会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Encryption apparatus, decryption apparatus, encryption method, decryption method, security method, program, and recording medium
    • 加密装置,解密装置,加密方法,解密方法,安全方法,程序和记录介质
    • US08515060B2
    • 2013-08-20
    • US13263770
    • 2010-04-23
    • Eiichiro FujisakiKoutarou Suzuki
    • Eiichiro FujisakiKoutarou Suzuki
    • H04L29/06
    • H04L9/3073H04L9/0825
    • Security against CCA is improved without providing space for just improving the security against CCA in a ciphertext space. In encryption processing, a first ciphertext C1 is calculated from a plaintext M and a symmetric key K; a value containing a value corresponding to the symmetric key K and a value corresponding to the first ciphertext C1 is put into a collision-resistant function H to calculate a function value of the function H; and r corresponding to the function value is used to calculate second ciphertext C2=r·(Σμ=1nvμ·bμ)+ρ·bn+1∈G1n+1. In decryption processing, the second ciphertext C2∈G1n+1 and key information D1*=α·(Σμ=1nwμ·bμ*)+bn+1*∈G2n+1 are put into a bilinear function e to calculate a function value S˜=e(C2, D1*)∈GT; a value corresponding to the function value S˜ and the first ciphertext C1 are put into the collision-resistant function H to calculate a function value of the function H; and it is judged whether r˜ corresponding to the function value satisfies C2=r˜·(Σμ=1nvμ·bμ)+ρ˜·bn+1∈G1n+1.
    • 改进了针对CCA的安全性,而没有为在密文空间中提高针对CCA的安全性提供空间。 在加密处理中,从明文M和对称密钥K计算第一密文C1; 包含对应于对称密钥K的值和与第一密文C1相对应的值的值被置于防冲击函数H中以计算函数H的函数值; 并且对应于功能值的r用于计算第二密文C2 = r·(Sigmamu = 1nvmu·bmu)+ rho·bn + 1EG1n + 1。 在解密处理中,第二密文C2EG1n + 1和密钥信息D1 * =α·(Sigmamu = 1nwmu·bmu *)+ bn + 1 * EG2n + 1被放入双线性函数e中以计算函数值S〜= e (C2,D1 *)EGT; 将与功能值S〜和第一密文C1对应的值放入防冲击功能H中以计算功能值H的功能值; 并且判断对应于函数值的r_是否满足C2 = r〜·(Sigmamu = 1nvmu·bmu)+ rho〜·bn + 1EG1n + 1。
    • 2. 发明申请
    • Authentication System, Authentication Method, Attesting Device, Verification Device, Their Programs, and Recording Medium
    • 认证系统,认证方式,认证设备,认证设备,程序和记录介质
    • US20080133912A1
    • 2008-06-05
    • US11792305
    • 2006-07-13
    • Go YamamotoEiichiro Fujisaki
    • Go YamamotoEiichiro Fujisaki
    • H04L9/00
    • H04L9/3221
    • A verification device stores verification information and first random information in a first storage section. The verification information depends upon the contents of comparative information and does not depend upon an information volume of the comparative information. Further, the verification device generates an authentication information generation factor by using the first random information and transmits the factor to a proving device. The proving device generates authentication information by using the authentication information generation factor and held information and transmits the authentication information to the verification device. The authentication information depends upon the contents of the authentication information generation factor and the held information and does not depend upon the information volume of the held information. A decision section of the verification device decides whether a predetermined relationship is established between the authentication information and the verification information and the first random information. In this way, the verification device verifies that the held information stored in the proving device is the same as the comparative information.
    • 验证装置将验证信息和第一随机信息存储在第一存储部分中。 验证信息取决于比较信息的内容,不依赖于比较信息的信息量。 此外,验证装置通过使用第一随机信息生成认证信息生成因子,并将该因子发送给验证装置。 证明装置通过使用认证信息生成因子和保持的信息生成认证信息,并将认证信息发送给认证装置。 认证信息取决于认证信息生成因子和保持的信息的内容,并且不依赖于所保持的信息的信息量。 验证装置的判定部判定在认证信息和验证信息与第一随机信息之间是否建立了规定的关系。 以这种方式,验证装置验证存储在证明装置中的保持信息与比较信息相同。
    • 3. 发明授权
    • Method and apparatus for implementing traceable electronic cash
    • 用于实现可追溯电子现金的方法和装置
    • US5889862A
    • 1999-03-30
    • US683538
    • 1996-07-15
    • Kazuo OhtaEiichiro FujisakiAtsushi FujiokaMasayuki Abe
    • Kazuo OhtaEiichiro FujisakiAtsushi FujiokaMasayuki Abe
    • G06Q20/00H04L9/32H04L9/30
    • G06Q20/06G06Q20/02G06Q20/10G06Q20/3678G06Q20/383G06Q20/4014H04L9/302H04L9/3221H04L9/3249H04L9/3257H04L2209/42H04L2209/56
    • In a method for implementing traceable electronic cash, a user US sends a bank BK a product N of prime numbers P and Q, a prime number L and his real name ID.sub.U, and the bank BK generates a pseudonym I corresponding to the real name ID.sub.U and keeps the correspondence between the real name ID.sub.U and the pseudonym I secret. The bank BK uses a signature function .OMEGA.=D.sub.eB (N,L,I) to attach a signature to information composed of the above-mentioned N, L and I and sends the user US the signed information .OMEGA. as information containing a license B. The user US generates authentication information X from the N and a random number R and sends the bank BK information Z obtained by performing blind signature preprocessing on information (X,B) with a function F.sub.eC and has the information Z signed by the bank BK with a signature function D.sub.eC (Z) to obtain electronic cash C. When the user US abuses the electronic cash C, the bank BK follows a court order to reveal the correspondence between the real name ID.sub.U and pseudo name of the user US and trace the electronic cash spent.
    • 在用于实现可跟踪的电子现金的方法中,用户US向银行BK发送素数P和Q的乘积N,素数L和他的真实姓名IDU,并且银行BK产生对应于真实姓名IDU的假名I 并保持真实姓名IDU和假名I秘密之间的对应关系。 银行BK使用签名函数OMEGA = DeB(N,L,I)将签名附加到由上述N,L和I组成的信息上,并将用户签名的信息OMEGA作为包含许可证B的信息发送给US US。 用户US从N生成认证信息X和随机数R,并且通过对具有函数FeC的信息(X,B)执行盲签名预处理而获得的存储体BK信息Z,并且具有由银行BK与信元ZK签名的信息Z, 签名函数DeC(Z)获得电子现金C.当用户US滥用电子现金C时,银行BK遵循法院命令,以显示实际名称IDU和用户US的伪名称之间的对应关系,并追踪电子 现金花了
    • 4. 发明授权
    • Encryption device, decryption device, encryption method, decryption method, program, and recording medium
    • 加密装置,解密装置,加密方法,解密方法,程序和记录介质
    • US08897442B2
    • 2014-11-25
    • US13703381
    • 2011-07-22
    • Eiichiro Fujisaki
    • Eiichiro Fujisaki
    • H04L9/00H04L9/28H04L9/08H04L9/30
    • H04L9/28H04L9/0836H04L9/0847H04L9/085H04L9/3073
    • In encryption, a random number r is generated to generate a ciphertext C2=M(+)R(r), function values HS(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K, and ciphertexts C(0) and C(λ) of the common key K that correspond to function values HS(r, C2). In decryption, a common key K′ is decrypted from input ciphertexts C′(0) and C′(λ), an input ciphertext C′(Ψ+1) is decrypted by using the common key K′ to generate a decrypted value r′, and function values HS(r′, C2′) is generated. If the input ciphertexts C′(0) and C′(λ) do not match ciphertexts C″(0) and C″(λ) of the common key K′ that correspond to the function values HS(r′, C2′), decryption is rejected; if they match, the input ciphertext C2′ is decrypted.
    • 在加密中,生成随机数r以产生密文C2 = M(+)R(r),函数值HS(r,C2),公共密钥K,随机数的密文C(Ψ+ 1) 使用公共密钥K,以及对应于功能值HS(r,C2)的公共密钥K的密文C(0)和C(λ)。 在解密中,从输入密文C'(0)和C'(λ)解密公共密钥K',通过使用公共密钥K'对输入密文C'(Ψ+ 1)进行解密,生成解密值r ',生成功能值HS(r',C2')。 如果输入密文C'(0)和C'(λ)与功能值HS(r',C2')对应的公共密钥K'的密文C“(0)和C”(λ)不匹配, 解密被拒绝 如果匹配,则输入密文C2'被解密。
    • 5. 发明申请
    • ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, DECRYPTION METHOD, SECURITY METHOD, PROGRAM, AND RECORDING MEDIUM
    • 加密装置,分解装置,加密方法,分解方法,安全方法,程序和记录介质
    • US20120027201A1
    • 2012-02-02
    • US13263770
    • 2010-04-23
    • Eiichiro FujisakiKoutarou Suzuki
    • Eiichiro FujisakiKoutarou Suzuki
    • H04L9/28
    • H04L9/3073H04L9/0825
    • Security against CCA is improved without providing space for just improving the security against CCA in a ciphertext space. In encryption processing, a first ciphertext C1 is calculated from a plaintext M and a symmetric key K; a value containing a value corresponding to the symmetric key K and a value corresponding to the first ciphertext C1 is put into a collision-resistant function H to calculate a function value of the function H; and r corresponding to the function value is used to calculate second ciphertext C2=r·(Σμ=1nvμ·bμ)+ρ·bn+1∈G1n+1. In decryption processing, the second ciphertext C2∈G1n+1 and key information D1*=α·(Σμ=1nwμ·bμ*)+bn+1*∈G2n+1 are put into a bilinear function e to calculate a function value S˜=e(C2, D1*)∈GT; a value corresponding to the function value S˜ and the first ciphertext C1 are put into the collision-resistant function H to calculate a function value of the function H; and it is judged whether r˜ corresponding to the function value satisfies C2=r˜·(Σμ=1nvμ·bμ)+ρ˜·bn+1∈G1n+1.
    • 改进了针对CCA的安全性,而没有为在密文空间中提高针对CCA的安全性提供空间。 在加密处理中,从明文M和对称密钥K计算第一密文C1; 包含对应于对称密钥K的值和与第一密文C1相对应的值的值被置于防冲击函数H中以计算函数H的函数值; 对应于函数值的r用于计算第二密文C2 = r·(&Sgr;μ=1nvμ·bμ)+&rgr。·bn +1∈G1n+ 1。 在解密处理中,第二密文C2∈G1n+ 1和密钥信息D1 * =α·(&Sgr;μ=1nwμ·bμ*)+ bn + 1 *∈G2n+ 1被放入双线性函数e中以计算函数 值S = = e(C2,D1 *)∈GT; 将与功能值S〜和第一密文C1相对应的值放入防撞功能H中以计算功能H的功能值; 并且判断对应于函数值的r_是否满足C2 = r〜·(&Sgr;μ=1nvμ·bμ)+&rgr;〜·bn +1∈G1n+ 1。
    • 6. 发明授权
    • Electronic cash implementing method using a trustee
    • 使用受托人的电子现金实施方法
    • US5901229A
    • 1999-05-04
    • US744856
    • 1996-11-04
    • Eiichiro FujisakiTatsuaki OkamotoKazuo Ohta
    • Eiichiro FujisakiTatsuaki OkamotoKazuo Ohta
    • G06Q20/00G07F7/10H04K1/00
    • H04L9/3249G06Q20/02G06Q20/06G06Q20/3678G06Q20/3829G06Q20/383G06Q20/403G07F7/1016H04L9/302H04L9/3221H04L9/3257H04L2209/42H04L2209/56
    • In an electronic cash implementing method using a trustee, a user registers his identification information ID.sub.U and anonymous public key N with the trustee and receives a license (B,I). The user processes the license (B,I) by a public key corresponding to the amount to be issued and sends the processed information to a bank to have it attach a blind signature to the information so that the user obtain electronic cash C from the blind signature. The user transmits to a shop the information B,I,C,N and a digital signature that assures the divisional use of the electronic cash. The shop verifies the validity of the information B and C and accepts it as cash and sends a history H of communication with the user to the bank and receives a payment therefrom. The bank places all received communication histories under its supervision and makes a check to see if the amount x spent by the electronic cash C is in excess of its face value X, and if so, informs the trustee of the information N contained in the communication history. The trustee uses the information ID.sub.U thus received to specify the corresponding user identification information ID.sub.U.
    • 在使用受托人的电子现金实施方法中,用户将其识别信息IDU和匿名公钥N注册到受托人并且接收许可证(B,I)。 用户通过对应于要发行的数量的公开密钥处理许可证(B,I),并将处理的信息发送到银行以使其对信息附加盲签名,以便用户从盲人获取电子现金C. 签名。 用户向商店传送信息B,I,C,N以及确保电子现金分割使用的数字签名。 商店验证信息B和C的有效性,并将其接受为现金,并将与用户通信的历史H发送给银行并从其接收付款。 银行将所有收到的通讯历史记录进行监督,并检查电子现金C所消耗的金额x是否超过其面值X,如果是,通知受托人通信中包含的信息 历史。 受托人使用如此接收的信息IDU来指定相应的用户识别信息IDU。
    • 7. 发明申请
    • ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, PROGRAM, AND RECORDING MEDIUM
    • 加密设备,分解设备,加密方法,分解方法,程序和记录介质
    • US20130083921A1
    • 2013-04-04
    • US13703381
    • 2011-07-22
    • Eiichiro Fujisaki
    • Eiichiro Fujisaki
    • H04L9/28
    • H04L9/28H04L9/0836H04L9/0847H04L9/085H04L9/3073
    • In encryption, a random number r is generated to generate a ciphertext C2 =M (+) R(r), function values Hs(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K, and ciphertexts C(0) and C(λ) of the common key K that correspond to function values HS(r, C2). In decryption, a common key K′ is decrypted from input ciphertexts C′(0) and C′(λ), an input ciphertext C′(Ψ+1) is decrypted by using the common key K′ to generate a decrypted value r′, and function values HS(r′, C2′) is generated. If the input ciphertexts C′(0) and C′(λ) do not match ciphertexts C″(0) and C″(λ) of the common key K′ that correspond to the function values HS(r′, C2′), decryption is rejected; if they match, the input ciphertext C2′ is decrypted.
    • 在加密中,生成随机数r以产生密文C2 = M(+)R(r),函数值Hs(r,C2),公共密钥K,随机数的密文C(Ψ+ 1) 使用公共密钥K,以及对应于功能值HS(r,C2)的公共密钥K的密文C(0)和C(λ)。 在解密中,从输入密文C'(0)和C'(λ)解密公共密钥K',通过使用公共密钥K'对输入密文C'(Ψ+ 1)进行解密,生成解密值r ',生成功能值HS(r',C2')。 如果输入密文C'(0)和C'(λ)与功能值HS(r',C2')对应的公共密钥K'的密文C“(0)和C”(λ)不匹配, 解密被拒绝 如果匹配,则输入密文C2'被解密。
    • 8. 发明授权
    • Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
    • 验证系统,验证方法,认证设备,验证设备,程序和记录介质
    • US08001384B2
    • 2011-08-16
    • US11792305
    • 2006-07-13
    • Go YamamotoEiichiro Fujisaki
    • Go YamamotoEiichiro Fujisaki
    • H04L9/30
    • H04L9/3221
    • A verification device stores verification information and first random information in a storage. The verification information depends upon contents of comparative information, and not upon an information volume of the comparative information. The verification device generates an authentication information generation factor using the first random information and transmits the factor to a proving device, which generates authentication information using the authentication information generation factor and held information and transmits the authentication information to the verification device. The authentication information depends upon contents of the authentication information generation factor and the held information, and not upon the information volume of the held information. A decision section of the verification device decides whether a predetermined relationship is established between the authentication information and the verification information and the first random information. Thereby, the verification device verifies the held information stored in the proving device is the same as the comparative information.
    • 验证装置将验证信息和第一随机信息存储在存储器中。 验证信息取决于比较信息的内容,而不是比较信息的信息量。 验证装置使用第一随机信息生成认证信息生成因子,并将该因子发送到使用认证信息生成因子生成认证信息和保持信息的证明装置,并将认证信息发送给验证装置。 认证信息取决于认证信息生成因子和保持信息的内容,而不依赖于所保持的信息的信息量。 验证装置的判定部判定在认证信息和验证信息与第一随机信息之间是否建立了规定的关系。 因此,验证装置验证存储在证明装置中的保持信息与比较信息相同。