Unlock instant, AI-driven research and patent intelligence for your innovation.

A shared key generation method, and an information processing terminal

A technology for sharing keys and terminals, which is applied to public keys and key distribution in secure communication, and can solve problems such as high computing costs.

Active Publication Date: 2017-07-28
FUJITSU LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the corresponding calculation is performed by using a multiplication operation or a square operation, and thus the calculation cost is large
When using the Barreto-Naehrig curve (BN curve) (256 bits), which is currently widely used, in the case of the Miller algorithm in the pairing function and the final exponentiation operation, the number of executions of the square operation is 318 in total and the number of times of the multiplication operation is The total number of executions is 193, and thus computationally expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A shared key generation method, and an information processing terminal
  • A shared key generation method, and an information processing terminal
  • A shared key generation method, and an information processing terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0026] Overall configuration

[0027] figure 1 It is a diagram showing an example of the overall configuration of the system according to the embodiment. Such as figure 1 As shown, the system in which the server 1, the information processing terminal 10 and the information processing terminal 20 are connected via the network N implements identity-based cryptography between the information processing terminals 10 and 20, wherein the identity-based cryptography uses the MB method Key sharing. Any type of communication network such as the Internet, local area network (LAN), virtual private network (VPN) can be adopted as the network N, regardless of whether it is wired or wireless.

[0028] The server 1 is a private key generation center (PKG), and transmits the private key to the respective information processing terminals 10 and 20. The information processing terminal 10 is a computer used by user A (hereinafter may be referred to as main body A), and the information processing te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a shared key generation method, and an information processing terminal. The information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. The information processing terminal holds the first calculation value. The information processing terminal calculates a second calculation value from a variable using an identifier of a sharer that shares the shared key, a private key of the information processing terminal, and the algorithm. The information processing terminal generates the shared key by executing a final exponentiation to each of the exponentiation of the first calculation value and the second calculation value.

Description

Technical field [0001] The embodiments discussed herein relate to a computer-readable recording medium, a shared key generation method, and an information processing terminal. Background technique [0002] With the development and popularization of technologies related to calculators and networks, opportunities to exchange important data via wireless communication networks, the Internet, and the like have increased. Since it is relatively easy to eavesdrop, forge, or deceive communication paths in wireless communication networks and the Internet, in order to maintain security, the need for authentication of communication partners and the need for cryptographic communication technology based on authentication to protect communication content are increased. The widely used cryptographic communication technologies include Transport Layer Security (TLS) that employs various public key cryptographic techniques. [0003] As an example of such a public key cryptographic technique, an ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/085H04L9/0866H04L9/3033H04L9/3066H04L9/3073H04L9/0847H04L9/0861H04L9/14
Inventor 酒见由美森川郁也武仲正彦
Owner FUJITSU LTD