×

Pseudo public key encryption

  • US 20070189517A1
  • Filed: 01/23/2006
  • Published: 08/16/2007
  • Est. Priority Date: 12/20/2004
  • Status: Abandoned Application
First Claim
Patent Images

1. ) An apparatus comprising tamper-proof hardware, the hardware comprising an encryption-authentication section for performing issuance of an ID, encryption, and authentication, in response to a request by a user, and a tampering detection section for detecting one of voltage change and pressure change, to electrically destroy the encryption-authentication section, the encryption-authentication section comprising:

  • an ID issuance-registration section for issuing an ID in response to a request by a user, and storing the ID in a storage section;

    a key generation section for generating a key corresponding to the ID using a one-to-one function, and outputting the key;

    a first key acquisition section for, in response to a request by a user for decryption or generation of a message authentication code, comparing an inputted ID and the ID stored in the ID storage section, and, if the IDs are corresponding to each other, handing over the ID to the key generation section to output a key generated by the key generation section;

    a second key acquisition section for, in response to a request by a user for encryption or verification of a message with a message authentication code attached thereto, handing over an inputted ID to the key generation section to output a key generated by the key generation section;

    a message authentication code generation section for handing over an inputted ID to the first key acquisition section, and, with the use of a key outputted from the first key acquisition section, calculating and outputting a message authentication code of an inputted message;

    a message authentication code verification section for handing over an inputted ID to the second key acquisition section, calculating a message authentication code of an inputted message with the use of a key outputted from the second key acquisition section, comparing the obtained message authentication code and an inputted message authentication code, and, if the message authentication codes are corresponding to each other, returning information indicating that the verification has succeeded to the user;

    an encryption section for handing over an inputted ID to the second key acquisition section, encrypting inputted plaintext with the use of a key outputted from the second key acquisition section, and returning the result to a user; and

    a decryption section for handing over an inputted ID to the first acquisition section and, with the use of a key outputted from the first key acquisition section, decrypting and outputting inputted encrypted text.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×