Invention Grant
- Patent Title: Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit
- Patent Title (中): 安全处理设备,安全处理方法,加密机密信息嵌入方法,程序,存储介质和集成电路
-
Application No.: US12091250Application Date: 2006-10-24
-
Publication No.: US08656175B2Publication Date: 2014-02-18
- Inventor: Tomoyuki Haga , Taichi Sato , Rieko Asai
- Applicant: Tomoyuki Haga , Taichi Sato , Rieko Asai
- Applicant Address: JP Osaka
- Assignee: Panasonic Corporation
- Current Assignee: Panasonic Corporation
- Current Assignee Address: JP Osaka
- Agency: Wenderoth, Lind & Ponack, L.L.P.
- Priority: JP2005-316105 20051031
- International Application: PCT/JP2006/321090 WO 20061024
- International Announcement: WO2007/052491 WO 20070510
- Main IPC: H04L9/16
- IPC: H04L9/16

Abstract:
When performing secure processing using confidential information that needs to be confidential, the secure processing device according to the present invention prevents the confidential information from being exposed by an unauthorized analysis such as a memory dump. A signature generation device that provides a message M with a signature by using a signature key comprises: a split key storage unit that stores split secret keys obtained by splitting the signature key d into at least two, a signature key generation equation F for calculating the split secret keys to obtain the signature key d, and a signature generation equation; a signature key generation identical equation generation unit that generates a signature key generation identical equation G for obtaining the same result as the signature generation equation F, with use of an associative law, a distributive law, and a commutative law; a combined split key generation unit that generates a plurality of combined split keys that are each a result of calculating the split secret keys, and that are to be arguments for the signature key generation identical equation G; and a signature generation unit that provides the message with the signature, based on the signature key generation identical equation G and the split secret keys.
Public/Granted literature
Information query