that, if the communication device U.sub.i is not included in the set R, the communication device U.sub.i executes no processing. That is, the communication device U.sub.i which is not included in the set R performs no processing.
[0116] In Step S427, if U.sub.i ∈R-{U.sub.1}, when the communication device U.sub.i receives the second key (k″.sub.1, s″.sub.1, T.sub.1, T′, σ.sub.1) and a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) (2≤k≤n, k≠i) from each communication device U.sub.k (1≤k≤n, k≠i) belonging to the set R-{U.sub.i}, the session key generation unit 427 of the communication device U.sub.i generates a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, an identifier ID.sub.k, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k) (that is, a tuple of the set R of recipients, R.sub.k and c.sub.k received in S423, and k.sub.k, s.sub.k, T.sub.k, and T′.sub.k received at the start of S427), and a signature σ.sub.k received at the start of S427 by the signature verifying algorithm of the ID-based signature scheme and verifies the signature σ.sub.k. If the signature σ.sub.k is not successfully verified, the session key generation unit 427 of the communication device U.sub.i stops the processing. The session key generation unit 427 of the communication device U.sub.i calculates K.sub.1.sup.(l) and k.sub.1∥s.sub.1 by the following formulae and checks whether c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n.
K.sub.1.sup.(l)=K.sub.i.sup.(l)⊕(⊕.sub.1≤j≤i−1T.sub.j)
k.sub.1∥s.sub.1=T′⊕K.sub.1.sup.(l)
[0117] If c.sub.k=g.sup.k_kh.sup.s_k does not hold for at least one of k that satisfies 1≤k≤n, the session key generation unit 427 of the communication device U.sub.i stops the processing. The session key generation unit 427 of the communication device U.sub.i calculates a session key SK by the following formula.
SK=F′(sid,⊕.sub.1≤i≤nk.sub.i)
[0118] If U.sub.i=U.sub.1, when the communication device U.sub.1 receives a second key (k.sub.k, s.sub.k, T.sub.k, T′.sub.k, σ.sub.k) from each communication device U.sub.k (2≤k≤n) belonging to the set R-{U.sub.1 }, the session key generation unit 427 of the communication device U.sub.1 generates a verification result Ver.sub.k←(Σ.sub.j=1, . . . , LSMPK.sub.j, ID.sub.k, (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k), σ.sub.k) from the master public key Σ.sub.j=1, . . . , LSMPK.sub.j, an identifier ID.sub.k, a message (R, R.sub.k, c.sub.k, k.sub.k, s.sub.k, T.sub.k, T′.sub.k) (that is, a tuple of the set R of recipients, R.sub.k and c.sub.k received in S423, and k.sub.k, s.sub.k, T.sub.k, and T′.sub.k received at the start of S427), and a signature σ.sub.k received at the start of S427 by the signature verifying algorithm of the ID-based signature scheme and verifies the signature σ.sub.k. If the signature σ.sub.k is not successfully verified, the session key generation unit 427 of the communication device U.sub.1 stops the processing. Moreover, the session key generation unit 427 of the communication device U.sub.1 checks whether c.sub.k=g.sup.k_kh.sup.s_k holds for k that satisfies 1≤k≤n. If c.sub.k=g.sup.k_kh.sup.s_k does not hold for at least one of k that satisfies 1≤k≤n, the session key generation unit 427 of the communication device U.sub.1 stops the processing. The session key generation unit 427 of the communication device U.sub.1 generates a session key SK by the following formula.
SK=F′(sid,⊕.sub.1≤i≤nk.sub.i)
[0119] If U.sub.i∈{U.sub.1, . . . , U.sub.N}-R, as described earlier, the session key generation unit 427 of the communication device U.sub.i does not generate a session key SK.
[0120] With the above-described configuration, a key exchange technique of this invention makes it possible for a plurality of communication devices to share a session key with metadata being concealed.
[0121] Anonymous broadcast establishes a concealed communication channel, by which messages can be exchanged at regular intervals, by using the mix-net. By implementing a key exchange by the session key generation procedure using this concealed communication channel, concealment of metadata is implemented. Furthermore, by performing communication using the shared session key, concealed communication is implemented. In this way, leak of metadata from a key exchange protocol can be prevented, which makes it possible to conceal the metadata completely.
[0122] The use of this key exchange protocol provides a global company and a company using satellite communications with a network such as The Onion Router (Tor) that makes a connection path in TCP/IP anonymous, for example, which makes it possible to ensure confidentiality including metadata in communication.
[0123] It goes without saying that this invention is not limited to the above embodiment but modifications may be made within the scope of this invention. Also, the various processes described in the embodiment may be executed not only in a chronological sequence in accordance with the order of their description but may be executed in parallel or separately according to the processing capability of the device executing the processing or any necessity.
[0124] [Program and Recording Medium]
[0125] When various types of processing functions in the devices described in the above embodiment are implemented on a computer, the contents of processing function to be contained in each device is written by a program. With this program executed on the computer, various types of processing functions in the above-described devices are implemented on the computer.
[0126] This program in which the contents of processing are written can be recorded in a computer-readable recording medium. The computer-readable recording medium may be any medium such as a magnetic recording device, an optical disk, a magneto-optical recording medium, and a semiconductor memory.
[0127] Distribution of this program is implemented by sales, transfer, rental, and other transactions of a portable recording medium such as a DVD and a CD-ROM on which the program is recorded, for example. Furthermore, this program may be stored in a storage unit of a server computer and transferred from the server computer to other computers via a network so as to be distributed.
[0128] A computer which executes such program first stores the program recorded in a portable recording medium or transferred from a server computer once in a storage unit thereof, for example. When the processing is performed, the computer reads out the program stored in the storage unit thereof and performs processing in accordance with the program thus read out. As another execution form of this program, the computer may directly read out the program from a portable recording medium and perform processing in accordance with the program. Furthermore, each time the program is transferred to the computer from the server computer, the computer may sequentially perform processing in accordance with the received program. Alternatively, a configuration may be adopted in which the transfer of a program to the computer from the server computer is not performed and the above-described processing is executed by so-called application service provider (ASP)-type service by which the processing functions are implemented only by an instruction for execution thereof and result acquisition. It should be noted that a program in this form includes information which is provided for processing performed by electronic calculation equipment and which is equivalent to a program (such as data which is not a direct instruction to the computer but has a property specifying the processing performed by the computer).
[0129] In this form, the present device is configured with a predetermined program executed on a computer. However, the present device may be configured with at least part of these processing contents realized in a hardware manner.
[0130] The foregoing description of the embodiment of the invention has been presented for the purpose of illustration and description. It is not intended to be exhaustive and to limit the invention to the precise form disclosed. Modifications or variations are possible in light of the above teaching. The embodiment was chosen and described to provide the best illustration of the principles of the invention and its practical application, and to enable one of ordinary skill in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. All such modifications and variations are within the scope of the invention as determined by the appended claims when interpreted in accordance with the breadth to which they are fairly, legally, and equitably entitled.