×

Encrypted communication system that limits the damage caused when a secret key has been leaked

  • US 6,151,394 A
  • Filed: 09/30/1997
  • Issued: 11/21/2000
  • Est. Priority Date: 10/31/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. An encrypted communication system composed of n reception apparatuses and a single transmission apparatus for transferring digital information to the n reception apparatuses, wherein the n reception apparatuses are classified into m groups, and k secret keys selected from a total of m*k secret keys are exclusively distributed to each group,the transmission apparatus comprising:

  • secret key storage means for storing the m*k secret keys associated with the groups to which the secret keys are distributed;

    secret key selecting means for selecting one secret key for each group out of the k secret keys which are stored in the secret key storage means corresponding to each group;

    first encrypting means for encrypting a plaintext using each of the m secret keys read by the secret key selecting means to produce m type 1 cryptograms;

    second encrypting means for generating a type 2 cryptogram that helps identify the m secret keys used by the first encrypting means; and

    transfer means for transferring m pairs that each include(1) one of the type 1 cryptograms, and(2) the type 2 cryptogramto the n reception apparatuses,each pair of one type 1 cryptogram and the type 2 cryptogram being transferred to every reception apparatus to which the secret key used to generate the type 1 cryptogram has been distributed,and each of the n reception apparatuses comprising;

    secret key storage means for storing k secret keys that have been distributed to the group to which the reception apparatus belongs;

    reception means for receiving a pair of a type 1 cryptogram and a type 2 cryptogram for the transmission apparatus;

    first decrypting means for decrypting the received type 1 cryptogram using each of the k secret keys in the secret key storage means separately to generate k type 1 decrypted texts; and

    judging means for judging whether any of the k type 1 decrypted texts generated by the first decrypting means has predetermined relation with the type 2 cryptogram and, on judging that at last one type 1 decrypted text has the predetermined relation, confirming that the secret key used to generate the type 1 decrypted text that has the predetermined relation is identical to the secret key that was used to generate the type 1 cryptogram,wherein the type 2 cryptogram has a content that is unrelated to the m secret keys used by the first encrypting means,wherein the second encrypting means generates the type 2 cryptogram by encrypting the plaintext,wherein the judging means includes a second decrypting means for generating a type 2 decrypted text, judges whether any of the k type 1 decrypted texts matches the generated type 2 decrypted text, and when at least one of the k type 1 decrypted texts matches the type 2 decrypted text, confirms that the secret key used to generate the matching type 1 decrypted text is identical to the secret key that was used to generate the type 1 cryptogram, andwherein the second encrypting means encrypts the plaintext using the plaintext as an encryption key, and the second decrypting means decrypts the type 2 cryptogram separately using each of the type 1 decrypted tests as a decryption key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×