Cryptographic processing system, key generation device, encryption device, decryption device, signature processing system, signature device, and verification device

ABSTRACT

The object is to provide a secure functional encryption scheme having a large number of cryptographic functions. An access structure is constituted by applying the inner-product of attribute vectors to a span program. The access structure has a degree of freedom in design of the span program and design of the attribute vectors, thus having a large degree of freedom in design of access control. A secure functional encryption process having a large number of cryptographic functions is implemented by employing the concept of secret sharing for the access structure.

TECHNICAL FIELD

The present invention relates to a functional encryption (FE) scheme.

BACKGROUND ART

Non-Patent Literatures 3 to 6, 10, 12, 13, 15, and 18 describe an ID (Identity)-based encryption (IBE) scheme which constitutes one class of the functional encryption scheme. Non-Patent Literatures 2, 7, 9, 16, 19, 23 to 26, and 28 describe an attribute-based encryption (ABE) scheme which constitutes another class of the functional encryption scheme.

CITATION LIST Non-Patent Literature

-   Non-Patent Literature 1: Beimel, A., Secure schemes for secret     sharing and key distribution. PhD Thesis, Israel Institute of     Technology, Technion, Haifa, Israel, 1996 -   Non-Patent Literature 2: Bethencourt, J., Sahai, A., Waters, B.:     ciphertext policy attribute-based encryption. In: 2007 IEEE     Symposium on Security and Privacy, pp. 321.34. IEEE Press (2007) -   Non-Patent Literature 3: Boneh, D., Boyen, X.: Efficient     selective-ID secure identity based encryption without random     oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS,     vol. 3027, pp. 223-38. Springer Heidelberg (2004) -   Non-Patent Literature 4: Boneh, D., Boyen, X.: Secure identity based     encryption without random oracles. In: Franklin, M. K. (ed.)     CRYPTO 2004. LNCS, vol. 3152, pp. 443.59. Springer Heidelberg (2004) -   Non-Patent Literature 5: Boneh, D., Boyen, X., Goh, E.: Hierarchical     identity based encryption with constant size ciphertext. In:     Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440.56.     Springer Heidelberg (2005) -   Non-Patent Literature 6: Boneh, D., Franklin, M.: Identity-based     encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO2001.     LNCS, vol. 2139, pp. 213-29. Springer Heidelberg (2001) -   Non-Patent Literature 7: Boneh, D., Hamburg, M.: Generalized     identity based and broadcast encryption scheme. In: Pieprzyk,     J.(ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455.70. Springer     Heidelberg (2008) -   Non-Patent Literature 8: Boneh, D., Katz, J., Improved efficiency     for CCA-secure cryptosystems built using identity based encryption.     RSA-CT 2005, LNCS, Springer Verlag (2005) -   Non-Patent Literature 9: Boneh, D., Waters, B.: Conjunctive, subset,     and range queries on encrypted data. In: Vadhan, S. P. (ed.)     TCC 2007. LNCS, vol. 4392, pp. 535.54. Springer Heidelberg (2007) -   Non-Patent Literature 10: Boyen, X., Waters, B.: Anonymous     hierarchical identity-based encryption (without random oracles). In:     Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-07. Springer     Heidelberg (2006) -   Non-Patent Literature 11: Canetti, R., Halevi S., Katz J.,     Chosen-ciphertext security from identity-based encryption.     EUROCRYPT2004, LNCS, Springer-Verlag (2004) -   Non-Patent Literature 12: Cocks, C.: An identity based encryption     scheme based on quadratic residues. In: Honary, B. (ed.) IMAInt.     Conf. LNCS, vol. 2260, pp. 360.63. Springer Heidelberg (2001) -   Non-Patent Literature 13: Gentry, C.: Practical identity-based     encryption without random oracles. In: Vaudenay, S. (ed.)     EUROCRYPT 2006. LNCS, vol. 4004, pp. 445.64. Springer Heidelberg     (2006) -   Non-Patent Literature 14: Gentry, C., Halevi, S.: Hierarchical     identity-based encryption with polynomially many levels. In:     Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437-56. Springer     Heidelberg (2009) -   Non-Patent Literature 15: Gentry, C., Silverberg, A.: Hierarchical     ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002.LNCS, vol.     2501, pp. 548.66. Springer Heidelberg (2002) -   Non-Patent Literature 16: Goyal, V., Pandey, O., Sahai, A., Waters,     B.: Attribute-based encryption for fine-grained access control of     encrypted data. In: ACM Conference on Computer and Communication     Security 2006, pp. 89.8, ACM (2006) -   Non-Patent Literature 17: Groth, J., Sahai, A.: Efficient     non-interactive proof systems for bilinear groups. In: Smart, N. P.     (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415.32. Springer     Heidelberg (2008) -   Non-Patent Literature 18: Horwitz, J., Lynn, B.: Towards     hierarchical identity-based encryption. In: Knudsen, L. R. (ed.)     EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-81. Springer Heidelberg     (2002) -   Non-Patent Literature 19: Katz, J., Sahai, A., Waters, B.: Predicate     encryption supporting disjunctions, polynomial equations, and inner     products. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965,     pp. 146-62. Springer Heidelberg (2008) -   Non-Patent Literature 20: Lewko, A. B., Waters, B.: Fully secure     HIBE with short ciphertexts. ePrint, IACR,     http://eprint.iacr.org/2009/482 -   Non-Patent Literature 21: Okamoto, T., Takashima, K.: Homomorphic     encryption and signatures from vector decomposition. In:     Galbraith, S. D., Paterson, K. G. (eds.) Pairing 2008. LNCS, vol.     5209, pp 57-4. Springer Heidelberg (2008) -   Non-Patent Literature 22: Okamoto, T., Takashima, K.: Hierarchical     predicate encryption for Inner-Products, In: ASIACRYPT 2009,     Springer Heidelberg (2009) -   Non-Patent Literature 23: Ostrovsky, R., Sahai, A., Waters, B.:     Attribute-based encryption with non-monotonic access structures. In:     ACM Conference on Computer and Communication Security 2007, pp.     195.03, ACM (2007) -   Non-Patent Literature 24: Pirretti, M., Traynor, P., McDaniel, P.,     Waters, B.: Secure attribute-based systems. In: ACM Conference on     Computer and Communication Security 2006, pp. 99.12, ACM, (2006) -   Non-Patent Literature 25: Sahai, A., Waters, B.: Fuzzy     identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005.     LNCS, vol. 3494, pp. 457.73. Springer Heidelberg (2005) -   Non-Patent Literature 26: Shi, E., Waters, B.: Delegating capability     in predicate encryption systems. In: Aceto, L., Damgard, I.,     Goldberg, L. A., Halldosson, M. M., Ingofsdotir, A., Walukiewicz, I.     (eds.) ICALP (2) 2008. LNCS, vol. 5126, pp. 560-78. Springer     Heidelberg (2008) -   Non-Patent Literature 27: Waters, B.: Efficient identity based     encryption without random oracles. Eurocrypt 2005, LNCS No. 3152,     pp. 443-59. Springer Verlag, 2005. -   Non-Patent Literature 28: Waters, B.: ciphertext-policy     attribute-based encryption: an expressive, efficient, and provably     secure realization. ePrint, IACR, http://eprint.iacr.org/2008/290 -   Non-Patent Literature 29: Waters, B.: Dual system encryption:     Realizing fully secure IBE and HIBE under simple assumptions. In:     Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-36. Springer     Heidelberg (2009)

SUMMARY OF INVENTION Technical Problem

It is an object of the present invention to provide a secure functional encryption scheme having diversified cryptographic functions.

Solution to Problem

A cryptographic processing system according to the present invention includes a key generation device, an encryption device, and a decryption device, and serving to execute a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more),

wherein the key generation device includes

a first information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which variable ρ(i) is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and a predetermined matrix M having L rows and r columns (r is an integer of 1 or more), and a decryption key generation part which generates an element k*₀, and an element k*_(i) for each integer i=1 . . . , L, based on a column vectors^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) and a vector each having r pieces of elements, and the matrix M inputted by the first information input part; a value s₀:=w^(→)·f^(→); and a predetermined value θ_(i) (i=1, . . . , L), the decryption key generation part being configured to generate the element k*₀ by setting the value −s₀ as a coefficient for a basis vector b*_(0,p) (p is a predetermined value) of the basis B*₀ and by setting a predetermined value κ as a coefficient for a basis vector b*_(0,q) (q is a predetermined value different from prescribed p), and

to generate the element k*_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b*_(t,1) of the basis B*_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b*_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t),

wherein the encryption device includes

a second information input part which takes as input, an attribute set Γ having the identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, and

an encrypted data generation part which generates an element c₀, and an element c_(t) concerning each identification information t included in the attribute set Γ, based on the attribute set Γ inputted by the second information input part, the encrypted data generation part being configured

to generate the element c₀ where a random value δ is set as a coefficient for a basis vector b_(0,p) (p is prescribed p) of a basis B₀, and where a predetermined value is set as a coefficient for a basis vector b_(0,q) (q is prescribed q) of a basis B₀, and

to generate the element c_(t) where x_(t,i′ multiplied by the random value δ is set as a coefficient for a basis vector b) _(t,i′) (i′=1, . . . , n_(t)) of the basis B_(t) for each identification information t included in the attribute set Γ, and

wherein the decryption device includes

a data acquisition part which acquires encrypted data c including the elements c₀ and c_(t) and the attribute set Γ, the elements c₀ and c_(t) being generated by the encrypted data generation part,

a decryption key acquisition part which acquires a decryption key sk_(s) including the elements k*₀ and k*_(i) and the variable number ρ(i), the elements k*₀ and k*_(i) being generated by the decryption key generation part,

a complementary coefficient calculation part which, based on the attribute set Γ included in the encrypted data c acquired by the data acquisition part, and the variable ρ(i) included in the decryption key sk_(s) acquired by the decryption key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the positive tuple and x^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)s_(i) for i included in the set I specified becomes s₀, and

a pairing operation part which calculates a value K=g_(T) ^(ζχ) by conducting a pairing operation indicated in Formula 1 for the elements c₀ and c_(t) included in the encrypted data c and the elements k*₀ and k*_(i) included in the decryption key sk_(s), based on the set I specified by the complementary coefficient calculation part and on the complementary coefficient α_(i) calculated by the complementary coefficient calculation part.

$\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{t},k_{i}^{*}} \right)}{\alpha_{i} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}\; {e\left( {c_{t},k_{i}^{*}} \right){\alpha_{i}/\left( {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{i}} \right)}}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 1} \right\rbrack \end{matrix}$

Advantageous Effects of Invention

The cryptographic processing system according to the present invention implements a large number of cryptographic functions, and implements functional encryption by employing a span program and an inner-product predicate. Also, this cryptographic processing system is more secure than a conventional functional encryption scheme.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an explanatory drawing of a matrix M̂.

FIG. 2 is an explanatory drawing of a matrix M_(δ).

FIG. 3 is an explanatory drawing of s₀.

FIG. 4 is an explanatory drawing of s^(→T).

FIG. 5 is a configuration diagram of a cryptographic processing system 10 which executes a key-policy functional encryption scheme.

FIG. 6 is a function block diagram showing the function of the cryptographic processing system 10 which executes the key-policy functional encryption scheme.

FIG. 7 is a flowchart showing the process of Setup algorithm.

FIG. 8 is a flowchart showing the process of KeyGen algorithm.

FIG. 9 is a flowchart showing the process of Enc algorithm.

FIG. 10 is a flowchart showing the process of Dec algorithm.

FIG. 11 is a configuration diagram of a cryptographic processing system 10 which executes the algorithm of a ciphertext-policy functional encryption scheme.

FIG. 12 is a function block diagram showing the function of the cryptographic processing system 10 which executes the ciphertext-policy functional encryption scheme.

FIG. 13 is a flowchart showing the process of the KeyGen algorithm.

FIG. 14 is a flowchart showing the process of the Enc algorithm.

FIG. 15 is a flowchart showing the process of the Dec algorithm.

FIG. 16 is a configuration diagram of a signature processing system 20.

FIG. 17 is a function block diagram showing the function of the signature processing system 20.

FIG. 18 is a flowchart showing the process of the Setup algorithm.

FIG. 19 is a flowchart showing the process of the KeyGen algorithm.

FIG. 20 is a flowchart showing the process of the Enc algorithm.

FIG. 21 is a flowchart showing the process of the Dec algorithm.

FIG. 22 is a diagram showing an example of the hardware configuration of each of a key generation device 100, an encryption device 200, a decryption device 300, a signature device 400, and a verification device 500.

DESCRIPTION OF EMBODIMENTS

Embodiments of the present invention will be described hereinafter with reference to the accompanying drawings.

In the following description, the processing device is, for example, a CPU 911 (to be described later). The storage device is, for example, a ROM 913, a RAM 914, or a magnetic disk 920 (each will be described later). The communication device is, for example, a communication board 915 (to be described later). The input device is, for example, a keyboard 902 or the communication board 915 (to be described later). Namely, the processing device, the storage device, the communication device, and the input device are hardware.

The notation in the following description will be explained.

When A is a random variable or distribution, Formula 101 denotes that y is randomly selected from A according to the distribution of A. Namely, in Formula 101, y is a random number.

$\begin{matrix} {y\overset{R}{}A} & \left\lbrack {{Formula}\mspace{14mu} 101} \right\rbrack \end{matrix}$

When A is a set, Formula 102 denotes that y is uniformly selected from A. Namely, in Formula 102, y is a uniform random number.

$\begin{matrix} {y\overset{U}{}A} & \left\lbrack {{Formula}\mspace{14mu} 102} \right\rbrack \end{matrix}$

Formula 103 denotes that y is a set, defined or substituted by z.

y:=z  [Formula 103]

When a is a fixed value, Formula 104 denotes an event that a machine (algorithm) A outputs a on input x.

A(x)→a  [Formula 104]

For example,

A(x)→1

Formula 105, namely, F_(q), denotes a finite field of order q.

[Formula 105]

A vector symbol denotes a vector representation over the finite field F_(q). Namely, Formula 106 is established.

{right arrow over (x)} denotes

(x ₁ , . . . ,x _(n))ε

  [Formula 106]

Formula 107 denotes the inner-product, indicated by Formula 109, of two vectors x^(→) and y^(→) indicated in Formula 108.

{right arrow over (x)}·{right arrow over (v)}  [Formula 107]

{right arrow over (x)}=(x ₁ , . . . ,x _(n)),

{right arrow over (v)}=(v ₁ , . . . ,v _(n))  [Formula 108]

Σ_(i=1) ^(n) x _(i) v _(i)  [Formula 109]

Note that X^(T) denotes the transpose of matrix M.

When b_(i) (i=1, . . . , n) is an element of a vector of a space V, namely, when Formula 110 is established, Formula 111 denotes a subspace generated by Formula 112.

b _(i)ε

(i=1, . . . ,n)  [Formula 110]

span

b ₁ , . . . ,b _(n)

⊂

(resp.span

{right arrow over (x)} ₁ , . . . ,{right arrow over (x)} _(n)

)  [Formula 111]

b ₁ , . . . ,b _(n)(resp.{right arrow over (x)} ₁ , . . . ,{right arrow over (x)} _(n))  [Formula 112]

Note that for bases B and B* indicated in Formula 113, Formula 114 is established.

:=(b ₁ , . . . ,b _(N)),

:=(b ₁ *, . . . ,b _(N)*)  [Formula 113]

(x ₁ , . . . ,x _(N))

:=Σ_(i=1) ^(N) x _(i) b _(i),

(y ₁ , . . . ,y _(N))

*:=Σ_(i=1) ^(N) y _(i) b _(i)*  [Formula 114]

In the following description, when “nt” is indicated to include a subscript or superscript, nt is n_(t). Likewise, when “Vt” is indicated to include a subscript or superscript, Vt is V_(t). Likewise, when “δi,j” is indicated to include a superscript, δi,j is δi,j.

When “→” indicating a vector is attached to a subscript or superscript, “→” is attached as a superscript to the subscript or superscript.

When B0 or Bd+1 representing a basis is indicated to include a subscript, B0 or Bd+1 represents B₀ or B_(d+1). Likewise, when B*0 or B*d+1 representing a basis is indicated to include a subscript, B*0 or B*d+1 represents B*₀ or B^(*) _(d+1).

In the following description, a cryptographic process includes a key generation process, an encryption process, and a decryption process, and a signature process includes a key generation process, a signature process, and a verification process.

Embodiment 1

This embodiment describes a basic concept for implementing the “functional encryption scheme to be described in the following embodiments, and one structure of the functional encryption.

First, the functional encryption will be briefly explained.

Second, a space having a rich mathematical structure called “dual pairing vector spaces (DPVS)” which is a space for implementing the functional encryption will be described

Third, a concept for implementing the functional encryption will be described. Here, “span program”, “the inner-product of attribute vectors, and an access structure”, and “secret distribution scheme (secret sharing scheme)” will be described.

Fourth, a “functional encryption scheme” according to this embodiment will be described. In this embodiment, a “key-policy functional encryption (KP-FE) scheme” will be described. Initially, the basic structure of the “key-policy functional encryption scheme” will be described. Subsequently, the basic structure of a “cryptographic processing system 10” which implements the “key-policy functional encryption scheme” will be described. Then, a “key-policy functional encryption scheme” and a “cryptographic processing system 10” according to this embodiment will be described in detail.

<1. Functional Encryption Scheme>

The functional encryption scheme is an encryption scheme that provides more sophisticated and flexible relations between an encryption key (ek) and a decryption key (dk).

According to the functional encryption scheme, an attribute x and an attribute y are set in an encryption key and a decryption key, respectively. A decryption key dk_(v):=(dk,v) can decrypt a ciphertext encrypted with an encryption key ek_(x):=(ek,x) only if R(x,v) holds for relation R.

The functional encryption scheme has various applications in the areas of access control of databases, mail services, contents distribution, and the like (see Non-Patent Literatures 2, 7, 9, 16, 19, 23 to 26, and 28).

When R is an equality relation, that is, when R(x, v) holds only if x=v, the functional encryption scheme is the ID-based encryption scheme.

As a more general class of functional encryption scheme than the ID-based encryption scheme, attribute-based encryption schemes have been proposed.

According to the attribute-based encryption schemes, each attribute which is set for an encryption key and decryption key is a tuple of attributes. For example, attributes which are set for an encryption key and decryption key are X:=(x₁, . . . , x_(d)) and V:=(v₁, . . . , v_(d)), respectively.

The component-wise equality relations for attribute components (e.g., {x_(t)=v_(t)}_(tε{1, . . . , d})) are input to an access structure S, and R(X, V) holds if and only if the input is accepted by the access structure S. Namely, the ciphertext encrypted with the encryption key can be decrypted with the decryption key.

If the access structure S is embedded into the decryption key dk_(v), the attribute-based encryption (ABE) scheme is called key-policy ABE (KP-ABE). If the access structure S is embedded into a ciphertext, the attribute-based encryption (ABE) scheme is called ciphertext-policy ABE (CP-ABE).

Inner-product encryption (IPE) described in Non-Patent Literature 19 is also a class of functional encryption, where each attribute for the encryption key and decryption key is a vector over a field or ring. For example, x^(→):=(x₁, . . . , x_(n))εF_(q) ^(n) and v^(→):=(v_(1i), . . . , v_(n))εF_(q) ^(n) are set for the encryption key and decryption key. R(x^(→), v^(→)) holds if and only if x^(→)·v^(→)=0.

<2. Dual Pairing Vector Spaces>

First, symmetric bilinear pairing groups will be described.

The symmetric bilinear pairing groups (q, G, G^(T), g, e) are a tuple of a prime q, a cyclic additive group G of order q and a cyclic multiplicative group G^(T) of order q, g≠0εG, and a polynomial-time computable nondegenerate bilinear pairing e: G×G→G_(T). The nondegenerate bilinear pairing signifies e(sg, tg)=e(g, g)^(st), and e(g, g)≠1.

In the following description, let Formula 115 be an algorithm that takes input 1^(λ) and outputs a value of a parameter param_(G):=(q, G, G_(T), g, e) of bilinear pairing groups with a security parameter λ.

  [Formula 115]

Dual pairing vector spaces will now be described.

Dual pairing vector spaces (q, V, G_(T), A, e) can be constituted by a direct product of symmetric bilinear pairing groups (param_(G):=(q, G, G_(T), g, e)). The dual pairing vector spaces (q, V, G_(T), A, e) are a tuple of a prime q, an N-dimensional vector space V over F_(q) indicated in Formula 116, a cyclic group G_(T) of the order q, and a canonical basis A:=(a₁, . . . , a_(N)) of the space V, and have the following operations (1) and (2) where a_(i) is as indicated in Formula 117.

$\begin{matrix} {:=\overset{\overset{N}{}}{ \times \ldots \times }} & \left\lbrack {{Formula}\mspace{14mu} 116} \right\rbrack \\ {a_{i}:=\left( {\overset{\overset{i = 1}{}}{0,\ldots,0},g,\overset{\overset{N - i}{}}{0,\ldots,0}} \right)} & \left\lbrack {{Formula}\mspace{14mu} 117} \right\rbrack \end{matrix}$

Operation (1): Nondegenerate Bilinear Pairing

The pairing on the space V is defined by Formula 118.

e(x,y):=Π_(i=1) ^(N) e(G _(i) ,H _(i))ε

where

(G ₁ , . . . ,G _(N)):=xε

(H ₁ , . . . ,H _(N)):=yε

This is nondegenerate bilinear, i.e., e(sx, ty)=e(s, y)^(st) and if e(x, y)=1 for all yεV, then x=0. For all i and j, e(a_(i), a_(j))=e(g, g)^(δi,j) where δ_(i,j)=1 if i=j, and δ_(i,j)=0 if i≠j. Also, e(g, g)≠1εG_(T).

Operation (2): Distortion Maps

Linear transformation φ_(i,j) on the space V indicated in Formula 119 can achieve Formula 120.

$\begin{matrix} {{{\varphi_{i,j}\left( a_{j} \right)} = a_{i}},{{{{if}\mspace{14mu} k} \neq {j\mspace{14mu} {then}\mspace{14mu} {\varphi_{i,j}\left( a_{k} \right)}}} = 0}} & \left\lbrack {{Formula}\mspace{14mu} 119} \right\rbrack \\ {{{\varphi_{i,j}(x)}:=\left( {\overset{\overset{i - 1}{}}{0,\ldots,0},g,\overset{\overset{N - i}{}}{0,\ldots,0}} \right)}{{{Note}\mspace{14mu} {{that}\left( {g_{1},{\ldots \mspace{14mu} g_{N}}} \right)}}:=x}} & \left\lbrack {{Formula}\mspace{14mu} 120} \right\rbrack \end{matrix}$

Linear transformation φ_(i,j) will be called “distortion maps”.

In the following description, let Formula 121 be an algorithm that takes as input, 1^(λ) (λεnatural number), Nεnatural number, and the value of the parameter param_(G):=(q, G, G_(T), g, e) of bilinear pairing groups, and outputs the value of a parameter param_(v):=(q, V, G_(T), A, e) of dual pairing vector spaces which have a security parameter λ and which form an N-dimensional space V.

  [Formula 121]

A case will be described where dual pairing vector spaces are constructed from the symmetric bilinear pairing groups described above. Dual pairing vector spaces can be constructed from asymmetric bilinear pairing groups as well. The following description can be easily applied to a case where dual pairing vector spaces are constructed from asymmetric bilinear pairing groups.

<3. Concept for Implementing Functional Encryption>

<3-1. Span Program>

FIG. 1 is an explanatory drawing of a matrix M̂.

Let {p₁, . . . , p_(N)} be a set of variables. M̂:=(M, ρ) is a labeled matrix where the matrix M is a (L rows×r columns) matrix over F_(q), and ρ is a label of the column of the matrix M and is related to one of literals {p₁, . . . , p_(n),

p₁, . . . ,

p_(n)}. A label ρ_(i) (i=1, . . . , L) of every rows of M is related to one of the literals, namely, ρ:{1, . . . , L}→{p₁, . . . , p_(n),

p₁, . . . ,

p_(n)}.

For every input sequence δε{0, 1}^(n), a submatrix M_(δ) of the matrix M is defined. The matrix M_(δ) is a submatrix consisting of those rows of the matrix M, whose labels ρ are related to a value “1” by the input sequence 6. Namely, the matrix M_(δ) is a submatrix consisting of the rows of the matrix M which are related to p_(i) with which δ_(i)=1 and the rows of the matrix M which are related to

p_(i) with which δ_(i)=0.

FIG. 2 is an explanatory drawing of the matrix M_(δ). Note that in FIG. 2, n=7, L=6, and r=5. That is, the set of variables is {p₁, . . . , p₇}, and the matrix M is a (6 rows×5 columns) matrix. In FIG. 2, assume that the labels ρ are related such that ρ₁ corresponds to

p₂, ρ₂ to p₁, ρ₃ to p₄, ρ₄ to

p₅, ρ₅ to

₃, and ρ₆ to

p₅.

Assume that in an input sequence δε{0,1}⁷, δ₁=1, δ₂=0, δ₃=1, δ₄=0, δ₅=0, δ₆=1, and δ₇=1. In this case, a submatrix consisting of the rows of the matrix M which are related to literals (p₁, p₃, p₆, p₇,

p₂,

p₄,

p₅) surrounded by broken lines is the matrix M_(δ). That is, the submatrix consisting of the 1st row (M₁), 2nd row (M₂), and 4th row (M₄) of the matrix M is the matrix M_(δ).

In other words, when map γ: {1, . . . , L}→{0, 1} is [ρ(j)=p_(i)]

[δ_(i)=1] or [ρ(j)=

p_(i)]

[δ_(i)=0], then γ(j)=1; otherwise γ(j)=0. In this case, M_(δ):=(M_(j))_(γ(j)=1). Note that M_(i) is the j-th row of the matrix M.

That is, in FIG. 2, map γ(j)=1 (j=1, 2, 4), so map γ(j)=0 (j=3, 5, 6). Hence, (M_(j))_(γ(j)=1) is M₁, M₂, and M₄, and the matrix Mδ.

More specifically, whether or not the i-th row of the matrix M is included in the matrix M_(δ) is determined by whether the value of the map γ(j) is “0” or “1”.

The span program M̂ accepts an input sequence δ if and only if 1^(→εspan<M) _(δ)>, and rejects the input sequence δ otherwise. Namely, the span program M̂ accepts an input sequence δ if and only if linear combination of the rows of the matrix M_(δ) which are obtained from the matrix ̂ by the input sequence δ gives 1^(→). 1^(→) is a row vector which has a value “1” in each element.

For example, in FIG. 2, the span program M̂ accepts an input sequence δ if and only if linear combination of the respective rows of the matrix M_(δ) consisting of the 1st, 2nd, and 4th rows of the matrix M gives 1^(→). That is, if there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), the span program M̂ accepts an input sequence δ.

A span program is called monotone if the labels ρ are related to only positive literals {p₁, . . . , p_(N)}. A span program is called non-monotone if the labels ρ are related to the literals {p₁, . . . , p_(n),

p₁, . . . ,

p_(n)}. Suppose that the span program is non-monotone. An access structure (non-monotone access structure) is constituted using the non-monotone span program. Briefly, an access structure controls access to encryption, namely, it controls whether a ciphertext is to be decrypted or not.

Because the span program is not monotone but non-monotone, the application of the functional encryption schemes constituted using the span program widens. This will be described later in detail.

<3-2. Inner-Products of Attribute Vectors and Access Structure>

Map γ(j) described above will be calculated using the inner-products of attribute vectors. Namely, which row of the matrix M is to be included in the matrix M_(δ) will be determined using the inner-products of the attribute vectors.

U_(t) (t=1, . . . , d and U_(t)⊂{0, 1}*) is a sub-universe and an attribute set. Each U_(t) includes identification information (t) of the sub-universe and n_(t)-dimensional vector (v^(→)). Namely, U_(t) is (t, v^(→)) where tε{1, . . . , d} and v^(→εF) _(q) ^(nt).

Let U_(t):=(t, v^(→)) be a variable ρ of a span program M̂:=(M, ρ), that is, p:=(t, v^(→)). Let a span program M̂:=(M, ρ) having a variable (p:=(t, v^(→)), (t′, . . . ) be an access structure S.

That is, the access structure S:=(M, ρ), and ρ:={1, . . . , L}→{(t, v^(→)), (t′, v′^(→)), . . . ,

(t′,v′^(→)),

(t,v^(→)), . . . }.

Let Γ be an attribute set, that is, Γ:={(t, x^(→) _(t))|x^(→) _(t)εF_(q) ^(nt), 1≦t≦d}.

When Γ is given to the access structure S, map γ: {1, . . . , L}→{0, 1} for the span program M̂:=(M, ρ) is defined as follows. For each integer i=1, . . . , L, set γ(j)=1 if [ρ(i)=(t, v^(→) _(i))]

[(t, x^(→) _(t))]εΓ]

[v^(→) _(i)·x^(→) _(t)=0] or [ρ(i)=

(t, v^(→) _(i))]

[(t,x^(→) _(t))εΓ]

[v^(→) _(i)·x^(→) _(t)≈0]. Set γ(j)=0 otherwise.

Namely, the map γ is calculated based on the inner-product of the attribute vectors v^(→) and x^(→). As described above, which row of the matrix M is to be included in the matrix M₈ is determined by the map γ. More specifically, which row of the matrix M is to be included in the matrix M_(δ) is determined by the inner-product of the attribute vectors v^(→) and x^(→). The access structure S:=(M, ρ) accepts Γ if and only if 1^(→)εspan<(M_(i))_(γ(i)=1)>.

<3-3. Secret Sharing Scheme>

A secret sharing scheme for the access structure S:=(M, ρ) will be described.

The secret sharing scheme is letting secret information be shared to render it nonsense shared information. For example, secret information s is let to be shared among 10 lumps to generate 10 pieces of shared information. Each of the 10 pieces of shared information does not have information on the secret information s. Hence, even when certain one piece of shared information is obtained, no information can be obtained on the secret information s. On the other hand, if all of the 10 pieces of shared information are obtained, the secret information s can be recovered.

Another secret sharing scheme is also available according to which even when all of the 10 pieces of shared information cannot be obtained, if one or more, but not all, (for example, 8 pieces) of shared information can be obtained, then the secret information can be recovered. A case like this where the secret information s can be recovered using 8 out of 10 pieces of shared information will be called 8-out-of-10. That is, a case where the secret information s can be recovered using t out of n pieces of shared information will be called t-out-of-n. This t will be called a threshold.

Also, still another secret sharing scheme is available according to which when 10 pieces of shared information d₁, . . . , d₁₀ are generated, the secret information s can be recovered if 8 pieces of shared information d₁, . . . , d₈ are given, but cannot if 8 pieces of shared information d₃, d₁₀ are given. Namely, there is a secret sharing scheme with which whether or not the secret information s can be recovered is controlled not only by the number of pieces of shared information obtained but also depending on the combination of the shared information.

FIG. 3 is an explanatory drawing of s₀. FIG. 4 is an explanatory drawing of s^(→T).

Let a matrix M be a (L rows×r columns) matrix. Let f^(→) a column vector indicated in Formula 122.

$\begin{matrix} {\overset{\rightarrow T}{f}:={\left( {f_{1},{\ldots \mspace{14mu} f_{r}}} \right)^{T}\overset{U}{}_{q}^{r}}} & \left\lbrack {{Formula}\mspace{14mu} 122} \right\rbrack \end{matrix}$

Let s₀ indicated in Formula 123 be secret information to be shared.

s ₀:={right arrow over (1)}·{right arrow over (f)} ^(T):=Σ_(k=1) ^(r) f _(k)  [Formula 123]

Let s^(→T) indicated in Formula 124 be the vector of L pieces of shared information of s₀.

{right arrow over (s)} ^(T):=(s ₁ , . . . s _(L))^(T) :=M·{right arrow over (f)} ^(T)

Let the shared information s_(i) belong to ρ(i).

If the access structure S:=(M, ρ) accepts Γ, that is, 1^(→)εspan<(M_(i))_(γ(i)=1)> for γ:{1, . . . , L}→{0.1}, then there exist constants {α_(i)εF_(q)|iεI} such that I⊂{iε{1, . . . , L}|γ(i)−=1}.

This is obvious from the explanation on FIG. 2 in that if there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), the span program M̂ accepts an input sequence δ. Namely, if the span program M̂ accepts an input sequence δ when there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), then there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→).

Note Formula 125.

Σ_(iεI)α_(i) s _(i) :=s ₀  [Formula 125]

Note that the constants {α_(i)} can be computed in time polynomial in the size of the matrix M.

With the functional encryption scheme according to this and the following embodiments, the access structure is constructed by applying the inner-product predicate and the secret sharing scheme to the span program, as described above. Therefore, access control can be designed freely by designing the matrix M in the span program and the attribute information x and the attribute information v (predicate information) in the inner-product predicate. Namely, access control can be designed with a very high degree of freedom. Designing of the matrix M corresponds to designing conditions such as the threshold of the secret sharing scheme.

For example, the attribute-based encryption scheme described above corresponds to a case, in the access structure in the functional encryption scheme according to this and the following embodiments, where designing of the inner-product predicate is limited to a certain condition. That is, when compared to the access structure in the functional encryption scheme according to this and the following embodiments, the access structure in the attribute-based encryption scheme has a lower degree of freedom in access control design because it lacks the degree of freedom in designing the attribute information x and the attribute information v (predicate information) in the inner-product predicate. More specifically, the attribute-based encryption scheme corresponds to a case where attribute information {x^(→) _(t)}_(tε{1, . . . , d}) and {v_(→) _(t)}_(tε{1, . . . , d}) are limited to two-dimensional vectors for the equality relation, for example, x^(→) _(t):=(1, x_(t)) and v^(→) _(t):=(v_(t), −1).

The inner-product predicate encryption scheme described above corresponds to a case, in the access structure in the functional encryption scheme according to this and the following embodiments, where designing of the matrix M in the span program is limited to a certain condition. That is, when compared to the access structure in the functional encryption scheme according to this and the following embodiments, the access structure in the inner-product predicate encryption scheme has a lower degree of freedom in access control design because it lacks the degree of freedom in designing the matrix M in the span program. More specifically, the inner-product predicate encryption scheme corresponds to a case where the secret sharing scheme is limited to 1-out-of-1 (or d-out-of-d).

In particular, the access structure in the functional encryption scheme according to this and the following embodiments constitutes a non-monotone access structure that uses a non-monotone span program. Thus, the degree of freedom in access control designing improves.

More specifically, since the non-monotone span program includes a negative literal (

p), a negative condition can be set. For example, assume that First Company includes four departments of A, B, C, and D. Assume that access control is to be performed that only the users belonging to departments other than B department of First Company are capable of access (capable of decryption). In this case, if a negative condition cannot be set, a condition that “the user belongs to any one of A, C, and D departments of First Company” must be set. On the other hand, if a negative condition can be set, a condition that “the user is an employee of First Company and belongs to a department other than department B” can be set. Namely, since a negative condition can be set, natural condition setting is possible. Although the number of departments is small in this case, this scheme is very effective in a case where the number of departments is large.

<4. Basic Structure of Functional Encryption Scheme>

<4-1. Basic Structure of Key-Policy Functional Encryption Scheme>

The structure of a key-policy functional encryption scheme will be briefly described. Note that key-policy means that policy is embedded in the decryption key, that is, an access structure is embedded in the decryption key.

The key-policy functional scheme consists of four algorithms: Setup, KeyGen, Enc, and Dec.

(Setup)

A Setup algorithm is a randomized algorithm that takes as input a security parameter λ and an attribute format μ^(→):=(d; n₁, . . . , n_(d)), and outputs public parameters pk and a master key sk.

(KeyGen)

A KeyGen algorithm is a randomized algorithm that takes as input an access structure S:=(M, ρ), the public parameters pk, and the master key sk, and outputs a decryption key sk_(s).

(Enc)

An Enc algorithm is a randomized algorithm that takes as input a message m, an attribute set Γ:={(t,x^(→) _(t))|x^(→) _(t))εF_(q) ^(nt), 1≦t≦d}, and the public parameters pk, and outputs encrypted data c.

(Dec)

A Dec algorithm is an algorithm that takes as input the encrypted data c encrypted under the attribute set Γ, the decryption key sk_(s) for the access structure S, and the public parameters pk, and outputs either the message m or distinguished symbol ⊥.

A key-policy functional encryption scheme should have the following property: for all access structures S, the attribute set Γ, the correctly generated public parameters pk, the master key sk, and the ciphertext c indicated in Formula 126, it holds that m=Dec(pk, sk_(s), c) if the access structure S accepts the attribute set Γ. If the access structure S rejects the attribute set Γ, the probability of m=Dec(pk, sk_(s), c) is negligible.

$\begin{matrix} {c\overset{R}{}{{Enc}\left( {{pk},m,\Gamma} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 126} \right\rbrack \end{matrix}$

<4-2. Cryptographic Processing System 10>

A cryptographic processing system 10 that executes the algorithms of the key-policy functional encryption scheme described above will be described.

FIG. 5 is a configuration diagram of the cryptographic processing system 10 which executes the key-policy functional encryption scheme.

The cryptographic processing system 10 is provided with a key generation device 100, an encryption device 200, and a decryption device 300.

The key generation device 100 executes the Setup algorithm by taking as input a security parameter λ and an attribute format μ^(→):=(d; n₁, . . . , n_(d)), and generates public parameters pk and a master key sk. The key generation device 100 publicizes the generated public parameters pk. The key generation device 100 also executes the KeyGen algorithm by taking as input an access structure S, generates a decryption key sk_(s), and distributes the decryption key sk_(s) to the decryption device 300 in secrecy.

The encryption device 200 executes the Enc algorithm by taking as input a message m, an attribute set Γ, and the public parameters pk, and generates encrypted data c. The encryption device 200 transmits the generated encrypted data c to the decryption device 300.

The decryption device 300 executes the Dec algorithm by taking as input the public parameters pk, the decryption key sk_(s), and the encrypted data c, and outputs a message m or distinguished symbol ⊥.

<4-3. Key-Policy Functional Encryption Scheme and Cryptographic

Processing System 10 in Detail>

The key-policy functional encryption scheme, and the function and operation of the cryptographic processing system 10 which executes the key-policy functional encryption scheme will be described with reference to FIGS. 6 to 10.

FIG. 6 is a function block diagram showing the function of the cryptographic processing system 10 which executes the key-policy functional encryption scheme. The cryptographic processing system 10 is provided with the key generation device 100, the encryption device 200, and the decryption device 300, as described above.

FIGS. 7 and 8 are flowcharts showing the operation of the key generation device 100. Note that FIG. 7 is a flowchart showing the process of the Setup algorithm, and that FIG. 8 is a flowchart showing the process of the KeyGen algorithm. FIG. 9 is a flowchart showing the operation of the encryption device 200 and the process of the Enc algorithm. FIG. 10 is a flowchart showing the operation of the decryption device 300 and the process of the Dec algorithm.

Assume that x_(t,1):=1 in the following description.

The function and operation of the key generation device 100 will be described. The key generation device 100 is provided with a master key generation part 110, a master key storage part 120, an information input part 130 (first information input part), a decryption key generation part 140, and a key distribution part 150. The decryption key generation part 140 is provided with an f vector generation part 141, an s vector generation part 142, a random number generation part 143, and a key element generation part 144.

The process of the Setup algorithm will be described first with reference to FIG. 7.

(S101: Regular Orthogonal Basis Generation Step)

The master key generation part 110 calculates Formula 127 with the processing device to generate param_(μ→), and bases B_(t) and B*_(t) for each integer t=0, . . . , d.

$\begin{matrix} \left\lbrack {{Formula}\mspace{14mu} 127} \right\rbrack & \; \\ {{{input}\mspace{14mu} 1^{\lambda}},{\overset{\rightarrow}{\mu}:=\left( {{d;{n_{1}\mspace{14mu} \ldots}}\mspace{14mu},n_{d}} \right)}} & (1) \\ {{param}_{}:={{\left( {q,,_{T},g,e} \right)\overset{R}{}}\left( 1^{\lambda} \right)}} & (2) \\ {{{\psi \overset{U}{}_{q}^{\times}},{N_{0}:=5},{N_{t}:={{4\; n_{t}\mspace{14mu} {for}\mspace{14mu} t} = 1}},\ldots \mspace{14mu},d}{{The}\mspace{14mu} {processes}\mspace{14mu} {of}\mspace{14mu} (4)\mspace{14mu} {to}\mspace{14mu} (8)\mspace{14mu} {are}\mspace{14mu} {executed}\mspace{14mu} {for}\mspace{14mu} {each}}\text{}{{t = 0},\ldots \mspace{14mu},{d.}}} & (3) \\ {{param}_{_{t}}:={\left( {q,_{t},_{T},_{t},e} \right):={\left( {1^{\lambda},N_{t},{param}_{}} \right)}}} & (4) \\ {X_{t}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{}{{GL}\left( {N_{t},_{q}} \right)}}} & (5) \\ {\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}} & (6) \\ {{b_{t,i}:={\left( {\chi_{t,i,1},\ldots \mspace{14mu},\chi_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{\chi_{t,i,j}a_{t,j}}}}},{_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}} \right)}} & (7) \\ {{b_{t,i}^{*}:={{\left( {{v_{t,i,1,}\ldots}\mspace{14mu},v_{t,i,N_{t}}} \right)A_{t}} = {\sum\limits_{j = 1}^{N_{t}}{v_{t,i,j}a_{t,j}}}}},{_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,N_{t}}^{*}} \right)}} & (8) \\ {{g_{T}:={{e\left( {g,g} \right)}\psi}}{{param}_{\overset{\rightarrow}{\mu}}:=\left( {\left\{ {param}_{_{t}} \right\}_{{t = 0},\ldots \mspace{14mu},d,}g_{T}} \right)}} & (9) \end{matrix}$

Namely, the master key generation part 110 executes the following processes.

(1) With the processing device, the master key generation part 110 takes as input the security parameter λ(1^(λ)) and the attribute format μ^(→):=(d; n₁, . . . , n_(d)), where d is an integer of 1 or more, and n_(t) is an integer of 1 or more for each integer t=1, . . . , d.

(2) With the processing device, the master key generation part 110 executes algorithm G_(bpg) by taking as input the security parameter X(1^(λ)) inputted in (1), and generates the value of a parameter param_(G):=(q, G, G_(T), g, e) of the bilinear pairing group.

(3) With the processing device, the master key generation part 110 generates a random number ψ, and sets 5 in N₀, and 4n_(t) in N_(t) for each integer t=1, . . . , d.

Subsequently, the master key generation part 110 executes the processes of the following (4) to (8) for each integer t=0, . . . , d.

(4) With the processing device, the master key generation part 110 executes algorithm G_(dpvs) by taking as input the security parameter λ(1^(λ)) inputted in (1), N_(t) set in (3), and the value of param_(G):=(q, G, G_(T), g, e) generated in (2), and generates the value of parameter param_(vt):=(q, V_(T), G_(T), A, e) of the dual pairing vector spaces.

(5) With the processing device, the master key generation part 110 takes as input N_(t) set in (3), and F_(q), and generates linear transformation X_(t):=(χ_(t,i,j))_(i,j) randomly. Note that GL stands for General Linear. Namely, GL is a general linear group, a set of square matrices in which the determinant is not 0, and a group with respect to multiplication. Note that (χ_(t,i,j))_(i,j) signifies a matrix concerning the suffixes i and j of the matrix χ_(t,i,j) where i, j=1, . . . , n_(t).

(6) With the processing device and based on the random number ψ and linear transformation X_(t), the master key generation part 110 generates (ν_(t,i,j))_(i,j):=ψ·(X_(t) ^(T))^(→1). As (χ_(t,i,j))_(i,j) does, (ν_(t,i,j))_(i,j) signifies a matrix concerning the suffixes i and j of the matrix ν_(t,i,j) where i, j=1, . . . , n_(t).

(7) With the processing device and based on the linear transformation x_(t) generated in (5), the master key generation part 110 generates the basis B_(t) from the canonical basis A_(t) generated in (4).

(8) With the processing device and based on (ν_(t,i,j))_(i,j) generated in (6), the master key generation part 110 generates the basis B*_(t) from the canonical basis A_(t) generated in (4).

(9) With the processing device, the master key generation part 110 sets e(g, g)^(ψ) in g_(T). The master key generation part 110 also sets {param_(vt)}_(t=0, . . . , d generated in ()4), and g_(T), in param_(μ→). Note that g_(T)=e(b_(t,i), b*_(t,i)) for each integer t=0, . . . , d and each integer i=1, . . . , N_(t).

In brief, in (S101), the master key generation part 110 executes the algorithm G_(ob) indicated in Formula 128, and generates param_(μ→, and the bases B) _(t) and B*_(t) for each integer t=0, . . . , d.

$\begin{matrix} {{{{\left. {\left( {{d;{n_{1}\mspace{14mu} \ldots}}\mspace{14mu},n_{d}} \right)} \right):{param}_{}}:={{\left( {q,,_{T},g,e} \right)\overset{R}{}}\left( 1^{\lambda} \right)}},\mspace{20mu} {\psi \overset{U}{}_{q}^{\times}},\mspace{20mu} {N_{0}:=5},{n_{t}:={{4\; n_{t}\mspace{14mu} {for}\mspace{14mu} t} = 1}},\ldots \mspace{14mu},d,{{{For}\mspace{14mu} t} = 0},\ldots \mspace{14mu},d,{{param}_{_{t}}:={\left( {q,_{t},_{T},_{t},e} \right):={\left( {1^{\lambda},N_{t},{param}_{}} \right)}}},{X_{t}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{}{{GL}\left( {N_{t},_{q}} \right)}}},{\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}},\mspace{20mu} {b_{t,i}:={\left( {\chi_{t,i,1},\ldots \mspace{14mu},\chi_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{\chi_{t,i,j}a_{t,j}}}}},{_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}} \right)},\mspace{20mu} {b_{t,i}^{*}:={\left( {{v_{t,i,1,}\mspace{14mu} \ldots}\mspace{14mu},v_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{v_{t,i,j}a_{t,j}}}}},{_{t}^{*}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}^{*}} \right)},\mspace{20mu} \mspace{20mu} {g_{T}:={e\left( {g,g} \right)}^{\psi}},{{param}_{\overset{\rightarrow}{\mu}}:=\left( {\left\{ {param}_{_{t}} \right\}_{{t = 0},\ldots \mspace{14mu},d,}g_{T}} \right)}}\mspace{20mu} {{return}\mspace{14mu} {\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \mspace{14mu},d}} \right).}}} & \left\lbrack {{Formula}\mspace{14mu} 128} \right\rbrack \end{matrix}$

(S102: Public Parameter Generation Step)

With the processing device, the master key generation part 110 generates a subbasis B̂₀ of the basis B_(t) generated in (S101), and a subbasis B̂_(t) for each integer t=1, . . . , d, as indicated in Formula 129.

₀:=(b _(0,1) ,b _(0,3) ,b _(0,5)),

_(t):=(b _(t,1), . . . ,b_(t,n) _(t) ,b _(t,3n) _(t) ₊₁ , . . . ,b _(t,4n) _(t) ) for t=1, . . . ,d  [Formula 129]

The master key generation part 110 treats the generated subbases B̂₀ and B̂_(t), the security parameter λ(1^(λ)) inputted in (S101), and param_(μ→) generated in (S101), as the public parameters pk.

(S103: Master Key Generation Step)

With the processing device, the master key generation part 110 generates a subbasis B̂*₀ of the basis B*_(t) generated in (S101), and a subbasis B̂*_(t) for each integer t=1, . . . , d, as indicated in Formula 130.

₀*:=(b _(0,1) *,b _(0,3) *,b _(0,4)*)

_(t)*:=(b _(t,1) *, . . . ,b _(t,n) _(t) *,b _(t,2n) _(t) ₊₁ *, . . . ,b _(t,3n) _(t) *)

for t=1, . . . ,d,  [Formula 130]

The master key generation part 110 treats the generated subbases B̂*₀ and B̂*_(t), as the master key sk.

(S104: Master Key Storing Step)

The master key storage part 120 stores the public parameters pk including the subbasis B̂*_(t) generated in (S102) for each integer t=0, . . . , d, in the storage device. The master key storage part 120 also stores the master key sk including the subbasis B̂*_(t) generated in (S103) for each integer t=0, . . . , d, in the storage device.

In brief, from (S101) through (S103), the master key generation part 110 generates the public parameters pk and the master key sk by executing the Setup algorithm indicated in Formula 131. Then, in (S104), the master key storage part 120 stores the generated public parameters pk and master key sk, in the storage device.

Note that the public parameters are publicized via, e.g., a network, so the encryption device 200 and decryption device 300 can acquire them.

$\begin{matrix} {{{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \mspace{14mu},n_{d}} \right)}} \right)}\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \mspace{11mu},d}} \right)\overset{R}{}}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}{{{\hat{}}_{0}:=\left( {b_{0,1},b_{0,3},b_{0,5}} \right)},{{\hat{}}_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,n_{t}},b_{t,{{3n_{t}} + 1}},\ldots \mspace{14mu},b_{t,{4n_{t}}}} \right)}}{{{{for}\mspace{14mu} t} = 1},\ldots \mspace{14mu},d,{{\hat{}}_{0}^{*}:=\left( {b_{0,1}^{*},b_{0,3}^{*},b_{0,4}^{*}} \right)},{{\hat{}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,n_{t}}^{*},b_{t,{{2n_{t}} + 1}}^{*},\ldots \mspace{14mu},b_{t,{3n_{t}}}^{*}} \right)}}{{{{for}\mspace{14mu} t} = 1},\ldots \mspace{14mu},d,{{sk}:=\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 0},\ldots \mspace{11mu},d}},{{p\; k}:={{\left( {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},\left\{ _{t} \right\}_{{t = 0},\ldots \mspace{11mu},d}} \right).{return}}\mspace{14mu} {sk}}},{p\; {k.}}}} & \left\lbrack {{Formula}\mspace{14mu} 131} \right\rbrack \end{matrix}$

The process of the KeyGen algorithm will be described with reference to FIG. 8.

(S201: Information Input Step)

With the input device, the information input part 130 takes as input the access structure S:=(M, ρ) described above. The matrix M of the access structure S is set depending on the condition of the system the user wishes to realize. Also, for example, the attribute information of the user of the decryption key sk_(s) is set in ρ of the access structure S.

(S202: f Vector Generation Step)

With the processing device, the f vector generation part 141 generates a vector f^(→) having r pieces of elements, randomly as indicated in Formula 132.

$\begin{matrix} {\overset{\rightarrow}{f}\overset{U}{}_{q}^{r}} & \left\lbrack {{Formula}\mspace{14mu} 132} \right\rbrack \end{matrix}$

(S203: s Vector Generation Step)

With the processing device, the s vector generation part 142 generates a vector s^(→T):=(S₁, . . . , s_(L))^(T) based on the (L rows×r columns) matrix M included in the access structure S inputted in (S201) and the vector f^(→) generated in (S202), as indicated in Formula 133.

{right arrow over (s)} ^(T):=(s ₁ , . . . ,s _(L))^(T) :=M·{right arrow over (f)} ^(T)

With the processing device, the s vector generation part 142 generates a value s₀ based on the vector f^(→) generated in (S202), as indicated in Formula 134.

s ₀:={right arrow over (1)}·{right arrow over (f)} ^(T)  [Formula 134]

(S204: Random Number Generation Step)

With the processing device, the random number generation part 143 generates a random number η₀, and a random number θ_(i) for each integer i=1, . . . , L, as indicated in Formula 135.

$\begin{matrix} {\eta_{0},{\theta_{i}\overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}}} & \left\lbrack {{Formula}\mspace{14mu} 135} \right\rbrack \end{matrix}$

(S205: Key Element Generation Step)

With the processing device, the key element generation part 144 generates an element k*₀ of the decryption key sk_(s), as indicated in Formula 136. [Formula 136]

k ₀*:=(−s ₀,0,1,η₀,0)

₀*  [Formula 134]

As described above, for the bases B and B* indicated in Formula 113, Formula 114 is established. Hence, Formula 136 means setting −s₀ as the coefficient for a basis vector b*_(0,1) of a basis B*₀, 0 as the coefficient for a basis vector b*_(0,2), 1 as the coefficient for a basis vector b*_(0,3), η₀ as the coefficient for a basis vector b*_(0,4), and 0 as the coefficient for a basis vector b*_(0,5.)

With the processing device, the key element generation part 144 also generates an element k*_(i) of the decryption key sk_(s) for each integer i=1, . . . , L, as indicated in Formula 137.

$\begin{matrix} {\mspace{79mu} {{{{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\mspace{79mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}}}{k_{i}^{*}:=\left( {\overset{\overset{n_{t}}{}}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t}}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}} \right)_{_{t}^{*}}}\mspace{20mu} {{{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\mspace{79mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{k_{i}^{*}:=\left( {\overset{\overset{n_{t}}{}}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}} \right)_{_{t}^{*}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 137} \right\rbrack \end{matrix}$

More specifically, as Formula 136 does, Formula 137 means, when ρ(i) is a positive tuple (t, v^(→) _(i)), setting s_(i)+θ_(i)v_(i,1) as the coefficient for a basis vector b*_(t,1), θ_(i)v_(1,2), . . . , θ_(i)v_(i,nt) as the coefficients for basis vectors b*_(t,2), . . . , b*_(t,nt), 0 as the coefficients for basis vectors b*_(t,nt+1), . . . , b*_(t,2nt), η_(i,1), . . . , η_(i,nt) as the coefficients for basis vectors b*_(t,2nt+1), . . . , b*_(t,3nt), and 0 as the coefficients for basis vectors b*_(t,3nt+1), . . . , b*_(t,4nt), of the basis B*_(t).

Formula 137 also means, when ρ(i) is a negative tuple

(t, v^(→) _(i)), setting s_(i)v_(i,1), . . . , s_(i)v_(i,nt) as the coefficients for the basis vectors b*_(t,1), . . . , b*_(t,nt), 0 as the coefficients for the basis vectors b*_(t,nt+1), . . . , b*_(t,2nt), η_(i,1), . . . , η_(i,nt) as the coefficients for the basis vectors b*_(t,2nt+1), . . . , b*_(t,3nt,), and 0 as the coefficients for the basis vectors b*_(t,3nt+1), . . . , b*_(t,4nt), of the basis B*_(t).

(S206: Key Distribution Step)

For example, with the communication device, the key distribution part 150 distributes the decryption key sk_(s) constituted by, as elements, the access structure S inputted in (S201) and k*₀, k*₁, k*_(L) generated in (S205), to the decryption device 300 in secrecy via the network. As a matter of course, the decryption key sk_(s) may be distributed to the decryption device 300 by another method.

More specifically, from (S201) through (S205), the information input part 130 and decryption key generation part 140 generate the decryption key sk_(s) by executing the KeyGen algorithm indicated in Formula 138. Then, in (S206), the key distribution part 150 distributes the generated decryption key sk_(s) to the decryption device 300.

$\begin{matrix} {\mspace{79mu} {{{{KeyGen}\left( {{p\; k},{sk},{:=\left( {M,\rho} \right)}} \right)}\mspace{20mu} {\overset{\rightarrow}{f}\overset{U}{}_{q}^{r}}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \mspace{14mu},s_{L}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},\mspace{20mu} {s_{0}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\mspace{20mu} \eta_{0},{\theta_{i}\overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}},\mspace{20mu} {k_{0}^{*}:=\left( {{- s_{0}},0,1,\eta_{0},0} \right)_{_{0}^{*}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq i \leq {L\mspace{20mu} {{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}}},\mspace{20mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{k_{i}^{*}:={\left( {\overset{\overset{n_{t}}{}}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t}}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}} \right)_{_{t}^{*}}\mspace{20mu} {{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}}}},\mspace{79mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{k_{i}^{*}:={{\left( {\overset{\overset{n_{t}}{}}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}} \right)_{_{t}^{*}}\mspace{20mu} {sk}_{}}:={{\left( {,k_{0}^{*},k_{1}^{*},\ldots \mspace{14mu},k_{L}^{*}} \right).\mspace{20mu} {return}}\mspace{14mu} {{sk}_{}.}}}}}} & \left\lbrack {{Formula}\mspace{20mu} 138} \right\rbrack \end{matrix}$

The function and operation of the encryption device 200 will be described. The encryption device 200 is provided with a public parameter acquisition part 210, an information input part 220 (second information input part), an encrypted data generation part 230, and a data transmission part 240 (data output part). The encrypted data generation part 230 is provided with a random number generation part 231 and a cryptographic element generation part 232.

The process of the Enc algorithm will be described with reference to FIG. 9.

(S301: Public Parameter Acquisition Step)

For example, with the communication device, the public parameter acquisition part 210 acquires the public parameters pk generated by the key generation device 100, via the network.

(S302: Information Input Step)

With the input device, the information input part 220 takes as input the message m to be transmitted to the decryption device 300. With the input device, the information input part 220 also takes as input the attribute set Γ:={(t, x^(→) _(t):=(x_(t,1), . . . , x_(t,nt)εF_(q) ^(nt)))/1≦t≦d}. Note that t need not be all of the integers t falling within the range of 1≦t≦d, but may be one or more of integers t falling within the range of 1≦t≦d. Also, for example, attribute information of a decryptable user is set in the attribute set Γ.

(S303: Random Number Generation Step)

With the processing device, the random number generation part 231 generates random numbers δ, φ₀, φ_(t,1), . . . , φ_(t,nt), and C, as indicated in Formula 139.

$\begin{matrix} {\delta,\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}},{{{\zeta \overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{11mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}} & \left\lbrack {{Formula}\mspace{14mu} 139} \right\rbrack \end{matrix}$

(S304: c Vector Generation Step)

With the processing device, the cryptographic element generation part 232 generates an element c₀ of the encrypted data c as indicated in Formula 140.

c ₀:=(δ,0,ζ,0,φ₀)

₀  [Formula 140]

With the processing device, the cryptographic element generation part 232 also generates an element c_(t) of the encrypted data c for each integer t of (t, v^(→) ₁) included in Γ, as indicated in Formula 141.

$\begin{matrix} {c_{t}:=\left( {\overset{\overset{n_{t}}{}}{{\delta \left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}\mspace{14mu} \overset{n_{t}}{\overset{}{0^{n_{t}},}}\mspace{11mu} \overset{n_{t}}{\overset{}{0^{n_{t}},}}\mspace{11mu} \overset{n_{t}}{\overset{}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}}}}} \right)_{_{t}}} & \left\lbrack {{Formula}\mspace{14mu} 141} \right\rbrack \end{matrix}$

With the processing device, the cryptographic element generation part 232 also generates an element c_(d+1) of the encrypted data c, as indicated in Formula 142.

c _(d+1) :=g _(T) ^(ζ) m  [Formula 142]

(S305: Data Transmission Step)

For example, with the communication device, the data transmission part 240 transmits the encrypted data c, constituted by the attribute set Γ inputted in (S302) and c₀, c_(t), and c_(d+1) generated in (S304), as elements to the decryption device 300 via the network. As a matter of course, the encrypted data c may be transmitted to the decryption device 300 by another method.

More specifically, from (S301) through (S304), the public parameter acquisition part 210, the information input part 220, and the encrypted data generation part 230 generate the encrypted data c by executing the Enc algorithm indicated in Formula 143. In (S305), the data transmission part 240 transmits the generated encrypted data c to the decryption device 300.

$\begin{matrix} {{{{Enc}\left( {{p\; k},m,{\Gamma:={{\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right) \right.1} \leq t \leq d}}} \right\}}\left( {x_{t,1}:=1} \right)}\mspace{20mu} {\delta,\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}},\mspace{20mu} {{{\zeta \overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{11mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {c_{0}:=\left( {\delta,0,\zeta,0,\varphi_{0}} \right)_{_{0}}},{c_{t}:={{\left( {\overset{\overset{n_{t}}{}}{{s_{i}\left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{14mu} \overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{11mu} \overset{\overset{n_{t}}{}}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}},}} \right)_{_{t}}\mspace{20mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}},\mspace{20mu} {c_{d + 1}:={g_{T}^{\zeta}m}},{c:={{\left( {\Gamma,c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},c_{d + 1}} \right).\mspace{20mu} {return}}\mspace{14mu} {c.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 143} \right\rbrack \end{matrix}$

The function and operation of the decryption device 300 will be described. The decryption device 300 is provided with a decryption key acquisition part 310, a data reception part 320 (data acquisition part), a span program calculation part 330, a complementary coefficient calculation part 340, a pairing operation part 350, and a plaintext information calculation part 360.

The process of the Dec algorithm will be described with reference to FIG. 10.

(S401: Decryption key Acquisition Step)

For example, with the communication device, the decryption key acquisition part 310 acquires the decryption key sk_(s):=(S, k*₀, k*₁, . . . , k*_(L)) distributed from the key generation device 100, via the network. The decryption key acquisition part 310 also acquires the public parameters pk generated by the key generation device 100.

(S402: Data Reception Step)

For example, with the communication device, the data reception part 320 receives the encrypted data c transmitted by the encryption device 200, via the network.

(S403: Span Program Calculation Step)

With the processing device, the span program calculation part 330 checks whether or not the access structure S included in the decryption key sk_(s) acquired in (S401) accepts Γ included in the encrypted data c received in (S402). The method of checking whether or not the access structure S accepts Γ is the same as that described in “3. Concept for Implementing Functional Encryption”.

The span program calculation part 330 advances the process to (S404) if the access structure S accepts Γ (accept in S403). If the access structure S rejects Γ (reject in S403), the span program calculation part 330 judges that the encrypted data c cannot be decrypted with the decryption key sk_(s), and ends the process.

(S404: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 340 calculates I and a constant (complementary coefficient) {α_(i)}_(iεI), with which Formula 144 is established.

$\begin{matrix} {\mspace{79mu} {{{s_{0} = {\sum\limits_{i \in I}{\alpha_{i}s_{i}}}},{and}}{I \subseteq {\left\{ {i \in \left\{ {1,\ldots \mspace{14mu},L} \right\}} \middle| {\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack\bigvee\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack} \right\}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 144} \right\rbrack \end{matrix}$

(S405: Pairing Operation Step)

The pairing operation part 350 generates a session key K=g_(T) ^(ζ) by calculating Formula 145 with the processing device.

$\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}\; {e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 145} \right\rbrack \end{matrix}$

By calculating Formula 145, the key K=g_(T) ^(ζ) is obtained, as indicated in Formula 146.

$\begin{matrix} {{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}\; {e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}}}} = {{g_{T}^{{{- \delta}\; s_{0}} + \zeta}{\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {g_{T}^{{\delta\alpha}_{i}s_{i}}{\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}\; g_{T}^{{\delta\alpha}_{i}{{s_{i}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}}}}} = {g_{T}^{{\delta {({{- s_{0}} + {\sum\limits_{i \in I}{\alpha_{i}s_{i}}}})}} + \zeta} = {g_{T}^{\zeta}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 146} \right\rbrack \end{matrix}$

(S406: Plaintext Information Calculation Step)

The plaintext information calculation part 360 generates a message m′ (=m) by calculating m′=c_(d+1)/K with the processing device. Note that c_(d+1) is g_(T) ^(ζ) as indicated in Formula 142. Since K is g_(T) ^(ζ), the message in can be obtained by calculating m′=c_(d+1)/K.

More specifically, from (S401) through (S406), the decryption device 300 generates the message m′ (=m) by executing the Dec algorithm indicated in Formula 147.

$\begin{matrix} {\mspace{79mu} {{{{Dec}\left( {{p\; k},{{sk}_{}:=\left( {,k_{0}^{*},k_{1}^{*},\ldots \mspace{14mu},k_{L}^{*}} \right)},\mspace{20mu} {c:=\left( {\Gamma,c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},c_{d + 1}} \right)}} \right)}\mspace{20mu} {{{{If}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},\mspace{20mu} {{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{14mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}\mspace{14mu} {such}\mspace{14mu} {that}}}\mspace{20mu} {{s_{0} = {\sum\limits_{i \in I}{\alpha_{i}s_{i}}}},{and}}\mspace{14mu} {I \subseteq {\left\{ {i \in \left\{ {1,\ldots \mspace{14mu},L} \right\}} \middle| {\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack\bigvee\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack} \right\}.K}}}:={{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}\mspace{20mu} m^{\prime}}}}}} = {{c_{d + 1}/{K.\mspace{20mu} {return}}}\mspace{14mu} {m^{\prime}.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 147} \right\rbrack \end{matrix}$

As described above, the cryptographic processing system 10 implements the encryption scheme (functional encryption scheme) using the access structure S constructed using the span program, inner-product predicate, and secret sharing. Therefore, the cryptographic processing system 10 implements an encryption scheme that can design access control with a very high degree of freedom.

The encryption scheme implemented by the cryptographic processing system 10 is very secure. As described above, the functional encryption scheme includes, as its one class (the most limited class), ID-based encryption. Even when compared to an existing, practical ID-based encryption, the encryption scheme implemented by the cryptographic processing system 10 is more secure in a certain sense of meaning.

In the above description, in (3) of (S101), 5 is set in N₀, and 4n_(t) (=n_(t)+n_(t)+n_(t)+n_(t)) is set in N_(t). Hence, the bases A_(t), B_(t), and B*_(t) are all (4n₁+5) dimensional.

Alternatively, n_(t)+n_(t)+n_(t)+n_(t) may be replaced by n_(t)+u_(t)+w_(t)+z_(t). More specifically, the first n_(t) may remain n_(t), the second n_(t) may be changed to u_(t), the third n_(t) may be changed to w_(t), and the fourth n_(t) may be changed to z_(t). That is, n_(t)+u_(t)+w_(t)+z_(t) may be set in N_(t). Note that n_(t), u_(t), w_(t), and z_(t) can be different values where n_(t) is an integer of 1 or more, as described above, and each of u_(t), w_(t), and z_(t) is an integer of 0 or more.

In this case, the Setup algorithm indicated in Formula 131 is rewritten as indicated in Formula 148. Namely, the suffixes of the basis vectors of the bases B̂_(t) and B̂_(t) are changed.

$\begin{matrix} {{{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \mspace{14mu},n_{d}} \right)}} \right)}\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \mspace{11mu},d}} \right)\overset{R}{}}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}{{{\hat{}}_{0}:=\left( {b_{0,1},b_{0,3},b_{0,5}} \right)},{{\hat{}}_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,n_{t}},b_{t,{n_{t} + u_{t} + w_{t} + 1}},\ldots \mspace{14mu},b_{t,{n_{t} + u_{t} + w_{t} + z_{t}}}} \right)}}{{{{for}\mspace{14mu} t} = 1},\ldots \mspace{14mu},d,{{\hat{}}_{0}^{*}:=\left( {b_{0,1}^{*},b_{0,3}^{*},b_{0,4}^{*}} \right)},{{\hat{}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,n_{t}}^{*},b_{t,{n_{t} + u_{t} + 1}}^{*},\ldots \mspace{14mu},b_{t,{n_{t} + u_{t} + w_{t}}}^{*}} \right)}}{{{{for}\mspace{14mu} t} = 1},\ldots \mspace{14mu},d,{{sk}:=\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 0},\ldots \mspace{14mu},d}},{{p\; k}:={{\left( {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},\left\{ _{t} \right\}_{{t = 0},\ldots \mspace{11mu},d}} \right).{return}}\mspace{14mu} {sk}}},{p\; {k.}}}} & \left\lbrack {{Formula}\mspace{14mu} 148} \right\rbrack \end{matrix}$

Also, the KeyGen algorithm indicated in Formula 138 is rewritten as indicated in Formula 149.

$\begin{matrix} {\mspace{79mu} {{{{KeyGen}\left( {{p\; k},{sk},{:=\left( {M,\rho} \right)}} \right)}\mspace{20mu} {\overset{\rightarrow}{f}\overset{U}{}_{q}^{r}}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \mspace{14mu},s_{L}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},\mspace{20mu} {s_{0}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\mspace{20mu} \eta_{0},{\theta_{i}\overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}},\mspace{20mu} {k_{0}^{*}:=\left( {{- s_{0}},0,1,\eta_{0},0} \right)_{_{0}^{*}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq i \leq {L\mspace{20mu} {{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}}},\mspace{20mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,w_{t}}\overset{U}{}_{q}},{k_{i}^{*}:={\left( {\overset{\overset{n_{t}}{}}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t}}},}\mspace{14mu} \overset{\overset{u_{t}}{}}{0^{u_{t}},}\mspace{14mu} \overset{\overset{w_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,w_{t}},}\mspace{14mu} \overset{\overset{z_{t}}{}}{0^{z_{t}},}} \right)_{_{t}^{*}}\mspace{20mu} {{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}}}},\mspace{79mu} \eta_{i,1},\ldots \mspace{14mu},{\eta_{i,w_{t}}\overset{U}{}_{q}},{k_{i}^{*}:={{\left( {\overset{\overset{n_{t}}{}}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}\mspace{14mu} \overset{\overset{u_{t}}{}}{0^{u_{t}},}\mspace{14mu} \overset{\overset{w_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,w_{t}},}\mspace{14mu} \overset{\overset{z_{t}}{}}{0^{z_{t}},}} \right)_{_{t}^{*}}\mspace{20mu} {sk}_{}}:={{\left( {,k_{0}^{*},k_{1}^{*},\ldots \mspace{14mu},k_{L}^{*}} \right).\mspace{20mu} {return}}\mspace{14mu} {{sk}_{}.}}}}}} & \left\lbrack {{Formula}\mspace{20mu} 149} \right\rbrack \end{matrix}$

Also, the Enc algorithm indicated in Formula 143 is rewritten as indicated in

Formula 150.

$\begin{matrix} {{{{Enc}\left( {{p\; k},m,{\Gamma:={{\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right) \right.1} \leq t \leq d}}} \right\}}\left( {x_{t,1}:=1} \right)}\mspace{20mu} {\delta,\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,z_{t}},\mspace{20mu} {{{\zeta \overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{11mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {c_{0}:=\left( {\delta,0,\zeta,0,\varphi_{0}} \right)_{_{0}}},{c_{t}:={{\left( {\overset{\overset{n_{t}}{}}{{s_{i}\left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}\mspace{14mu} \overset{\overset{u_{t}}{}}{0^{u_{t}},}\mspace{14mu} \overset{\overset{w_{t}}{}}{0^{w_{t}},}\mspace{11mu} \overset{\overset{z_{t}}{}}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,z_{t}},}} \right)_{_{t}}\mspace{20mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}},\mspace{20mu} {c_{d + 1}:={g_{T}^{\zeta}m}},{c:={{\left( {\Gamma,c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},c_{d + 1}} \right).\mspace{20mu} {return}}\mspace{14mu} {c.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 150} \right\rbrack \end{matrix}$

Note that the Dec algorithm indicated in Formula 147 remains unchanged.

Also, N₀ need not be 5 but may be an integer of 2 or more. When N₀ is 2, the bases B₀ and B*₀ become two-dimensional. In this case, let k*₀:=(−s₀, 1)_(B*0) in the KeyGen algorithm and c₀:=(δ, ζ)_(B0) in the Enc algorithm.

In the above description, k*₀:=(−s₀, 0, 1, η₀, 0)_(B*0) is set in the KeyGen algorithm. Alternatively, by employing a predetermined value κ, k*₀:=(−s₀, 0, κ, η₀, 0)_(B*0) may be set. In this case, since K:=g^(ζκ) _(T) is calculated in the Dec algorithm, c_(d+1):=g^(ζκ) _(T)m may be set in the Enc algorithm.

In the above description, the value of v_(i,nt) is not particularly limited. However, a limitation of v_(i,nt):=1 may be placed from the viewpoint of security proof.

From the viewpoint of security proof ρ(i) for each integer i=1, . . . , L may be limited to a positive tuple (t, v^(→)) or negative tuple

(t, v^(→)) for different identification information t.

In other words, let a function ρ^(˜) be map of {1, . . . , L}→{1, . . . , d} with which ρ^(˜)(i)=t is established when ρ(i)=(t, v^(→)) or ρ(i)=

(t, v^(→)). In this case, ρ^(˜) may be limited to injection. Note that ρ(i) is ρ(i) in the access structure S:=(M, ρ(i)) described above.

Embodiment 2

This embodiment describes a “ciphertext-policy functional encryption (CP-FE) scheme”. The ciphertext-policy functional encryption described in this embodiment is constituted based on the concept described in Embodiment 1.

In this embodiment, initially, the basic structure of the “ciphertext-policy functional encryption scheme” will be described. Subsequently, the basic structure of a “cryptographic processing system 10” which implements the “ciphertext-policy functional encryption scheme” will be described. Then, a “ciphertext-policy functional encryption scheme” and a “cryptographic processing system 10” according to this embodiment will be described in detail.

<Basic Structure of Ciphertext-Policy Functional Encryption Scheme>

The structure of the ciphertext-policy functional encryption scheme will be briefly described. Note that ciphertext-policy means that policy is embedded in the ciphertext, that is, an access structure is embedded in the ciphertext.

The ciphertext-policy functional scheme consists of four algorithms: Setup, KeyGen, Enc, and Dec, in the same manner as the key-policy functional encryption scheme.

(Setup)

A Setup algorithm is a randomized algorithm that takes as input a security parameter λ and an attribute format μ^(→):=(d; n₁, . . . , n_(d)), and outputs public parameters pk and a master key sk.

(KeyGen)

A KeyGen algorithm is a randomized algorithm that takes as input an attribute set Γ:={(t, x^(→) _(t))|x^(→) _(t)εF_(q) ^(nt), 1≦t≦d}, the public parameters pk, and the master key sk, and outputs a decryption key sk_(Γ).

(Enc)

An Enc algorithm is a randomized algorithm that takes as input a message m, an access structure S:=(M, ρ), and the public parameters pk, and outputs decrypted data c.

(Dec)

A Dec algorithm is an algorithm that takes as input the encrypted data c encrypted under the access structure S, the decryption key sk_(Γ) for the attribute set Γ, and the public parameters pk, and outputs either the message m or distinguished symbol ⊥.

The ciphertext-policy functional encryption scheme should have the following property: for all access structures S, the attribute set Γ, the correctly generated public parameters pk, the master key sk, and the ciphertext c indicated in Formula 151, it holds that m=Dec(pk, sk_(Γ), c) if the access structure S accepts the attribute set Γ. If the access structure S rejects the attribute set Γ, the probability of m=Dec(pk, sk₆₄, c) is negligible.

[Formula  151] $\begin{matrix} {c\overset{R}{}{{Enc}\left( {{pk},m,} \right)}} & \; \end{matrix}$

<Cryptographic Processing System 10>

The cryptographic processing system 10 that executes the algorithms of the ciphertext-policy functional encryption scheme described above will be described.

FIG. 11 is a configuration diagram of the cryptographic processing system 10.

The cryptographic processing system 10 is provided with a key generation device 100, an encryption device 200, and a decryption device 300.

The key generation device 100 executes the Setup algorithm by taking as input a security parameter λ and the attribute format μ^(→):=(d; n₁, . . . , n_(d)), and generates the public parameters pk and the master key sk. The key generation device 100 publicizes the generated public parameters pk. The key generation device 100 also executes the KeyGen algorithm by taking as input the attribute set Γ, generates a decryption key sk_(Γ), and distributes the decryption key sk_(Γ) to the decryption device 300 in secrecy. The encryption device 200 executes the Enc algorithm by taking as input a message m, an access structure S, and the public parameters pk, and generates encrypted data c. The encryption device 200 transmits the generated encrypted data c to the decryption device 300.

The decryption device 300 executes the Dec algorithm by taking as input the public parameters pk, the decryption key sk_(s), and the encrypted data c, and outputs the message m or distinguished symbol ⊥.

<Ciphertext-Policy Functional Encryption Scheme and Cryptographic Processing System 10 in Detail>

The ciphertext-policy functional encryption scheme, and the function and operation of the cryptographic processing system 10 which executes the ciphertext-policy functional encryption scheme will be described with reference to FIGS. 12 to 15.

FIG. 12 is a function block diagram showing the function of the cryptographic processing system 10 which executes the ciphertext-policy functional encryption scheme. The cryptographic processing system 10 is provided with the key generation device 100, the encryption device 200, and the decryption device 300, as described above.

FIG. 13 is a flowchart showing the operation of the key generation device 100 and the process of the Gen algorithm. The Setup algorithm is the same as that of the key-policy functional encryption scheme, and accordingly its detailed description will be omitted. FIG. 14 is a flowchart the operation of the encryption device 200 and the process of the Enc algorithm. FIG. 15 is a flowchart showing the operation of the decryption device 300 and the process of the Dec algorithm.

Assume that x_(t,1):=1 in the following description.

The function and operation of the key generation device 100 will be described. The key generation device 100 is provided with a master key generation part 110, a master key storage part 120, an information input part 130 (first information input part), a decryption key generation part 140, and a key distribution part 150. The decryption key generation part 140 is provided with a random number generation part 143 and a key element generation part 144.

As described above, the Setup algorithm is similar to that of the key-policy functional encryption scheme, and is as indicated in Formula 131.

The process of the KeyGen algorithm will be described with reference to FIG. 13.

(S501: Information Input Step)

With an input device, the information input part 130 takes as input the attribute set Γ:={(t, x^(→) _(t):=(x_(t,1), . . . , x_(t,nt)εF_(q) ^(nt)n))|1≦t<d}. Note that, for example, the attribute information of the user of the decryption key sk_(Γ) is set in the attribute set Γ.

(S502: Random Number Generation Step)

With a processing device, the random number generation part 143 generates random numbers δ, φ₀, φ_(t,1), . . . , and φ_(t,nt), as indicated in Formula 152.

$\begin{matrix} {\left\lbrack {{Formula}\mspace{14mu} 152} \right\rbrack \delta,\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},{{{\varphi_{t,n_{t}}\overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}} & \; \end{matrix}$

(S503: Key Element Generation Step)

With the processing device, the key element generation part 144 generates an element k*₀ of the decryption key sk_(Γ), as indicated in Formula 153.

k ₀*:=(δ,0,1,φ₀,0)

₀*  [Formula 153]

With the processing device, the key element generation part 144 also generates an element k*_(t) of the decryption key sk_(Γ) for each integer t of (t, x^(→) _(t)) included in Γ, as indicated in Formula 154.

[Formula  154] $\begin{matrix} {k_{t}^{*}:=\left( {\overset{n_{t}}{\overset{}{{\delta \left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{n_{t}}{\overset{}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}}}}{\overset{n_{t}}{\left. \overset{}{0^{n_{t}},} \right)}}_{_{t}^{*}}} \right.} & \; \end{matrix}$

(S504: Key Distribution Step)

For example, with a communication device, the key distribution part 150 distributes the decryption key sk_(Γ) constituted by the attribute set Γ inputted in (S501) and k*₀ and k*_(t) generated in (S503) as elements, to the decryption device 300 in secrecy via the network. As a matter of course, the decryption key sk_(Γ) may be distributed to the decryption device 300 by another method.

More specifically, from (S501) through (S503), the information input part 130 and decryption key generation part 140 generate the decryption key sk_(Γ) by executing the KeyGen algorithm indicated in Formula 155. Then, in (S504), the decryption key sk_(Γ) generated by the key distribution part 150 is distributed to the decryption device 300.

  [Formula  155] ${KeyGen}\left( {{pk},{sk},{\Gamma:={\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \mspace{20mu},x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right) \middle| {1 \leq t \leq d} \right\} \left( {x_{t,n_{t}}:=1} \right)\mspace{20mu} \delta}},\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},{{{\varphi_{t,n_{t}}\overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {k_{0}^{*}:=\left( {\delta,0,1,\varphi_{0},0} \right)_{_{0}^{*}}},{k_{t}^{*}:=\left( {{{\overset{n_{t}}{\overset{}{{\delta \left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{n_{t}}{\overset{}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}}}}{\overset{n_{t}}{\left. \overset{}{0^{n_{t}},} \right)}}_{_{t}^{*}}\mspace{14mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {{sk}_{\Gamma}:={\left( {\Gamma,k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}} \right)\mspace{20mu} {return}\mspace{14mu} {{sk}_{\Gamma}.}}}} \right.}} \right.$

The function and operation of the encryption device 200 will be described. The encryption device 200 is provided with a public parameter acquisition part 210, an information input part 220 (second information input part), an encrypted data generation part 230, and a data transmission part 240 (data output part). The encrypted data generation part 230 is provided with a random number generation part 231, a cryptographic element generation part 232, an f vector generation part 233, and an s vector generation part 234.

The process of the Enc algorithm will be described with reference to FIG. 14.

(S601: Public Parameter Acquisition Step)

For example, with the communication device, the public parameter acquisition part 210 acquires the public parameters pk generated by the key generation device 100, via the network.

(S602: Information Input Step)

With the input device, the information input part 220 takes as input the access structure S:=(M, ρ). The access structure S is set depending on the condition of the system the user wishes to realize. Also, for example, the attribute information of the user who can decrypt the data is set in ρ of the access structure S.

With the input device, the information input part 220 also takes as input the message m to be transmitted to the decryption device 300.

(S603: f Vector Generation Step)

With the processing device, the f vector generation part 233 generates a vector f^(→) having r pieces of elements, randomly as indicated in Formula 156.

[Formula  156] $\begin{matrix} {\overset{\rightarrow}{f}\overset{U}{}_{q}^{r}} & \; \end{matrix}$

(S604: s Vector Generation Step)

With the processing device, the s vector generation part 234 generates a vector s^(→T):=(S₁, . . . , s_(L))^(T) based on the (L rows×r columns) matrix M included in the access structure S inputted in (S602) and the vector f^(→) generated in (S603), as indicated in Formula 157.

{right arrow over (s)} ^(T):=(s ₁ , . . . ,s _(L))^(T) :=M·{right arrow over (f)} ^(T)  [Formula 157]

With the processing device, the s vector generation part 234 also generates a value s₀ based on the vector f^(→) generated in (S603), as indicated in Formula 158.

s ₀:={right arrow over (1)}·{right arrow over (f)} ^(T)  [Formula 158]

(S605: Random Number Generation Step)

With the processing device, the random number generation part 231 generates a random number η₀, a random number θ_(i) for each integer i=1, . . . , L, and a random number ζ, as indicated in Formula 159.

[Formula  159] $\begin{matrix} {\eta_{0},\theta_{i},{\zeta \overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}}} & \; \end{matrix}$

(S606: Cryptographic Element Generation Step)

With the processing device, the cryptographic element generation part 232 generates an element c₀ of the encrypted data c, as indicated in Formula 160.

c ₀:=(−s ₀, 0,ζ,0;η₀)

₀*  [Formula 160]

With the processing device, the cryptographic element generation part 232 also generates an element c_(i) of the encrypted data c for each integer i=1, . . . , L, as indicated in Formula 161.

[Formula  161] ${{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{c_{i}:=\left( {{\overset{n_{t}}{\overset{}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t}}},}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{\overset{n_{t}}{}}{0^{n_{t}},}{\overset{n_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},} \right)}}_{_{t}}},{{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in {_{q}^{n_{t}}}}}} \right)}},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{c_{i}:=\left( {\overset{n_{t}}{\overset{}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{n_{t}}{\overset{}{0^{n_{t}},}}{\overset{n_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},} \right)}}_{_{t}\;}}\mspace{11mu} \right.}} \right.}$

With the processing device, the cryptographic element generation part 232 also generates an element c_(d+), of the encrypted data c, as indicated in Formula 162.

c _(d+1) :=g _(T) ^(ζ) m  [Formula 162]

(S607: Data Transmission Step)

For example, with the communication device, the data transmission part 240 transmits the encrypted data c, constituted by the access structure S inputted in (S602) and c₀, c₁, . . . , c_(L), and c_(d+1) generated in (S606), as elements to the decryption device 300 via the network. As a matter of course, the encrypted data c may be transmitted to the decryption device 300 by another method.

More specifically, from (S601) through (S606), the public parameter acquisition part 210, the information input part 220, and the encrypted data generation part 230 generate the encrypted data c by executing the Enc algorithm indicated in Formula 163. In (S607), the data transmission part 240 transmits the generated encrypted data c to the decryption device 300.

  [Formula  163]   Enc(pk, m,  := (M, ρ)) $\mspace{20mu} {{\overset{\rightarrow}{f}\overset{R}{}_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \mspace{14mu},s_{L}} \right)^{T}:={M \cdot ~{\overset{\rightarrow}{f}}^{T}}}},{s_{0\;}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\mspace{20mu} \eta_{0},\theta_{i},{\zeta \overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}},\mspace{20mu} {c_{0}:=\left( {{- s_{0}},0,\zeta,0,\eta_{0}} \right)_{_{0}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq i \leq L}}$ ${{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},{c_{i}:=\left( {{\overset{n_{t}}{\overset{}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t},}}}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{n_{t}}{\overset{}{0^{n_{t}},}}{\overset{n_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},} \right)}}_{_{t}}},{{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}_{q}},\mspace{20mu} {c_{i}:=\left( {{\overset{n_{t}}{\overset{}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}}\overset{\overset{n_{t}}{}}{0^{n_{t}},}\overset{n_{t}}{\overset{}{0^{n_{t}},}}{\overset{n_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},} \right)}}_{_{t}}},\mspace{20mu} {c_{d + 1}:={g_{T}^{\zeta}m}},{c:={{\left( {,c_{0\;},c_{1},\ldots \mspace{14mu},c_{L},c_{d + 1}} \right).\mspace{20mu} {return}}\mspace{14mu} {c.}}}} \right.}} \right.}$

The function and operation of the decryption device 300 will be described. The decryption device 300 is provided with a decryption key acquisition part 310, a data reception part 320 (data acquisition part), a span program calculation part 330, a complementary coefficient calculation part 340, a pairing operation part 350, and a plaintext information calculation part 360.

The process of the Dec algorithm will be described with reference to FIG. 15.

(S701: Decryption key Acquisition Step)

For example, with the communication device, the decryption key acquisition part 310 acquires the decryption key sk_(Γ) distributed from the key generation device 100, via the network. The decryption key acquisition part 310 also acquires the public parameters pk generated by the key generation device 100.

(S702: Data Reception Step)

For example, with the communication device, the data reception part 320 receives the encrypted data c transmitted by the encryption device 200, via the network.

(S703: Span Program Calculation Step)

With the processing device, the span program calculation part 330 checks whether or not the access structure S included in the encrypted data c acquired in (S702) accepts Γ included in the decryption key sk_(Γ) received in (S701). The method of checking whether or not the access structure S accepts Γ is the same as that described in “3. Concept for Implementing Functional Encryption”.

The span program calculation part 330 advances the process to (S704) if the access structure S accepts Γ (accept in S703). If the access structure S rejects Γ (reject in S403), the span program calculation part 330 judges that the encrypted data c cannot be decrypted with the decryption key sk_(s), and ends the process.

(S704) through (S706) are the same as (S404) through (406) shown in FIG. 9 of Embodiment 1.

More specifically, from (S701) through (S706), the public parameter acquisition part 210, the information input part 220, and the encrypted data generation part 230 generate a message m′ (=m) by executing the Dec algorithm indicated in Formula 164.

     [Formula   164] $\mspace{20mu} {{Dec}\left( {{pk},{{sk}_{\Gamma}:=\left( {\Gamma,k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}} \right)},{c:=\left( {,c_{0},c_{1},\ldots \mspace{14mu},c_{L},c_{d + 1}} \right)}} \right)}$ $\mspace{20mu} {{{{if}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},\mspace{20mu} {{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{14mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}\mspace{14mu} {such}\mspace{14mu} {that}}}$ $\mspace{20mu} {{S_{0} = {\sum\limits_{i \in I}{\alpha_{i}s_{i}}}},{and}}$ $I \subseteq \left\{ {\left. {i \in \left\{ {1,\ldots \mspace{14mu},L} \right\}} \middle| {\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{i}}} = 0}} \right\rbrack\bigvee{\left. \quad\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{i}} \neq 0}}}} \right\rbrack \right\}.\mspace{20mu} K}} \right.:={{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}\; {{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{i}})}}\mspace{20mu} m^{\prime}}}}}} = {{c_{d + I}/{K.\mspace{20mu} {return}}}\mspace{14mu} {m^{\prime}.}}}} \right.$

The cryptographic processing system 10 according to Embodiment 2 implements an encryption scheme that can design access control with a very high degree of freedom, in the same manner as the cryptographic processing system 10 according to Embodiment 1. Also, the cryptographic processing system 10 according to Embodiment 2 is very secure, as the cryptographic processing system 10 according to Embodiment 1 is.

As in Embodiment 1, N_(t)=n_(t)+n_(t)+n_(t)+n_(t) may be replaced by n_(t)+u_(t)+w_(t)+z_(t). More specifically, the first n_(t) may remain n_(t), the second n_(t) may be changed to u_(t), the third n_(t) may be changed to w_(t), and the fourth n_(t) may be changed to z_(t). That is, n_(t)+u_(t)+w_(t)+z_(t) may be set in N_(t). Note that n_(t), u_(t), w_(t), and z_(t) can be different values where n_(t) is an integer of 1 or more, as described above, and each of u_(t), w_(t), and z_(t) is an integer of 0 or more.

In this case, the Setup algorithm is rewritten as indicated in Formula 148, in the same manner as in Embodiment 1.

Also, the KeyGen algorithm indicated in Formula 155 is rewritten as indicated in Formula 165.

      [Formula  165] ${KeyGen}\left( {{pk},{sk},{\Gamma:={\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \mspace{20mu},x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right) \middle| {1 \leq t \leq d} \right\} \left( {x_{t,n_{t}}:=1} \right)\mspace{20mu} \delta}},\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},{{{\varphi_{t,w_{t}}\overset{U}{}_{q}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {k_{0}:=\left( {\delta,0,1,\varphi_{0},0} \right)_{_{0}^{*}}},\mspace{20mu} {k_{t}^{*}:=\left( {{{\overset{n_{t}}{\overset{}{{\delta \left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},}}\overset{\overset{u_{t}}{}}{0^{u_{t}},}\overset{w_{t}}{\overset{}{\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,w_{t}}}}{\overset{z_{t}}{\left. \overset{}{0^{z_{t}},} \right)}}_{_{t}^{*}}\mspace{14mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {{sk}_{\Gamma}:={\left( {\Gamma,k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}} \right)\mspace{20mu} {return}\mspace{14mu} {{sk}_{\Gamma}.}}}} \right.}} \right.$

Also, the Enc algorithm indicated in Formula 163 is rewritten as indicated in Formula 166.

[Formula  166] Enc(pk, m,  := (M, ρ)) ${\overset{\rightarrow}{f}\overset{R}{}_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \mspace{14mu},s_{L}} \right)^{T}:={M \cdot ~{\overset{\rightarrow}{f}}^{T}}}},{s_{0\;}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\eta_{0},\theta_{i},{\zeta \overset{U}{}{_{q}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}},{c_{0}:=\left( {{- s_{0}},0,\zeta,0,\eta_{0}} \right)_{_{0}}},{{{for}\mspace{14mu} 1} \leq i \leq L}$ ${{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,z_{t}}\overset{U}{}_{q}},{c_{i}:=\left( {{\overset{n_{t}}{\overset{}{{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t}}},}}\overset{\overset{u_{t}}{}}{0^{u_{t}},}\overset{w_{t}}{\overset{}{0^{w_{t}},}}{\overset{n_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,z_{t}},} \right)}}_{_{t}}},{{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,z_{t}}\overset{U}{}_{q}},{c_{i}:=\left( {{\overset{n_{t}}{\overset{}{{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},}}\overset{\overset{u_{t}}{}}{0^{u_{t}},}\overset{w_{t}}{\overset{}{0^{w_{t}},}}{\overset{z_{t}}{\left. \overset{}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,z_{t}},} \right)}}_{_{t}}},{c_{d + 1}:={g_{T}^{\zeta}m}},{c:={{\left( {,c_{0\;},c_{1},\ldots \mspace{14mu},c_{L},c_{d + 1}} \right).{return}}\mspace{14mu} {c.}}}} \right.}} \right.}$

Note that the Dec algorithm indicated in Formula 164 remains unchanged.

Also, N₀ need not be 5 but may be an integer of 2 or more. When N₀ is 2, the bases B₀ and B*₀ become two-dimensional. In this case, k*₀:=(δ, 1)_(B*0) may be set in the KeyGen algorithm, and c₀:=(−s₀, ζ)_(B0) may be set in the Enc algorithm.

In the above description, k*₀:=(δ, 0, 1, φ₀, 0)_(B*0) is set in the KeyGen algorithm. Alternatively, by employing a predetermined value κ, k*₀:=(δ, 0, κ, φ₀, 0)_(B*0) may be set. In this case, since K:=g^(ζκ) ^(K) _(T) is calculated in the Dec algorithm, c_(d+1):=g^(ζκ) _(T) m may be set in the Enc algorithm.

In the above description, the value of v_(i,int):=1 is not particularly limited. However, the value of v_(i,nt) may be limited to satisfy v_(i,nt):=1 from the viewpoint of proving the security.

From the viewpoint of proving the security, ρ(i) for each integer i=1, . . . , L may be limited to a positive tuple (t, v^(→)) or negative tuple

(t, v^(→)) for different identification information t.

In other words, let a function ρ^(˜) be map of {1, . . . , L}→{1, . . . , d} with which ρ^(˜)(i)=t when ρ(i)=(t, v^(→)) or ρ(i)

(t, v^(→)) is established. In this case, ρ^(˜) may be limited to injection. Note that ρ(i) is ρ(i) in the access structure S:=(M, ρ(i)) described above.

Embodiment 1 has described the key-policy functional encryption with which the access structure S is contained in the decryption key sk_(s) and the attribute set Γ is contained in the encrypted data c. Also, Embodiment 2 has described the ciphertext-policy functional encryption with which the access structure S is contained in the encrypted data c and the attribute set Γ is contained in the decryption key sk_(Γ).

Alternatively, two access structures S₁ and S₂ may be prepared. Namely, one access structure S₁ may be contained in the decryption key, and the other access structure S₂ may be contained in the encrypted data c. At the same time, an attribute set Γ₂ corresponding to the access structure S₂ may be contained in the decryption key, and an attribute set Γ₁ corresponding to the access structure S₁ may be contained in the decrypted data c. The encrypted data c may be decryptable with the decryption key if and only if the access structure S₁ accepts the attribute set Γ₁ and the access structure S₂ accepts the attribute set Γ₂.

Namely, an encryption scheme may be employed in which the key-policy functional encryption and the ciphertext-policy functional encryption are combined.

Embodiment 3

In this embodiment, a signature scheme to which the “ciphertext-policy functional encryption scheme” described in Embodiment 2 is applied will be described.

In this embodiment, initially, the basic structure of the “signature scheme based on the ciphertext-policy functional encryption scheme” will be described. Subsequently, the basic structure of a “signature processing system 20” which implements this “signature scheme” will be described. Then, a “signature scheme” and a “signature processing system 20” according to this embodiment will be described in detail.

<Basic Structure of Signature Scheme Based on Ciphertext-Policy Functional Encryption Scheme>

The signature scheme based on the ciphertext-policy functional encryption scheme consists of four algorithms: Setup, KeyGen, Sig, and Ver.

(Setup)

A Setup algorithm is a randomized algorithm that takes as input a security parameter λ and an attribute format μ^(→):=(d; n₁, . . . , n_(d)), and outputs public parameters pk and a master key sk.

(KeyGen)

A KeyGen algorithm is a randomized algorithm that takes as input an attribute set Γ:={(t, x^(→) _(t))|x⁴³ _(t)εF_(q) ^(nt), 1≦t≦d}, the public parameters pk, and the master key sk, and outputs a signature key sk_(Γ).

(Sig)

A Sig algorithm is a randomized algorithm that takes as input a message m, the signature key sk_(Γ), an access structure S:=(M, ρ), and the public parameters pk, and outputs signature data sig.

(Ver)

A Ver algorithm is an algorithm that takes as input the message in, the access structure S:=(M, ρ), the signature data sig, and the public parameters pk, and outputs a value “1” representing success of verification of the signature, or a value “0” representing failure of verification of the signature fails.

<Signature Processing System 20>

The signature processing system 20 that executes the algorithms of the signature process described above will be described.

FIG. 16 is a configuration diagram of the signature processing system 20.

The signature processing system 20 is provided with a key generation device 100, a signature device 400, and a verification device 500.

The key generation device 100 executes the Setup algorithm by taking as input a security parameter λ and an attribute format μ^(÷):=(d; n₁, . . . , n_(d)) and generates public parameters pk and a master key sk. The key generation device 100 publicizes the generated public parameters pk. The key generation device 100 also executes the KeyGen algorithm by taking as input an attribute set Γ, generates a signature key sk_(Γ), and distributes the signature key sk_(Γ) to the signature device 400 in secrecy.

The signature device 400 executes the Sig algorithm by taking as input a message m, an access structure S, the public parameters pk, and the signature key sk_(Γ), and generates a signature vector s^(→*). The signature device 400 transmits the generated signature vector s^(→)*, the message m, and the access structure S to the verification device 500.

The verification device 500 executes the Ver algorithm by taking as input the signature vector s^(→)**, the message m, the access structure S, and the public parameters pk, and outputs a value “1” or “0”.

<Signature Scheme and Signature Processing System 20 in Detail>

The signature scheme, and the function and operation of the signature processing system 20 will be described with reference to FIGS. 17 to 21.

FIG. 17 is a function block diagram showing the function of the signature processing system 20. The signature processing system 20 is provided with the key generation device 100, the signature device 400, and the verification device 500, as described above.

FIGS. 18 and 19 are flowcharts showing the operation of the key generation device 100. FIG. 18 is a flowchart showing the process of the Setup algorithm, and FIG. 19 is a flowchart showing the process of the KeyGen algorithm. FIG. 20 is a flowchart showing the operation of the signature device 400 and the process of the Sig algorithm. FIG. 21 is a flowchart showing the operation of the verification device 500 and the process of the Ver algorithm.

Assume that x_(t,1):=1 in the following description.

The function and operation of the key generation device 100 will be described. The key generation device 100 is provided with a master key generation part 110, a master key storage part 120, an information input part 130 (first information input part), a signature key generation part 160, and a key distribution part 150. The signature key generation part 160 is provided with a random number generation part 161, a key element generation part 162, and a confidential element generation part 163.

The process of the Setup algorithm will be described first with reference to FIG. 18.

(S801: Regular Orthogonal Basis Generation Step)

The master key generation part 110 calculates Formula 167 with a processing device to generate param_(μ→), and bases B_(t) and B*_(t) for each integer t=0, . . . , d+2.

$\begin{matrix} {\mspace{79mu} \left\lbrack {{Formula}\mspace{14mu} 167} \right\rbrack} & \; \\ {\mspace{79mu} {{{input}\mspace{14mu} 1^{\lambda}},{\overset{\rightarrow}{\mu}:=\left( {{d;{n_{1}\mspace{14mu} \ldots}}\mspace{14mu},n_{d}} \right)}}} & (1) \\ {\mspace{79mu} {{param}_{}:={{\left( {q,,_{T},g,e} \right)\overset{R}{}}\left( 1^{\lambda} \right)}}} & (2) \\ {\mspace{79mu} {{{\psi \overset{U}{}_{q}^{x}},{n_{0}:={n_{d + 1}:=1}},{n_{d + 2}:=2},\mspace{79mu} {N_{t}:={{4n_{t}\mspace{14mu} {for}\mspace{14mu} t} = 0}},\ldots \mspace{14mu},{d + 2}}{{{{The}\mspace{14mu} {processes}\mspace{14mu} {of}\mspace{14mu} (4)\mspace{14mu} {to}\mspace{14mu} (8)\mspace{14mu} {are}\mspace{14mu} {executed}\mspace{14mu} {for}\mspace{14mu} {each}\mspace{14mu} t} = 0},\ldots \mspace{14mu},{d + 2.}}}} & (3) \\ {\mspace{79mu} {{param}_{_{t}}:={\left( {q,_{t},_{T},_{t},e} \right):={\left( {1^{\lambda},N_{t},{param}_{}} \right)}}}} & (4) \\ {\mspace{79mu} {X_{t}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{}{{GL}\left( {N_{t},_{q}} \right)}}}} & (5) \\ {\mspace{79mu} {\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}}} & (6) \\ {\mspace{79mu} {{b_{t,i}:={\left( {{\chi_{t,i,1,}\mspace{14mu} \ldots}\mspace{14mu},\chi_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{\chi_{t,i,j}a_{t,j}}}}},\mspace{79mu} {_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}} \right)}}} & (7) \\ {\mspace{79mu} {{b_{t,i}^{*}:={\left( {{v_{t,i,1,}\mspace{14mu} \ldots}\mspace{14mu},v_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{v_{t,i,j}a_{t,j}}}}},\mspace{79mu} {_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,N_{t}}^{*}} \right)}}} & (8) \\ {\mspace{79mu} {{g_{T}:={e\left( {g,g} \right)}^{\psi}}\mspace{79mu} {{param}_{\overset{\rightarrow}{\mu}}:=\left( {\left\{ {param}_{_{t}} \right\}_{{t = 0},\mspace{11mu} \ldots \mspace{14mu},{d + 2},}g_{T}} \right)}}} & (9) \end{matrix}$

An explanation will be made on Formula 167 but only for portions that are different from those in Formula 127 shown in (S101) of Embodiment 1. First, for Formula 167, in (3), 1 is set in n₀ and n_(d+1), and 2 is set in n_(d+2). For integer t=0, . . . , d+2, 4n_(t) is set in N_(t). The processes of (4) to (8) are repeated for each integer t=0, . . . , d+2.

More specifically, in (S801), the master key generation part 110 executes the algorithm G_(ob) indicated in Formula 168, to generate param_(μ→), and the bases B_(t) and B^(*) _(t) for each integer t=0, . . . , d+2.

$\begin{matrix} {\mspace{79mu} {{{\left\lbrack {{Formula}\mspace{14mu} 168} \right\rbrack {{{\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;{n_{1}\mspace{14mu} \ldots}}\mspace{14mu},n_{d}} \right)}} \right)}:\; {param}_{}}:={{\left( {q,,_{T},g,e} \right)\overset{R}{}}\left( 1^{\lambda} \right)}}},\mspace{20mu} {\psi \overset{U}{}_{q}^{x}},\mspace{20mu} {n_{0}:={n_{d + 1}:=1}},{n_{d + 2}:=2},{N_{t}:={{4n_{t}\mspace{14mu} {for}\mspace{14mu} t} = 0}},\ldots \mspace{14mu},{d + 2},\mspace{20mu} {{{For}\mspace{14mu} t} = 0},\ldots \mspace{14mu},{d + 2},\mspace{20mu} {{param}_{_{t}}:={\left( {q,_{t},_{T},_{t},e} \right):=\; {\left( {1^{\lambda},N_{t},{param}_{}} \right)}}},\mspace{20mu} {X_{t}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{}{{GL}\left( {N_{t},_{q}} \right)}}},{\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}},\mspace{20mu} {b_{t,i}:={\left( {{\chi_{t,i,1,}\mspace{11mu} \ldots}\mspace{14mu},\chi_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N}{\chi_{t,i,j}a_{t,j}}}}},\mspace{20mu} {_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}} \right)},\mspace{20mu} {b_{t,i}^{*}:={\left( {{v_{t,i,1,}\mspace{11mu} \ldots}\mspace{14mu},v_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{v_{t,i,j}a_{t,j}}}}},\mspace{20mu} {_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,N_{t}}^{*}} \right)},\mspace{20mu} {g_{T}:={e\left( {g,g} \right)}^{\psi}},{{param}_{\overset{\rightarrow}{\mu}}:=\left( {\left\{ {param}_{_{t}} \right\}_{{t = 0},\; \ldots \mspace{14mu},{d + 2},}g_{T}} \right)}}\mspace{20mu} {{return}\mspace{14mu} {\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\mspace{11mu} \ldots \mspace{14mu},{d + 2}}} \right).}}}} & \; \end{matrix}$

(S802: Subbasis B̂_(t) Generation Step)

With the processing device, the master key generation part 110 generates a subbasis B̂₀ for each integer t=1, . . . , d+2, as indicated in Formula 169.

_(t):=(b _(t,1) , . . . ,b _(t,n) _(t) ,b _(t,3n) _(t) ₊₁ , . . . ,b _(t,)4n _(t) )  [Formula 169]

(S803: Subbasis B̂*_(t) Generation Step)

With the processing device, the master key generation part 110 generates a subbasis B̂*_(t) for each integer t=1, . . . , d+2, as indicated in Formula 170.

_(t)*:=(b _(t,1) *, . . . ,b _(t,n) _(t) *,b _(t,2n) _(d) ₊₁ *, . . . ,b _(t,3n) _(t) *)  [Formula 170]

(S804: Master Key Storing Step)

The master key generation part 110 treats the subbasis B̂_(t) for each integer t=0, . . . , d+2, the subbasis B̂*₀ for each integer t=1, . . . , d+2, the basis vector b*_(0,3), the security parameter λ(1^(λ)) inputted in (S101), and param_(μ→) generated in (S101), as the public parameters pk.

The master key generation part 110 treats the basis vector b*_(0,1) as the master key sk.

The master key storage part 120 stores the public parameters pk and the master key sk, in the storage device.

More specifically, from (S801) through (S803), the master key generation part 110 generates the public parameters pk and the master key sk by executing the Setup algorithm indicated in Formula 171. Then, in (S804), the master key storage part 120 stores the generated public parameters pk and master key sk, in the storage device.

Note that the public parameters are publicized via, e.g., a network, so the signature device 400 and verification device 500 can acquire them.

$\begin{matrix} {\mspace{79mu} {\left\lbrack {{Formula}\mspace{14mu} 171} \right\rbrack \mspace{20mu} {{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \mspace{14mu},n_{d}} \right)}} \right)}\mspace{20mu} {{\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\; \ldots \mspace{11mu},{d + 2}}} \right)\overset{R}{}}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}\mspace{20mu} {{n_{0}:={n_{d + 1}:1}},{n_{d + 2}:=2},{{\hat{}}_{t}:={{\left( {b_{t,1},\ldots \mspace{14mu},b_{t,n_{t}},b_{t,{{3n_{t}} + 1}},\ldots \mspace{14mu},b_{t,{4n_{t}}}} \right)\mspace{14mu} {for}\mspace{14mu} t} = 0}},\ldots \mspace{14mu},{d + 2},{{\hat{}}_{t}^{*}:={{\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,n_{t}}^{*},b_{t,{{2n_{t}} + 1}}^{*},\ldots \mspace{14mu},b_{t,{3n_{t}}}^{*}} \right)\mspace{14mu} {for}\mspace{14mu} t} = 1}},\ldots \mspace{14mu},{d + 2},\mspace{20mu} {{sk}:=b_{0,1}^{*}},\mspace{20mu} {{pk}:={{\left( {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},\left\{ {\hat{}}_{t} \right\}_{{t = 0},\mspace{11mu} \ldots \mspace{11mu},{d + 2}},\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 1},\mspace{11mu} \ldots \mspace{11mu},{d + 2}},b_{0,3}^{*}} \right).\mspace{20mu} {return}}\mspace{14mu} {sk}}},{{pk}.}}}} & \; \end{matrix}$

The process of the KeyGen algorithm will be described with reference to FIG. 19.

(S901: Information Input Step)

With an input device, the information input part 130 takes as input an attribute set Γ:={(t, x^(→) _(t):=(x_(t,1), . . . , x_(t,nt)εF_(q) ^(nt)))|1≦t≦d}. For example, the attribute information of the user of the signature key sk_(Γ) is set in the attribute set Γ.

(S902: Random Number Generation Step)

With the processing device, the random number generation part 161 generates a random number δ and random numbers φ₀, φ_(t,t), φ_(d+2,t), and φ_(d+3,t) for each integer t=1, . . . , d and each integer t=1, . . . , n_(t), as indicated in Formula 172.

[Formula  172] $\begin{matrix} {{\delta,\varphi_{0},\varphi_{t,\iota},\varphi_{{d + 2},\iota},{\varphi_{{d + 3},\iota}\overset{U}{}_{q}}}{{{{for}\mspace{14mu} t} = 1},\ldots \mspace{14mu},d,{\iota = 1},\ldots \mspace{20mu},n_{t}}} & \; \end{matrix}$

(S903: Key Element Generation Step)

With the processing device, the key element generation part 162 generates an element k*₀ of the signature key sk_(Γ), as indicated in Formula 173.

k ₀*:=(δ,0,φ₀,0

₀*  [Formula 173]

With the processing device, the key element generation part 162 also generates an element k*_(t) of the signature key sk_(Γ) for each integer t of (t, x^(→) _(t)) included in Γ, as indicated in Formula 174.

$\begin{matrix} {k_{t}^{*}:={\overset{\overset{n_{t}}{}}{\left( {{\delta \left( {x_{t,1},\ldots \;,x_{t,n}} \right)},} \right.}\mspace{11mu} \overset{\overset{n_{t}}{}}{\; {0^{n_{t}},}}\mspace{14mu} \overset{\overset{n_{t}}{}}{\varphi_{t,1},\ldots \;,\varphi_{t,n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. 0^{n_{t}} \right)}}_{_{t}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 174} \right\rbrack \end{matrix}$

Also, with the processing device, the key element generation part 162 generates elements k*_(d+2) and k*_(d+3) of the signature key sk_(Γ), as indicated in Formula 175.

k _(d+2)*:=(δ(1,0),0,0,φ_(d+2,1),φ_(d+2,2),0,0)

_(d+2)  [Formula 175]

k _(d+3)*:=(δ(0,1),0,0,φ_(d+3,1),φ_(d+3,2),0,0)

_(d+2)*  [Formula 175]

(S904: Key Distribution Step)

For example, with the communication device, the key distribution part 150 distributes the signature key sk_(Γ) constituted by, as elements, the attribute set Γ inputted in (S901) and k*₀, k*_(t), k*_(d+2), and k*_(d+3) generated in (S903), to the signature device 400 in secrecy via the network. As a matter of course, the decryption key sk_(Γ) may be distributed to the signature device 400 by another method.

More specifically, from (S901) through (S903), the information input part 130 and signature key generation part 160 generate the signature key sk_(Γ) by executing the KeyGen algorithm indicated in Formula 176. Then, in (S904), the key distribution part 150 distributes the generated signature key sk_(Γ) to the signature device 400.

$\begin{matrix} {{{\left. {{KeyGen}\left( {{p\; k},{sk},{\Gamma:={{\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right) \right.1} \leq t \leq d}}} \right\}} \right)\left( {x_{t,1}:=1} \right)}\mspace{85mu} {\delta,\varphi_{0},\varphi_{t,\iota},\varphi_{{d + 2},\iota},{\varphi_{{d + 3},\iota}\overset{\mspace{14mu} U\mspace{11mu}}{\leftarrow}_{q}}}\mspace{85mu} {{{{for}\mspace{14mu} t} = 1},\ldots \;,d,{\iota = 1},\ldots \;,n_{t},\mspace{85mu} {k_{0}^{*}:=\left( {\delta,0,\varphi_{0},0} \right)_{_{0}^{*}}},{k_{t}^{*}:={\overset{\overset{n_{t}}{}}{\left( {{\delta \left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right)},} \right.}\mspace{11mu} \overset{\overset{n_{t}}{}}{\; {0^{n_{t}},}}\mspace{14mu} \overset{\overset{n_{t}}{}}{\varphi_{t,1},\ldots \;,\varphi_{t,n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. 0^{n_{t}} \right)}}_{_{t}^{*}}}}}}\mspace{14mu} \mspace{79mu} {{{{for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{79mu} {k_{d + 2}^{*}:=\left( {{\delta \left( {1,0} \right)},0,0,\varphi_{{d + 2},1},\varphi_{{d + 2},2},0,0} \right)_{_{d + 2}^{*}}},\mspace{79mu} {k_{d + 3}^{*}:=\left( {{\delta \left( {0,1} \right)},0,0,\varphi_{{d + 3},1},\varphi_{{d + 3},2},0,0} \right)_{_{d + 2}^{*}}},\mspace{79mu} {T:={\left\{ {0,{d + 2},{d + 3}} \right\}\bigcup\left\{ {{t\left. {{1 \leq t \leq d},{\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma}} \right\}}, {{s\; k_{\Gamma}}:={\left( {\Gamma,\left\{ k_{t}^{*} \right\}_{t \in T}} \right) {return}\mspace{14mu} s\; {k_{\Gamma}.}}}} \right.}}}} & \left\lbrack {{Formula}\mspace{14mu} 176} \right\rbrack \end{matrix}$

The function and operation of the signature device 400 will be described. The signature device 400 is provided with a signature key acquisition part 410, an information input part 420 (second information input part), a complementary coefficient calculation part 430, a matrix generation part 440, a signature generation part 450, and a data transmission part 460 (data output part). The signature generation part 450 is provided with a random number generation part 451 and a signature element generation part 452.

The process of the Sig algorithm will be described with reference to FIG. 20.

(S1001: Signature Key Acquisition Step)

For example, with the communication device, the signature key acquisition part 410 acquires the signature key sk_(Γ):=(Γ, k*₀, k*_(t), k*_(d+2), k*_(d+3)) distributed by the key generation device 100, via the network. The signature key acquisition part 410 also acquires the public parameters pk generated by the key generation device 100.

(S1002: Information Input Step)

With the input device, the information input part 420 takes as input the access structure S:=(M, ρ). Note that as the access structure S to be inputted, the attribute set Γ included in the signature key sk_(Γ) inputted in (S1001) is accepted.

With the processing device, the information input part 220 takes as input the message m to which the signature is to be attached.

(S1003: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 430 calculates I and a constant (complementary coefficient) {α_(i)}_(iδI), with which Formula 177 is established.

Σ_(iεI)α_(i) M _(i)={right arrow over (1)}, and

I⊂{iε{1, . . . ,L}|[ρ(i)=(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))εΓ

^({right arrow over (v)}) _(i) ·{right arrow over (x)} _(t)=0]

[ρ(i)=

(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))εΓ

{right arrow over (v)}_(i) ·{right arrow over (z)} _(t)≠0]}  [Formula 177]

Note that M_(i) denotes the i-th row of a matrix M.

(S1004: Row Addition Step)

With the processing device, the matrix generation part 440 generates a vector M_(L+1) to be added to the matrix M, and a label ρ(L+1) of the vector M_(L+1), as indicated in Formula 178.

M _(L+1):={right arrow over (1)}ε

  [Formula 178]

ρ(L+1):=

(d+1,{right arrow over (v)} _(L+1))

Let v^(→) _(L+1):=(1).

(S1005: Random Number Generation Step)

With the processing device, the random number generation part 451 generates a random number ξ, as indicated in Formula 179.

$\begin{matrix} {\xi \overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}_{q}} & \left\lbrack {{Formula}\mspace{14mu} 179} \right\rbrack \end{matrix}$

(S1006: Signature Element Generation Step)

With the processing device, the signature element generation part 452 generates s*₀ which is an element of the signature vector s^(→)*, as indicated in Formula 180.

$\begin{matrix} {{s_{0}^{*}:={{\xi \; k_{0}^{*}} + r_{0}^{*}}}{{Note}\mspace{14mu} {that}}{r_{0}^{*}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}{{span}{\langle b_{0,3}^{*}\rangle}}}} & \left\lbrack {{Formula}\mspace{14mu} 180} \right\rbrack \end{matrix}$

With the processing device, the signature element generation part 452 also generates s*_(i) which is an element of the signature vector s^(→)*, for each integer i=1, . . . , L+1, as indicated in Formula 180.

$\begin{matrix} {{s_{i}^{*}:={{{\gamma_{i} \cdot \xi}\; k_{t}^{*}} + {\beta_{i} \cdot \left( {\sum\limits_{\iota = 1}^{n_{t}}{y_{i,\iota} \cdot b_{t,\iota}^{*}}} \right)} + r_{i}^{*}}}{{{Note}\mspace{14mu} {that}\mspace{14mu} r_{i}^{*}\mspace{14mu} {is}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{14mu} {{follows}.r_{i}^{*}}}\overset{\mspace{25mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{t,{{2n_{t}} + 1}}^{*},\ldots \;,b_{t,{3n_{t}}}^{*}}\rangle}}}{{Also},{{\gamma_{i}\mspace{14mu} {and}\mspace{14mu} {\overset{\rightarrow}{y}}_{i}}:=\left( {y_{i,1},\ldots \;,y_{i,n_{t}}} \right)}}\mspace{14mu} {{{{{are}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{14mu} {{follows}.{if}}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{\gamma_{i}:=\alpha_{i}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},{{{{if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:={\alpha_{i}/\left( {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \right)}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},{{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{\gamma_{i}:=0},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},{{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:=0},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\} {Also}},{{\beta_{i}\mspace{14mu} {is}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{14mu} {{follows}.\left\{ \beta_{i} \right\}}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {\left\{ \beta_{i} \right\} \left. {{\sum\limits_{i = 1}^{L + 1}{\beta_{i}M_{i}}} = \overset{\rightarrow}{0}} \right\}} \right.}} \right.}} \right.}} \right.}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 181} \right\rbrack \end{matrix}$

With the processing device, the signature element generation part 452 also generates s*_(L+2) which is an element of the signature vector s^(→)*, as indicated in Formula 182.

$\begin{matrix} {{s_{L + 2}^{*}:={{\xi \left( {k_{d + 2}^{*} + {m \cdot k_{d + 3}^{*}}} \right)} + r_{L + 2}^{*}}}{{Note}\mspace{14mu} {that}}{r_{L + 2}^{*}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{{d + 2},5}^{*},b_{{d + 2},6}^{*}}\rangle}}}} & \left\lbrack {{Formula}\mspace{14mu} 182} \right\rbrack \end{matrix}$

(S1007: Data Transmission Step)

For example, with the communication device, the data transmission part 460 transmits signature data sig, including the message m and the access structure S:=(M, ρ) which are inputted in (S1002) and generated in (S1007), to the verification device 500 via the network. As a matter of course, the signature data sig may be transmitted to the verification device 500 by another method.

More specifically, from (S1001) through (S1006), the signature key acquisition part 410, the information input part 420, the complementary coefficient calculation part 430, the matrix generation part 440, and the signature generation part 450 generate the signature data sig by executing the Sig algorithm indicated in Formula 183. In (S1007), the data transmission part 460 transmits the generated signature data to the verification device 500.

$\begin{matrix} {\mspace{79mu} {{{Sig}\left( {{p\; k},{sk}_{\Gamma},m,{:=\left( {M,\rho} \right)}} \right)}\mspace{79mu} {{{{If}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},\mspace{76mu} {{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{14mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}\mspace{14mu} {such}\mspace{14mu} {that}}}\mspace{76mu} {{{\overset{\;}{\sum\limits_{i \in I}}{\alpha_{i}M_{i}}} = \overset{\rightarrow}{1}},{and}}{I \subseteq \left\{ { \in {\left\{ {1,\ldots \;,L} \right\} {{{\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack\bigvee\left. \quad\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack \right\}},{M_{L + 1}:={\overset{\rightarrow}{1} \in _{q}^{r}}},{{\overset{\rightarrow}{v}}_{L + 1}:=(1)},{{\rho \left( {L + 1} \right)}:={{{\left( {{d + 1},{\overset{\rightarrow}{v}}_{L + 1}} \right)\mspace{79mu} \xi}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}_{q}}}},{\left\{ \beta_{i} \right\} \overset{\mspace{14mu} U\mspace{11mu}}{\leftarrow}\left\{ {{\left( {\beta_{1},\ldots \;,\beta_{L + 1}} \right)\left. {{\sum\limits_{i = 1}^{L + 1}{\beta_{i}M_{i}}} = \overset{\rightarrow}{0}} \right\}},\mspace{79mu} {s_{0}^{*}:={{\xi \; k_{0}^{*}} + r_{0}^{*}}},\mspace{14mu} {{{where}\mspace{14mu} r_{0}^{*}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle b_{0,3}^{*}\rangle}}},\mspace{79mu} {{{for}\mspace{14mu} 1} \leq  \leq {L + 1}},\mspace{79mu} {s_{i}^{*}:={{{\gamma_{i} \cdot \xi}\; k_{t}^{*}} + {\beta_{i} \cdot \left( {\sum\limits_{\iota = 1}^{n_{t}}{y_{i,\iota} \cdot b_{t,\iota}^{*}}} \right)} + r_{i}^{*}}},\mspace{79mu} {{{where}\mspace{14mu} r_{i}^{*}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{t,2,{n_{t} + 1}}^{*},\ldots \;,b_{t,{3n_{t}}}^{*}}\rangle}}},\mspace{79mu} {{and}\mspace{14mu} \gamma_{i}},{{\overset{\rightarrow}{y}}_{i}:={{{\left( {y_{i,1},\ldots \;,y_{i,n_{t}}} \right)\mspace{14mu} {are}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{85mu} {if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},\mspace{79mu} {\gamma_{i}:=\alpha_{i}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},\mspace{85mu} {{{{if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:={\alpha_{i}/\left( {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \right)}},\mspace{85mu} {{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},\mspace{85mu} {{{{if}\mspace{11mu} } \notin {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{\gamma_{i}:=0},\mspace{79mu} {\overset{\mspace{20mu}}{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{11mu} U\mspace{11mu}}{\leftarrow}}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},\mspace{85mu} {{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:=0},\mspace{85mu} {{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},\mspace{85mu} {s_{L + 2}^{*}:={{\xi \left( {k_{d + 2}^{*} + {m \cdot k_{d + 3}^{*}}} \right)} + r_{L + 2}^{*}}},\mspace{85mu} {{{{where}\mspace{14mu} r_{L + 2}^{*}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{{d + 2},5},b_{{d + 2},6}}\rangle}\mspace{85mu} {\overset{\rightarrow}{s}}^{*}}}:=\left( {s_{0}^{*},\ldots \;,s_{L + 2}^{*}} \right)},{{sig}:={\left\{ {m,,{\overset{\rightarrow}{s}}^{*}} \right\} \mspace{14mu} \mspace{79mu} {retern}\mspace{14mu} {{sig}.}}}} \right.}} \right.}} \right.}} \right.}} \right.}}}}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 183} \right\rbrack \end{matrix}$

The function and operation of the verification device 500 will be described. The verification device 500 is provided with a public parameter acquisition part 510, a data reception part 520 (data acquisition part), an encrypted data generation part 530, and a pairing operation part 540. The encrypted data generation part 530 is provided with a random number generation part 531, a cryptographic element generation part 532, an f vector generation part 533, and an s vector generation part 534.

The process of the Ver algorithm will be described with reference to FIG. 21.

(S1101: Public Parameter Acquisition Step)

For example, with the communication device, the public parameter acquisition part 510 acquires the public parameters pk generated by the key generation device 100, via the network.

(S1102: Data Reception Step)

For example, with the communication step, the data reception part 320 receives the signature data sig transmitted by the signature device 400, via the network.

(S1103: f Vector Generation Step)

With the processing device, the f vector generation part 533 randomly generates a vector f^(→) having r pieces of elements, as indicated in Formula 184.

$\begin{matrix} {\overset{\rightarrow}{f}\overset{\mspace{20mu} R\mspace{14mu}}{\leftarrow}_{q}^{r}} & \left\lbrack {{Formula}\mspace{14mu} 184} \right\rbrack \end{matrix}$

(S1104: s Vector Generation Step)

With the processing device, the s vector generation part 534 generates a vector s^(→T):=(S₁, . . . , s_(L))^(T) based on the (L rows×r columns) matrix M included in the access structure S received in (S1102) and the vector f^(→) generated in (S1103), as indicated in Formula 185.

{right arrow over (s)} ^(T):=(s ₁ , . . . ,s _(L))^(T) :=M·{right arrow over (f)} ^(T)  [Formula 185]

With the processing device, the s vector generation part 534 also generates values s₀ and s_(L+1) based on the vector f^(→) generated in (S1103), as indicated in Formula 186.

s ₀ :=s _(L+1):={right arrow over (1)}·{right arrow over (f)} ^(T)  [Formula 186]

(S1105: Random Number Generation Step)

With the processing device, the random number generation part 531 generates random numbers η₀, η_(L+2,1), η_(L+)2,2, θ_(i), and s_(L+2) for each integer i=1, . . . , L+2, as indicated in Formula 187.

$\begin{matrix} {\eta_{0},\eta_{{L + 2},1},\eta_{{L + 2},2},\theta_{i},{s_{L + 2}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}_{q}}} & \left\lbrack {{Formula}\mspace{14mu} 187} \right\rbrack \end{matrix}$

(S1106: Cryptographic Element Generation Step)

With the processing device, the cryptographic element generation part 532 generates an element c₀ of the encrypted data c, as indicated in Formula 188.

c ₀:=(−s ₀ −s _(L+2),0,0,η₀)

  [Formula 188]

With the processing device, the cryptographic element generation part 532 also generates an element c_(i) of the encrypted data c for each integer i=1, . . . , L+1, as indicated in Formula 189.

$\begin{matrix} {{{{if}\mspace{14mu} {\rho ()}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \;,{\eta_{i,n_{t}}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}_{q}},{c_{i}:={\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t}}}}},{\overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,n_{t}},} \right)}}_{_{t}}},\; {{{if}\mspace{14mu} {\rho ()}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\; \eta_{i,1},\ldots \;,{\eta_{i,n_{t}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}_{q}},{c_{i}:={\overset{\overset{n_{t}}{}}{\left( {{s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t}}}}},{\overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,n_{t}},} \right)}}_{_{t}}},} & \left\lbrack {{Formula}\mspace{14mu} 189} \right\rbrack \end{matrix}$

With the processing device, the cryptographic element generation part 532 also generates an element c_(L+2) of the encrypted data c, as indicated in Formula 190.

c _(L+2):=(s _(L+2)−θ_(L+2) m,θ _(L+2),0,0,0,0,η_(L+2,1),η_(L+2,2))

  [Formula 190]

(S1107: Pairing Operation Step)

With the processing device, the pairing operation part 540 calculates Formula 191.

$\begin{matrix} {{\prod\limits_{i = 0}^{L + 2}\; {e\left( {c_{i},s_{i}^{*}} \right)}}{{{Let}\mspace{14mu} {\rho \left( {L + 1} \right)}}:={{\left( {{d + 1},{{\overset{\rightarrow}{v}}_{L + 1}:=(1)}} \right).}}}} & \left\lbrack {{Formula}\mspace{14mu} 191} \right\rbrack \end{matrix}$

The pairing operation part 540 outputs a value “1” if the calculation result of Formula 191 is a value “1”; and a value “0” otherwise. If the calculation result of Formula 191 is a value “1”, this indicates that the signature is verified; otherwise, the signature is not verified.

If the signature data sig is correct data, a value “1” is obtained by calculating Formula 191, as indicated by Formula 192.

$\begin{matrix} \begin{matrix} {{\prod\limits_{i = 0}^{L + 2}\; {e\left( {c_{i},s_{i}^{*}} \right)}} = {{e\left( {c_{0},s_{0}^{*}} \right)} \cdot {\prod\limits_{i \in I}^{\;}\; {{e\left( {c_{i},k_{i}^{*}} \right)}^{\xi \; \gamma_{i}} \cdot}}}} \\ {{\prod\limits_{i = 1}^{L + 1}\; {{e\left( {c_{i},{\prod\limits_{\iota = 1}^{n_{\iota}}\; \left( b_{t,\iota}^{*} \right)^{y_{i,t}}}} \right)}^{\beta_{i}} \cdot}}} \\ {{e\left( {c_{L + 2},s_{L + 2}^{*}} \right)}} \\ {= {g_{T}^{\xi \; {\delta {({{- s_{0}} - s_{L + 2}})}}} \cdot {\prod\limits_{i \in I}\; {g_{T}^{{\xi\delta\alpha}_{i}s_{i}} \cdot}}}} \\ {{\prod\limits_{i = 1}^{L + 1}\mspace{11mu} {g_{T}^{\beta_{i}s_{i}} \cdot g_{T}^{{\xi\delta}\; s_{L + 2}}}}} \\ {= {{g_{T}^{{\xi\delta}{({{- s_{0}} - s_{L + 2}})}} \cdot g_{T}^{{\xi\delta}\; s_{0}} \cdot g_{T}^{{\xi\delta}\; s_{L + 2}}} = 1}} \end{matrix} & {\left\lbrack {{Formula}\mspace{20mu} 192} \right\rbrack \;} \end{matrix}$

More specifically, from (S1101) through (S1107), the public parameter acquisition part 510, the data reception part 520, the encrypted data generation part 530, and the pairing operation part 540 verify the signature data sig by executing the Ver algorithm indicated in Formula 193.

$\begin{matrix} {\mspace{76mu} {{{Ver}\left( {{p\; k},m,{:=\left( {M,\rho} \right)},{\overset{\rightarrow}{s}}^{*}} \right)}{{\overset{\rightarrow}{f}\overset{\mspace{20mu} R\mspace{14mu}}{\leftarrow}_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \;,s_{L}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},{s_{0}:={s_{L + 1}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}}},\eta_{0},\eta_{{L + 2},1},\eta_{{L + 2},2},\theta_{i},{s_{L + 2}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{_{q}\left( {{ = 1},\ldots \;,{L + 2}} \right)}},\mspace{79mu} {{\rho \left( {L + 1} \right)}:={\left( {{d + 1},{{\overset{\rightarrow}{v}}_{L + 1}:=(1)}} \right)}}}\mspace{79mu} {{c_{0}:=\left( {{{- s_{0}} - s_{L + 2}},0,0,\eta_{0}} \right)_{_{0}}},\mspace{79mu} {{{for}\mspace{14mu} 1} \leq  \leq {L + 1}}}\mspace{79mu} {{{{if}\mspace{14mu} {\rho ()}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\mspace{79mu} \eta_{i,1},\ldots \;,{\eta_{i,n_{t}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}_{q}},{c_{i}:={\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t}}}}},{\overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,n_{t}},} \right)}}_{_{t}}},\mspace{79mu} {{{if}\mspace{14mu} {\rho ()}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\mspace{79mu} \eta_{i,1},\ldots \;,{\eta_{i,n_{t}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}_{q}},\mspace{79mu} {c_{i}:={\overset{\overset{n_{t}}{}}{\left( {{s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t}}}}},{\overset{\overset{n_{t}}{}}{0^{n_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,n_{t}},} \right)}}_{_{t}}},{c_{L + 2}:=\left( {{s_{L + 2} - {\theta_{L + 2}m}},\theta_{L + 2},0,0,0,0,\eta_{{L + 2},1},\eta_{{L + 2},2}} \right)_{_{d + 2}}},\mspace{79mu} {{{return}\mspace{14mu} 1\mspace{14mu} {if}\mspace{14mu} {\prod\limits_{i = 0}^{L + 2}\; {e\left( {c_{i},s_{i}^{*}} \right)}}} = 1},{{return}\mspace{14mu} 0\mspace{14mu} {{otherwise}.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 193} \right\rbrack \end{matrix}$

As described above, the signature processing system 20 implements the signature scheme using the access structure S constructed using the span program, inner-product predicate, and secret sharing.

In the Sig algorithm, the element of the signature vector s^(→)* is generated using the random numbers ξ and r, so that the variables δ and φ of the elements k of the signature key sk_(Γ) which is information on the generator of the element of the signature vector s^(→)* are randomized. If the variables δ and φ of the elements k of the signature key sk_(Γ) are randomized, these variables can be prevented from being read from s^(→)* which is an element of the signature data. Namely, based on which signature key sk_(Γ) the signature data is generated, can be prevented from being read. That is, the link ability can be increased.

In the above description, in (S801), 4n_(t) (=n_(t)+n_(t)+n_(t)+n_(t)) is set in N_(t).

Alternatively, n_(t)+n_(t)+n_(t)+n_(t) may be replaced by n_(t)+u_(t)+w_(t)+₄. More specifically, the first n_(t) may remain n_(t), the second n_(t) may be changed to u_(t), the third n_(t) may be changed to w_(t), and the fourth n_(t) may be changed to z_(t). That is, n_(t)+u_(t)+w_(t)+z_(t) may be set in N_(t). Note that n_(t), u_(t), and z_(t) can be different values where n_(t) is an integer of 1 or more, as described above, and each of u_(t), w_(t), and z_(t) is an integer of 0 or more.

In this case, the Setup algorithm indicated in Formula 171 is rewritten as indicated in Formula 194. Namely, the suffixes of the basis vectors of the bases B̂₁ and B̂*_(t) are changed.

$\begin{matrix} {\mspace{85mu} {{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \;,n_{d}} \right)}} \right)}\mspace{79mu} {\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \;,{d + 2}}} \right)\overset{\mspace{20mu} R\mspace{14mu}}{\leftarrow}{_{ob}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}}{{\hat{}}_{t}:=\left( {b_{t,1},\ldots \;,b_{t,n_{t}},b_{t,{n_{t} + u_{t} + w_{t} + 1}},\ldots \;,b_{t,{n_{t} + u_{t} + w_{t} + z_{t}}}} \right)}\mspace{79mu} {{{{for}\mspace{14mu} t} = 1},\ldots \;,{d + 2},{{\hat{}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \;,b_{t,n_{t}}^{*},b_{t,{n_{t} + u_{t} + 1}}^{*},\ldots \;,b_{t,{n_{t} + u_{t} + w_{t}}}^{*}} \right)}}\mspace{11mu} \mspace{79mu} {{{{for}\mspace{14mu} t} = 1},\ldots \;,{d + 2},\mspace{79mu} {{\hat{}}_{d + 1}:=\left( {b_{{d + 1},1},b_{{d + 1},2},b_{{d + 1},4}} \right)},\mspace{79mu} {{\hat{}}_{d + 1}^{*}:=\left( {b_{{d + 1},1}^{*},b_{{d + 1},2}^{*},b_{{d + 1},3}^{*}} \right)},{{sk}:=b_{0,1}^{*}},{{p\; k}:={{\left( {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},\left\{ {\hat{}}_{t} \right\}_{{t = 0},\ldots \;,{d + 2}},\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 1},\ldots \;,{d + 2}},b_{0,3}^{*}} \right).\mspace{79mu} {return}}\mspace{14mu} {sk}}},{p\; {k.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 194} \right\rbrack \end{matrix}$

Also, the KeyGen algorithm indicated in Formula 176 is rewritten as indicated in Formula 195.

$\begin{matrix} {{KeyGen}\left( {{p\; k},{sk},{\Gamma:={\left\{ {\left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)\left. {1 \leq t \leq d} \right\}} \right)\left( {x_{t,1}:=1} \right)\mspace{79mu} \delta}},\varphi_{0},\varphi_{t,\iota},\varphi_{{d + 2},\iota},{{\varphi_{{d + 3},\iota}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{_{q}\mspace{79mu} {for}\mspace{14mu} t}} = 1},\ldots \;,d,{\iota = 1},\ldots \;,w_{t},\mspace{79mu} {k_{0}^{*}:=\left( {\delta,0,\varphi_{0},0} \right)_{_{0}^{*}}},{k_{t}^{*}:=\overset{\overset{n_{t}}{}}{\left( {\delta \left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{\varphi_{t,1},\ldots \;,\varphi_{t,w_{t}}},{{\overset{\overset{z_{t}}{}}{\left. {0^{z_{t}},} \right)_{_{i}^{*}}}\mspace{14mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{79mu} {k_{d + 2}^{*}:=\left( {\delta,\left( {1,0} \right),0,0,\varphi_{{d + 2},1},\varphi_{{d + 2},2},0,0} \right)_{_{d + 2}^{*}}},\mspace{79mu} {k_{d + 3}^{*}:=\left( {\delta,\left( {0,1} \right),0,0,\varphi_{{d + 3},1},\varphi_{{d + 3},2},0,0} \right)_{_{d + 2}^{*}}},\mspace{79mu} {T:={\left\{ {0,{d + 2},{d + 3}} \right\}\bigcup\left\{ {{t\left. {{1 \leq t \leq d},{\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma}} \right\}},\mspace{79mu} {{sk}_{\Gamma}:={\left( {\Gamma,\left\{ k_{t}^{*} \right\}_{t \in T}} \right)\mspace{79mu} {return}\mspace{14mu} {{sk}_{\Gamma}.}}}} \right.}}} \right.} & \left\lbrack {{Formula}\mspace{14mu} 195} \right\rbrack \end{matrix}$

Also, the Sig algorithm indicated in Formula 183 is rewritten as indicated in Formula 196.

$\begin{matrix} {\mspace{85mu} {{{Sig}\left( {{p\; k},{sk}_{\Gamma},m,{:=\left( {M,\rho} \right)}} \right)}\mspace{85mu} {{{{If}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},\mspace{79mu} {{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{14mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}\mspace{14mu} {such}\mspace{14mu} {that}}}\mspace{79mu} {{{\overset{\;}{\sum\limits_{i \in I}}{\alpha_{i}M_{i}}} = \overset{\rightarrow}{1}},{and}}{I \subseteq \left\{ { \in {\left\{ {1,\ldots \;,L} \right\} {{{\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack\bigvee\left. \quad\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack \right\}},{M_{L + 1}:={\overset{\rightarrow}{1} \in _{q}^{r}}},{{\overset{\rightarrow}{v}}_{L + 1}:=(1)},{{\rho \left( {L + 1} \right)}:={{{\left( {{d + 1},{\overset{\rightarrow}{v}}_{L + 1}} \right)\mspace{79mu} \xi}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}_{q}}}},{\left\{ \beta_{i} \right\} \overset{\mspace{14mu} U\mspace{11mu}}{\leftarrow}\left\{ {{\left( {\beta_{1},\ldots \;,\beta_{L + 1}} \right)\left. {{\sum\limits_{i = 1}^{L + 1}{\beta_{i}M_{i}}} = \overset{\rightarrow}{0}} \right\}},\mspace{79mu} {s_{0}^{*}:={{\xi \; k_{0}^{*}} + r_{0}^{*}}},{{{where}\mspace{14mu} r_{0}^{*}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\; {{span}{\langle b_{0,3}^{*}\rangle}}},\mspace{79mu} {{{for}\mspace{14mu} 1} \leq  \leq {L + 1}},\mspace{59mu} {s_{i}^{*}:={{{\gamma_{i} \cdot \xi}\; k_{t}^{*}} + {\beta_{i} \cdot \left( {\sum\limits_{\iota = 1}^{n_{t}}{y_{i,\iota} \cdot b_{t,\iota}^{*}}} \right)} + r_{i}^{*}}},\mspace{79mu} {{{where}\mspace{14mu} r_{i}^{*}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{t,{n_{t} + u_{\iota} + 1}}^{*},\ldots \;,b_{t,{n_{t} + u_{t} + w_{t}}}^{*}}\rangle}}},\mspace{20mu} {{and}\mspace{14mu} \gamma_{i}},{{\overset{\rightarrow}{y}}_{i}:={{{\left( {y_{i,1},\ldots \;,y_{i,n_{t}}} \right)\mspace{14mu} {are}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{20mu} {if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},\mspace{20mu} {\gamma_{i}:=\alpha_{i}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},\mspace{20mu} {{{{if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:={\alpha_{i}/\left( {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \right)}},\mspace{20mu} {{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},{{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = {{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\gamma_{i}}:=0}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},\mspace{20mu} {{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:=0},\mspace{20mu} {{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},\mspace{20mu} {s_{L + 2}^{*}:={{\xi \begin{pmatrix} {k_{d + 2}^{*} +} \\ {m \cdot k_{d + 3}^{*}} \end{pmatrix}} + r_{L + 2}^{*}}},\mspace{20mu} {{{{where}\mspace{14mu} r_{L + 2}^{*}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{{d + 2},5}^{*},b_{{d + 2},6}^{*}}\rangle}\mspace{20mu} {\overset{\rightarrow}{s}}^{*}}}:=\left( {s_{0}^{*},\ldots \;,s_{L + 2}^{*}} \right)},{{sig}:={\left\{ {m,,{\overset{\rightarrow}{s}}^{*}} \right\} \mspace{14mu} \mspace{20mu} {retern}\mspace{14mu} {{sig}.}}}} \right.}} \right.}} \right.}} \right.}} \right.}}}}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 196} \right\rbrack \end{matrix}$

Also, the Ver algorithm indicated in Formula 193 is rewritten as indicated in Formula 197.

$\begin{matrix} {\mspace{76mu} {{{{Ver}\left( {{p\; k},m,{:=\left( {M,\rho} \right)},{\overset{\rightarrow}{s}}^{*}} \right)}\mspace{76mu} {{\overset{\rightarrow}{f}\overset{\mspace{20mu} R\mspace{14mu}}{\leftarrow}_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \;,s_{L}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},\mspace{20mu} {s_{0}:={s_{L + 1}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}}},\eta_{0},\eta_{{L + 1},1},\eta_{{L + 1},2},\theta_{i},{s_{L + 2}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{_{q}\left( {{ = 1},\ldots \;,{L + 2}} \right)}},\mspace{20mu} {c_{0}:=\left( {{{- s_{0}} - s_{L + 1}},0,0,\eta_{0}} \right)_{_{0}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq  \leq {L + 1}}}}\mspace{20mu} {{{{if}\mspace{14mu} {\rho ()}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\mspace{20mu} \eta_{i,1},\ldots \;,{\eta_{i,z_{t}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}_{q}},{c_{i}:{\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}},} \right.}\overset{\overset{u_{t}}{}}{0^{u_{t}}}}},{\overset{\overset{w_{t}}{}}{0^{w_{t}},}\mspace{11mu} {\overset{\overset{n_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{_{t}}},\mspace{20mu} {{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\mspace{20mu} \eta_{i,1},\ldots \;,{\eta_{i,z_{t}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}_{q}},\mspace{20mu} {c_{i}:{\overset{\overset{n_{t}}{}}{\left( {{s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)},} \right.}\overset{\overset{u_{t}}{}}{0^{u_{t}}}}},{\overset{\overset{w_{t}}{}}{0^{w_{t}},}\mspace{11mu} {\overset{\overset{z_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{_{t}}},{c_{L + 1}:=\left( {{s_{L + 2} - {\theta_{L + 2}m}},\theta_{L + 2},0,0,0,0,\eta_{{L + 2},1},\eta_{{L + 2},2}} \right)_{_{d + 2}}},\mspace{20mu} {{{return}\mspace{14mu} 1\mspace{14mu} {if}\mspace{14mu} {\prod\limits_{i = 0}^{L + 2}\; {e\left( {c_{i},s_{i}^{*}} \right)}}} = 1},{{return}\mspace{14mu} 0\mspace{14mu} {{otherwise}.}}}}} & \left\lbrack {{Formula}\mspace{14mu} 197} \right\rbrack \end{matrix}$

Also, each of N₀ and N_(d+1) need not be 4 but may be an integer of 1 or more. When N₀ is 1, the bases B₀ and B*₀ become one-dimensional. In this case, k*_(0,j):=(δ)_(B*0) may be set in the KeyGen algorithm and c₀:=(−s₀−s_(L+2))_(B0) may be set in the Ver algorithm.

Also, N_(d+2) need not be 8 but may be an integer of 2 or more. When N_(d+2) is 2, the bases B_(d+2) and B*_(d+2) become two-dimensional. In this case, k*_(d+2) (δ_(j)(1,0))_(B*d+2) and k*_(d+3):=(δ_(j)(0,1))_(B*d+2) may be set in the KeyGen algorithm, and c₀:=(s_(L+2)−θ_(L+2)m, θ_(L+2))_(Bd+2) may be set in the Ver algorithm.

In the above description, the value of v_(i,nt) is not particularly limited. However, a limitation of v_(i,nt):=1 may be placed from the viewpoint of security proof

From the viewpoint of security proof, ρ(i) for each integer i=1, . . . , L may be a positive tuple (t, v^(→)) or negative tuple

(t, v^(→)) for different identification information t.

In other words, let a function ρ^(˜) be map of {1, . . . , L}→{1, . . . , d} with which ρ^(˜)(i)=t is established when ρ(i)=(t, v^(→)) or ρ(i)=

(t, v^(→)). In this case, ρ^(˜) may be injection. Note that ρ(i) is ρ(i) in the access structure S:=(M, ρ(i)) described above.

In the above description, in the row addition step (S1004) of the Sig algorithm, the first row of the vector M_(L+1) is added, as the (L+1)th row, to the matrix M. However, any number of one or more rows may be added to the matrix M. In (S1004), the added rows are M_(L+1):=1^(→). However, the rows to be added are not limited to 1^(→) but other vectors.

In the above description, the label ρ of the added (L+1)th row was ρ(L+1):=

(d+1, v^(→) _(L+1):=(1)). However, the label of the row to be added is not limited to this but suffices as far as the process is established.

More specifically, the label of the row may be set such that the information on the added rows is 0 when the pairing operation is performed in the pairing operation step (S1107) of the Ver algorithm.

If two or more rows are added, the number of repetition times of the process of the Sig algorithm or Ver algorithm need be changed in accordance with the number of added rows.

In order to enhance the security of the signature process, the signature algorithm indicated in Formula 171 may be changed as in Formula 198, and the Sig algorithm indicated in Formula 183 may be changed as in Formula 199.

$\begin{matrix} {\mspace{79mu} {{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \;,n_{d}} \right)}} \right)}\mspace{79mu} {\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \;,{d + 2}}} \right)\overset{\mspace{20mu} R\mspace{14mu}}{\leftarrow}{_{ob}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}}\mspace{20mu} {{n_{0}:={n_{d + 1}:=1}},{n_{d + 2}:=2},\mspace{85mu} {{\hat{}}_{t}:=\left( {b_{t,1},\ldots \;,b_{t,n_{t}},b_{t,{{3n_{t}} + 1}},\ldots \;,b_{t,{4n_{t}}}} \right)}}\mspace{20mu} {{{{for}\mspace{14mu} t} = 0},\ldots \;,{d + 2},\mspace{20mu} {{\hat{}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \;,b_{t,n_{t}}^{*}} \right)},\mspace{20mu} {{\overset{\sim}{}}_{t}^{*}:=\left( {b_{t,{{2n_{t}} + 1}}^{*},\ldots \;,b_{t,{3n_{t}}}^{*}} \right)}}\mspace{11mu} \mspace{20mu} {{{{for}\mspace{14mu} t} = 1},\ldots \;,{d + 2},\mspace{20mu} \sigma,{\left. \psi_{t,i,\iota}\leftarrow{_{q}\mspace{14mu} {for}\mspace{14mu} t} \right. = 1},\ldots \;,{d + 1},\mspace{20mu} { = 1},\ldots \;,n_{t},{\iota = 1},\ldots \;,n_{t},{p_{t,\iota}^{*}:=\overset{\overset{n_{t}}{}}{\left( {0^{t - 1},\sigma,0^{n_{t} - \iota}} \right.}},\overset{\overset{n_{t}}{}}{0^{n_{\iota}}},\overset{\overset{n_{t}}{}}{\psi_{t,1,\iota},\ldots \;,\psi_{t,n_{t},\iota}},{\overset{\overset{n_{t}}{}}{\left. {0^{n_{\iota}},} \right)}}_{_{t}^{*}}}}\mspace{20mu} {{{{for}\mspace{14mu} t} = 1},\ldots \;,{d + 1},{\iota = 1},\ldots \;,n_{t},\mspace{20mu} {{sk}:=\left( {b_{0,1}^{*},{{\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 1},\ldots \;,{d + 2}}p\; k}:={{\begin{pmatrix} {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},{\hat{}}_{0},b_{0,3,},} \\ {\left\{ {{\hat{}}_{t}^{*},{\overset{\sim}{}}_{t}^{*}} \right\}_{{t = 1},\ldots \;,{d + 2}},\left\{ p_{t,\iota}^{*} \right\}_{{t = 1},\ldots \;,{{d + 2};{\iota = 1}},\ldots \;,n_{t}}} \end{pmatrix}.\mspace{20mu} {return}}\mspace{14mu} {sk}}},{p\; {k.}}} \right.}}}} & \left\lbrack {{Formula}\mspace{14mu} 198} \right\rbrack \\ {\mspace{76mu} {{{Sig}\left( {{p\; k},{sk}_{\Gamma},m,{:=\left( {M,\rho} \right)}} \right)}\mspace{20mu} {{{{If}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},\mspace{20mu} {{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{14mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}\mspace{14mu} {such}\mspace{14mu} {that}}}\mspace{20mu} {{{\sum\limits_{i \in I}^{\;}{\alpha_{i}M_{i}}} = \overset{\rightarrow}{1}},{and}}{I \subseteq \left\{ { \in {\left\{ {1,\ldots \;,L} \right\} {{{\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack\bigvee\left. \quad\left\lbrack {{\rho ()} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack \right\}},{M_{L + 1}:={\overset{\rightarrow}{1} \in _{q}^{r}}},{{\overset{\rightarrow}{v}}_{L + 1}:=(1)},{{\rho \left( {L + 1} \right)}:={{{\left( {{d + 1},{\overset{\rightarrow}{v}}_{L + 1}} \right)\mspace{20mu} \xi}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}_{q}}}},{\left\{ \beta_{i} \right\} \overset{\mspace{14mu} U\mspace{11mu}}{\leftarrow}\left\{ {{\left( {\beta_{1},\ldots \;,\beta_{L + 1}} \right)\left. {{\sum\limits_{i = 1}^{L + 1}{\beta_{i}M_{i}}} = \overset{\rightarrow}{0}} \right\}},{s_{0}^{*}:={{\xi \; k_{0}^{*}} + r_{0}^{*}}},{{{where}\mspace{14mu} r_{0}^{*}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle b_{0,3}^{*}\rangle}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq  \leq {L + 1}},{s_{i}^{*}:={{{\gamma_{i} \cdot \xi}\; k_{t}^{*}} + {\beta_{i} \cdot \left( {\sum\limits_{\iota = 1}^{n_{t}}{y_{i,\iota} \cdot b_{t,\iota}^{*}}} \right)} + r_{i}^{*}}},\mspace{20mu} {{{where}\mspace{14mu} r_{i}^{*}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{t,2,{n_{t} + 1}}^{*},\ldots \;,b_{t,{3n_{t}}}^{*}}\rangle}}},\mspace{20mu} {{and}\mspace{14mu} \gamma_{i}},{{\overset{\rightarrow}{y}}_{i}:={{{\left( {y_{i,1},\ldots \;,y_{i,n_{t}}} \right)\mspace{14mu} {are}\mspace{14mu} {defined}\mspace{14mu} {as}\mspace{20mu} {if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},\mspace{20mu} {\gamma_{i}:=\alpha_{i}},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},\mspace{20mu} {{{{if}\mspace{14mu} } \in {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:={\alpha_{i}/\left( {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \right)}},\mspace{20mu} {{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},{{{{if}\mspace{14mu} i} \notin {I\bigwedge{\rho ()}}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}, {\gamma_{i}:=0},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = {{0\bigwedge y_{i,1}} = 1}} \right\}},{{{{if}\mspace{14mu} } \notin {I\bigwedge{\rho ()}}} = {\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\gamma_{i}:=0},{{\overset{\rightarrow}{y}}_{i}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}\left\{ {{{\overset{\rightarrow}{y}}_{i}\left. {{{\overset{\rightarrow}{y}}_{i} \cdot {\overset{\rightarrow}{v}}_{i}} = 1} \right\}},\mspace{20mu} {s_{L + 2}^{*}:={{\xi \begin{pmatrix} {k_{d + 2}^{*} +} \\ {m \cdot k_{d + 3}^{*}} \end{pmatrix}} + r_{L + 2}^{*}}},\mspace{20mu} {{{{where}\mspace{14mu} r_{L + 2}^{*}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}{{span}{\langle{b_{{d + 2},5},b_{{d + 2},6}}\rangle}\mspace{20mu} {\overset{\rightarrow}{s}}^{*}}}:=\left( {s_{0}^{*},\ldots \;,s_{L + 2}^{*}} \right)},{{sig}:={\left\{ {m,,{\overset{\rightarrow}{s}}^{*}} \right\} \mspace{14mu} \mspace{20mu} {retern}\mspace{14mu} {{sig}.}}}} \right.}} \right.}} \right.}} \right.}} \right.}}}}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 199} \right\rbrack \end{matrix}$

More specifically, the Setup algorithm is changed in that the confidential vector p*_(t,t) in which a random value is set is generated, and the Sig algorithm is changed in that the element s*_(i) of the signature vector s^(→)* is generated using the confidential vector p*_(t,t). Also, the Setup algorithm is changed in that the basis B̂*_(t) is included in the master key sk instead of in the public parameters pk, and is kept secret. This enhances the security of the signature process.

Even when the Setup algorithm and the Sig algorithm are changed in this manner, if the signature data sig is correct data, a value “1” can be obtained by performing the pairing operation in the algorithm, as indicated in Formula 199.

$\begin{matrix} \begin{matrix} {{\prod\limits_{i = 0}^{L + 2}\; {e\left( {c_{i},s_{i}^{*}} \right)}} = {{e\left( {c_{0},s_{0}^{*}} \right)} \cdot {\prod\limits_{i \in I}^{\;}\; {{e\left( {c_{i},k_{i}^{*}} \right)}^{\xi \; \gamma_{i}} \cdot}}}} \\ {{\prod\limits_{i = 1}^{L + 1}\; {{e\left( {c_{i},{\prod\limits_{\iota = 1}^{n_{\iota}}\; \left( p_{t,\iota}^{*} \right)^{y_{i,t}}}} \right)}^{\beta_{i}} \cdot}}} \\ {{e\left( {c_{L + 2},s_{L + 2}^{*}} \right)}} \\ {= {g_{T}^{\xi \; {\delta {({{- s_{0}} - s_{L + 2}})}}} \cdot {\prod\limits_{i \in I}\; {g_{T}^{{\xi\delta\alpha}_{i}s_{i}} \cdot}}}} \\ {{\prod\limits_{i = 1}^{L + {1 \cdot}}\mspace{11mu} {g_{T}^{\beta_{i}s_{i}} \cdot g_{T}^{{\xi\delta}\; s_{L + 2}}}}} \\ {= {{g_{T}^{{\xi\delta}{({{- s_{0}} - s_{L + 2}})}} \cdot g_{T}^{{\xi\delta}\; s_{0}} \cdot g_{T}^{{\xi\delta}\; s_{L + 2}}} = 1}} \end{matrix} & \left\lbrack {{Formula}\mspace{14mu} 200} \right\rbrack \end{matrix}$

In the Ver algorithm, c_(L+2) (s₀−θ_(L+2)m, θ_(L+2), 0, 0, 0, 0, η_(L+2,t), η_(L+2,2)) may be set in the cryptographic element generation step (S1106), instead of generating c₀. Then, in the pairing operation step (S1107), Π_(i=1) ^(L+2)e(c_(i), s*_(i)) may be calculated.

Namely, in the above description, c₀ and c_(L+2) are linked by a random number s_(L+2), and s_(L+2) is canceled between c₀ and c_(L+2) when the pairing operation is executed. Alternatively, s_(L+2) need not be used in advance, so the process is simplified.

In this case, k*₀ need not be generated in the KeyGen algorithm. Likewise, s*₀ need not be generated in the Sig algorithm.

Embodiment 4

In Embodiment 1, from the viewpoint of security proof, ρ(i) for each integer i=1, . . . , L was described as a positive tuple (t, v^(→)) or negative tuple

(t, v^(→)) for different identification information t. That is, ρ^(˜) may be injection. However, ρ^(˜) need not be injection.

In this case, from the viewpoint of security proof, the Setup algorithm, the KeyGen algorithm, and the Enc algorithm of the Key-Policy functional encryption described in Embodiment 1 may be modified as follows. Only the modified portions of the respective algorithms of the Key-Policy functional encryption described in Embodiment 1 will be explained.

In this embodiment, let φ be a value indicated in Formula 201.

φ≧max_(t=1) ^(d) #{i|{tilde over (ρ)}( i)=t}  [Formula 201]

The Setup algorithm executes Setup(1^(λ), μ′^(→):=(d; n₁′, . . . , n_(d)′)) when (1^(λ), μ^(→):=(d; n₁, . . . , n_(d)) is inputted. Note that n_(t)′:=n_(t)+φ for each integer t=1, . . . , d.

Regarding the KeyGen algorithm, the generating method of k*_(i) is modified as indicated in Formula 202.

$\begin{matrix} {\left. \mspace{79mu} {{{{{if}\mspace{14mu} {\rho ()}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)},\mspace{79mu} \eta_{i,1},\ldots \;,{\eta_{i,n_{t}}\overset{\mspace{20mu} U\mspace{11mu}}{\leftarrow}_{q}},{k_{i}^{*}:=\overset{\overset{n_{\iota}^{\prime}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{\iota}}0^{\phi}}} \right.}},\; \overset{\overset{n_{\iota}^{\prime}}{}}{0^{n_{\iota}^{\prime}}},\overset{\overset{n_{\iota}^{\prime}}{}}{\eta_{i,1},\ldots \;,\eta_{i,n_{\iota}^{\prime}}},\mspace{11mu} {\overset{\overset{n_{\iota}^{\prime}}{}}{\left. {0^{n_{t}^{\prime}},} \right)}}_{_{t}^{*}}}\mspace{85mu} {{{{if}\mspace{14mu} {\rho ()}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in _{q}^{n_{t}}}}} \right)}},\mspace{85mu} \eta_{i,1},\ldots \;,{\eta_{i,n_{t}^{\prime}}\overset{\mspace{20mu} U\mspace{14mu}}{\leftarrow}_{q}},{k_{i}^{*}:=\overset{\overset{n_{t}^{\prime}}{}}{\left( {{s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)}0^{\phi}} \right.}},\overset{\overset{n_{t}^{\prime}}{}}{0^{n_{t}^{\prime}}},\overset{\overset{n_{t}^{\prime}}{}}{\eta_{i,1},\ldots \;,\eta_{i,n_{t}^{\prime}}},\overset{\overset{n_{t}^{\prime}}{}}{0^{n_{t}^{\prime}}}}} \right)_{t}^{*}} & \left\lbrack {{Formula}\mspace{14mu} 202} \right\rbrack \end{matrix}$

Regarding the Enc algorithm, the generating method of c_(t) is modified as indicated in Formula 203.

$\begin{matrix} {{c_{t}:=\overset{\overset{n_{t}^{\prime}}{}}{\left( {{\delta \left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right)},0^{\phi}} \right.}},\overset{\overset{n_{t}^{\prime}}{}}{0^{n_{t}^{\prime}}},\overset{\overset{n_{t}^{\prime}}{}}{0^{n_{t}^{\prime}}},{\overset{\overset{n_{t}^{\prime}}{}}{\left. {\varphi_{t,1},\ldots \;,\varphi_{t,n_{t}^{\prime}}} \right)}}_{_{t}}} & \left\lbrack {{Formula}\mspace{14mu} 203} \right\rbrack \end{matrix}$

Modification of the process for a case where ρ^(˜) is not injection has been described above only regarding the Key-Policy functional encryption described in Embodiment 1. The cryptographic process and the signature process described in other embodiments may be modified based on the same concept.

Embodiment 5

In the above embodiments, the method of implementing the cryptographic process and signature process in the dual vector spaces has been described. In Embodiment 5, a method of implementing a cryptographic process and signature process in dual additive groups will be described.

More specifically, in the above embodiments, the cryptographic process is implemented in the cyclic group of the prime order q. When a ring R is expressed using a composite number M as indicated in Formula 204, the cryptographic process described in the above embodiments can also be applied to an additive group having the ring R as a coefficient.

:=

  [Formula 204]

where

: an integer; and M: a composite number

For example, when the Key-Policy functional encryption described in Embodiment 1 is implemented in an additive group having a ring R as a coefficient, then Formulas 205 to 208 are resulted.

$\begin{matrix} {\quad\begin{matrix} {{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;n_{1}},\ldots \;,n_{d}} \right)}} \right)}{\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},_{t}^{*}} \right\}_{{t = 0},\ldots \;,d}} \right)\overset{\mspace{14mu} R\mspace{11mu}}{\leftarrow}{_{ob}\left( {1^{\lambda},\overset{\rightarrow}{\mu}} \right)}}{{{\hat{}}_{0}:=\left( {b_{0,1},b_{0,3},b_{0,5}} \right)},{{\hat{}}_{t}:=\left( {b_{t,1},\ldots \;,b_{t,n_{t}},b_{t,{{3n_{t}} + 1}},\ldots \;,b_{t,{4n_{t}}}} \right)}}{{{{for}\mspace{14mu} t} = 1},\ldots \;,d,{{\hat{}}_{0}^{*}:=\left( {b_{0,1}^{*},b_{0,3}^{*},b_{0,4}^{*}} \right)},{{\hat{}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \;,b_{t,n_{t}}^{*},b_{t,{{2n_{t}} + 1}}^{*},\ldots \;,b_{t,{3n_{t}}}^{*}} \right)}}{{{for}\mspace{14mu} t} = 1},\ldots \;,d,{{sk}:=\left\{ {\hat{}}_{t}^{*} \right\}_{{t = 0},\ldots \;,d}}}{{{p\; k}:={{\left( {1^{\lambda},{param}_{\overset{\rightarrow}{\mu}},\left\{ _{t} \right\}_{{t = 0},\ldots \;,d}} \right).{return}}\mspace{14mu} {sk}}},{p\; {k.}}}} & \left\lbrack {{Formula}\mspace{14mu} 205} \right\rbrack \end{matrix}} & \; \end{matrix}$

Note that

${{{\left( {1^{\lambda},{\overset{\rightarrow}{\mu}:=\left( {{d;{n_{1}\mspace{14mu} \ldots}}\mspace{14mu},n_{d}} \right)}} \right)}:{param}_{}}:={{\left( {q,,{_{T}g},e} \right)\overset{R}{}}\left( 1^{\lambda} \right)}},\mspace{20mu} {\psi \overset{U}{}{\mathbb{R}}},\mspace{20mu} {N_{0}:=5},{N_{t}:={{4\; n_{t}\mspace{14mu} {for}\mspace{14mu} t} = 1}},\ldots \mspace{14mu},d,{{{For}\mspace{14mu} t} = 0},\ldots \mspace{14mu},d,{{param}_{_{t}}:={\left( {q,_{t},_{T},_{t},e} \right):={\left( {1^{\lambda},N_{t},{param}_{}} \right)}}},\mspace{20mu} {X_{t}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{}{{GL}\left( {N_{t},{\mathbb{R}}} \right)}}},{\left( \upsilon_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}},\mspace{20mu} {b_{t,i}:={\left( {{\chi_{t,i,1,}\mspace{14mu} \ldots}\mspace{14mu},\chi_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{\chi_{t,i,j}a_{t,j}}}}},{_{t}:=\left( {b_{t,1},\ldots \mspace{14mu},b_{t,N_{t}}} \right)},\mspace{20mu} {b_{t,i}^{*}:={\left( {{\upsilon_{t,i,1,}\mspace{14mu} \ldots}\mspace{14mu},\upsilon_{t,i,N_{t}}} \right)_{_{t}} = {\sum\limits_{j = 1}^{N_{t}}{\upsilon_{t,i,j}a_{t,j}}}}},{_{t}^{*}:=\left( {b_{t,1}^{*},\ldots \mspace{14mu},b_{t,N_{t}}^{*}} \right)},\mspace{20mu} {g_{T}:={{e\left( {G,G} \right)}\psi}},{{param}_{\overset{\rightarrow}{\mu}}:=\left( {\left\{ {param}_{_{t}} \right\}_{{t = 0},\ldots \mspace{14mu},d,}g_{T}} \right)}$ $\mspace{20mu} {{return}\mspace{14mu} {\left( {{param}_{\overset{\rightarrow}{\mu}},\left\{ {_{t},Β_{t}^{*}} \right\}_{{t = 0},\ldots \mspace{14mu},d}} \right).}}$

$\begin{matrix} {\mspace{79mu} {{{KeyGen}\left( {{pk},{sk},{:=\left( {M,\rho} \right)}} \right)}{{\overset{\rightarrow}{f}\overset{U}{}{\mathbb{R}}^{r}},{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots \mspace{14mu},s_{L}} \right)^{T \cdot}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},{s_{0}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\mspace{79mu} \eta_{0},{\theta_{i}\overset{U}{}{{\mathbb{R}}\left( {{i = 1},\ldots \mspace{14mu},L} \right)}},\mspace{20mu} {k_{0}^{*}:=\left( {{- s_{0}},0,1,\eta_{0},0} \right)_{_{0}^{*}}},\mspace{20mu} {{{for}\mspace{14mu} 1} \leq i \leq L}}{{{{if}\mspace{14mu} {\rho (i)}} = \left( {t,{v_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in {\mathbb{R}}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}{\mathbb{R}}},{k_{i}^{*}:={\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \mspace{14mu},{\theta_{i}v_{i,n_{t},}}} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t},}}\overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}{\overset{\overset{n_{t}}{}}{\left. 0^{n_{t},} \right)}}_{_{t}^{*}}}}}{{{{if}\mspace{14mu} {\rho (i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right) \in {\mathbb{R}}^{n_{t}}}}} \right)}},\eta_{i,1},\ldots \mspace{14mu},{\eta_{i,n_{t}}\overset{U}{}{\mathbb{R}}},\mspace{20mu} {k_{i}^{*}:={{\overset{\overset{n_{t}}{}}{\left( {{s_{i}\left( {v_{i,1},\ldots \mspace{14mu},v_{i,n_{t}}} \right)},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t},}}\overset{\overset{n_{t}}{}}{\eta_{i,1},\ldots \mspace{14mu},\eta_{i,n_{t}},}{\overset{\overset{n_{t}}{}}{\left. 0^{n_{t},} \right)}}_{_{t}^{*}}\mspace{20mu} {sk}_{}}:={{\left( {,k_{0}^{*},k_{1}^{*},\ldots \mspace{14mu},k_{L}^{*}} \right).\mspace{20mu} {return}}\mspace{14mu} {{sk}_{}.}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 206} \right\rbrack \end{matrix}$

$\begin{matrix} {{Enc}\left( {{pk},m,{\Gamma:={\left\{ \left( {t,{{\overset{\rightarrow}{x}}_{t}:={\left( {x_{t,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right) \in _{q}^{n_{i}}}}} \right) \middle| {1 \leq t \leq d} \right\} \left( {x_{t,1}:=1} \right)\delta}},\varphi_{0},\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}},{{{\zeta \overset{U}{}{\mathbb{R}}}\mspace{14mu} {such}\mspace{14mu} {that}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},\mspace{20mu} {c_{0}:=\left( {\delta,0,\zeta,0,\varphi_{0}} \right)_{_{0}}},\mspace{20mu} {c_{t}:={{\overset{\overset{n_{t}}{}}{\left( {{\delta \left( {x_{i,1},\ldots \mspace{14mu},x_{t,n_{t}}} \right)},} \right.}\overset{\overset{n_{t}}{}}{0^{n_{t},}}\overset{\overset{n_{t}}{}}{0^{n_{t},}}{\overset{\overset{n_{t}}{}}{\left. {\varphi_{t,1},\ldots \mspace{14mu},\varphi_{t,n_{t}}} \right)}}_{_{t}}\mspace{20mu} {for}\mspace{14mu} \left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}},\mspace{20mu} {c_{d + 1}:={g_{T}^{\zeta}m}},{c:={{\left( {\Gamma,c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},c_{d + 1}} \right).\mspace{20mu} {return}}\mspace{14mu} {c.}}}} \right.} & \left\lbrack {{Formula}\mspace{14mu} 207} \right\rbrack \end{matrix}$

$\begin{matrix} {{{Dec}\left( {{pk},{{sk}_{}:=\left( {,k_{0}^{*},k_{1}^{*},\ldots \mspace{14mu},k_{L}^{*}} \right)},{c:=\left( {\Gamma,c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},c_{d + 1}} \right)}} \right)}{{{{If}\mspace{14mu} }:={{\left( {M,\rho} \right)\mspace{14mu} {accepts}\mspace{14mu} \Gamma}:=\left\{ \left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \right\}}},{{then}\mspace{14mu} {compute}\mspace{14mu} I\mspace{11mu} {and}\mspace{14mu} \left\{ \alpha_{i} \right\}_{i \in I}{such}\mspace{14mu} {that}}}{{s_{0} = {\sum\limits_{i \in I}{\alpha_{i}s_{i}}}},{{{{and}\mspace{14mu} I} \subseteq {\left\{ {i \in \left\{ {1,\ldots \mspace{14mu},L} \right\}} \middle| {\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack {v\left\lbrack {{\rho (i)} = {{{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right)\bigwedge\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in {{{\Gamma\bigwedge{\overset{\rightarrow}{v}}_{i}} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}}} \right\rbrack}} \right\}.K}}:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}\; {e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}}}}}}\mspace{20mu} {m^{\prime} = {{c_{d + 1}/{K.\mspace{20mu} {return}}}\mspace{14mu} {m^{\prime}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 208} \right\rbrack \end{matrix}$

The method of implementing the cryptographic process and signature process in an additive group having a ring R as a coefficient has been indicated only for the Key-Policy functional encryption described in Embodiment 1. As a principle, if the process described as a field F_(q) in the above embodiments is replaced by a ring R, other cryptographic processes and signature processes described in the above embodiments can also be implemented in an additive group having a ring R as a coefficient.

The Setup algorithm in the above embodiments may be executed only once at the setup of the cryptographic processing system 10 or signature processing system 20, and need not be executed every time a decryption key is to be generated. In the above description, the Setup algorithm and the KeyGen algorithm are executed by the key generation device 100. Alternatively, the Setup algorithm and the KeyGen algorithm may be executed by different devices respectively.

In the above embodiments, the span program M̂ accepts the input sequence 8 if and only if linear combination of the rows of the matrix M_(δ) obtained from the matrix ̂ by the input sequence δ gives 1^(→). Alternatively, the span program M̂ may accept the input sequence δ only if another vector v^(→) is obtained instead of 1^(→).

In this case, in the KeyGen algorithm, s₀:=v^(→)·f^(→T) may be set instead of s₀:=1^(→)·f^(→T). Likewise, when calculating α_(i) in the Sig algorithm, α_(i) with which Σ_(iεI)α_(i)M_(i)=v^(→) may be calculated.

The cryptographic process in the above description can be adopted for authority delegation. Authority delegation means that a person having a decryption key generates a lower-level decryption key having weaker authority than the decryption key of his or her own. Weaker authority means that encrypted data that the decryption key can decrypt is limited.

For example, in the first hierarchical layer (highest order), bases B_(t) and B*_(t) for t=1 are used, in the second hierarchical layer, bases B, and B*_(t) for t=1, 2 are used, in the k-th hierarchical layer, bases B, and B*_(t) for t−1, . . . , k are used. As the bases B_(t) and B*_(t) to be used increase, a larger number of pieces of attribute information are set. Accordingly, authority of the decryption key is limited more.

The hardware configuration of the cryptographic processing system 10 (the key generation device 100, the encryption device 200, and the decryption device 300) and of the signature processing system 20 (the key generation device 100, the signature device 400, and the verification device 500) in the above embodiments will be described.

FIG. 22 is an illustration showing an example of the hardware configuration of each of the key generation device 100, encryption device 200, decryption device 300, signature device 400, and verification device 500.

As shown in FIG. 22, each of the key generation device 100, encryption device 200, decryption device 300, signature device 400, and verification device 500 includes a CPU 911 (also referred to as a Central Processing Unit, central processing device, processing device, computation device, microprocessor, microcomputer, or processor) which executes programs. The CPU 911 is connected to a ROM 913, a RAM 914, an LCD 901 (Liquid Crystal Display), the keyboard 902 (K/B), the communication board 915, and the magnetic disk device 920 via a bus 912, and controls these hardware devices. In place of the magnetic disk device 920 (fixed disk device), a storage device such as an optical disk device or memory card read/write device may be connected. The magnetic disk device 920 is connected via a predetermined fixed disk interface.

The ROM 913 and the magnetic disk device 920 are examples of a nonvolatile memory. The RAM 914 is an example of a volatile memory. The ROM 913, the RAM 914, and the magnetic disk device 920 are examples of the storage device (memory). The keyboard 902 and the communication board 915 are examples of an input device. The communication board 915 is an example of a communication device (network interface). Furthermore, the LCD 901 is an example of a display device.

The magnetic disk device 920, ROM 913, or the like stores an operating system 921 (OS), a window system 922, programs 923, and files 924. The CPU 911, the operating system 921, and the window system 922 execute each program of the programs 923.

The programs 923 store software and programs that execute the functions described as the “master key generation part 110”, “master key storage part 120”, “information input part 130”, “decryption key generation part 140”, “key distribution part 150”, “public parameter acquisition part 210”, “information input part 220”, “encrypted data generation part 230”, “data transmission part 240”, “decryption key acquisition part 310”, “data reception part 320”, “span program calculation part 330”, “complementary coefficient calculation part 340”, “pairing operation part 350”, “plaintext information calculation part 360”, “signature key acquisition part 410”, “information input part 420”, “complementary coefficient calculation part 430”, “signature generation part 450”, “data transmission part 460”, “public parameter acquisition part 510”, “data reception part 520”, “encrypted data generation part 530”, “pairing operation part 540”, and the like in the above description. The programs 923 store other programs as well. The programs are read and executed by the CPU 911.

The files 924 store information, data, signal values, variable values, and parameters such as the “public parameters pk”, “master key sk”, “encrypted data c”, “decryption key sk_(s)”, “decryption key sk_(Γ)”, “access structure S”, “attribute set Γ”, “message m”, “signature data sig”, and the like of the above explanation, as the items of a “file” and “database”. The “file” and “database” are stored in a recording medium such as a disk or memory. The information, data, signal values, variable values, and parameters stored in the recording medium such as the disk or memory are read out to the main memory or cache memory by the CPU 911 through a read/write circuit, and are used for the operations of the CPU 911 such as extraction, search, look-up, comparison, computation, calculation, process, output, print, and display. The information, data, signal values, variable values, and parameters are temporarily stored in the main memory, cache memory, buffer memory, or the like during the operations of the CPU 1911 including extraction, search, look-up, comparison, computation, calculation, process, output, print, and display.

The arrows of the flowcharts in the above explanation mainly indicate input/output of data and signals. The data and signal values are stored in the memory of the RAM 914, the recording medium such as an optical disk, or in an IC chip. The data and signals are transmitted online via a transmission medium such as the bus 912, signal lines, or cables, or electric waves.

The “part” in the above explanation may be a “circuit”, “device”, “equipment”, “means” or “function”; or a “step”, “procedure”, or “process”. The “device” may be a “circuit”, “equipment”, “means”, or “function”; or a “step”, “procedure”, or “process”. The “process” may be a “step”. Namely, the “part” may be implemented as firmware stored in the ROM 913. Alternatively, the “part” may be implemented by only software; by only hardware such as an element, a device, a substrate, or a wiring line; by a combination of software and hardware; or furthermore by a combination of software, hardware, and firmware. The firmware and software are stored, as programs, in the recording medium such as the ROM 913. The program is read by the CPU 911 and executed by the CPU 911. Namely, the program causes the computer to function as a “part” described above. Alternatively, the program causes the computer or the like to execute the procedure and method of the “part” described above.

REFERENCE SIGNS LIST

10: cryptographic processing system; 20: signature processing system; 100: key generation device; 110: master key generation part; 120: master key storage part; 130: information input part; 140: decryption key generation part; 141: f vector generation part; 142: s vector generation part; 143: random number generation part; 144: key element generation part; 145: confidential element generation part; 150: key distribution part; 160: signature key generation part; 161: random number generation part; 162: key element generation part; 200: encryption device; 210: public parameter acquisition part; 220: information input part; 230: encrypted data generation part; 231: random number generation part; 232: cryptographic element generation part; 233: f vector generation part; 234: s vector generation part; 240: data transmission part; 300: decryption device; 310: decryption key acquisition part; 320: data reception part; 330: span program calculation part; 340: complementary coefficient calculation part; 350: pairing operation part; 360: plaintext information calculation part; 400: signature device; 410: signature key acquisition part; 420: information input part; 430: complementary coefficient calculation part; 440: matrix generation part; 450: signature generation part; 451: random number generation part; 452: signature element generation part; 460: data transmission part; 500: verification device; 510: public parameter acquisition part; 520: data reception part; 530: encrypted data generation part; 540; pairing operation part; 531: random number generation part; 532: cryptographic element generation part; 533: f vector generation part; 534: s vector generation part 

1. A cryptographic processing system comprising a key generation device, an encryption device, and a decryption device, and serving to execute a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), wherein the key generation device includes a first information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which variable ρ(i) is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′))(i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and a predetermined matrix M having L rows and r columns (r is an integer of 1 or more), and a decryption key generation part which generates an element k*₀, and an element k*_(i) for each integer i=1 . . . , L, based on a column vector s^(→T):=(S₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) and a vector each having r pieces of elements, and the matrix M inputted by the first information input part; a value s₀:=w^(→)·f^(→); and a predetermined value θ_(i) (i=1, . . . , L), the decryption key generation part being configured to generate the element k*₀ by setting a value −s₀ as a coefficient for a basis vector b*_(0,p) (p is a predetermined value) of the basis B*₀ and by setting a predetermined value κ as a coefficient for a basis vector b*_(0,q) (q is a predetermined value different from prescribed p), and to generate the element k*_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b*_(t,1) of the basis B*_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b*_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector b*_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t), wherein the encryption device includes a second information input part which takes as input, an attribute set Γ having the identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, and an encrypted data generation part which generates an element c₀, and an element c_(t) concerning each identification information t included in the attribute set Γ, based on the attribute set Γ inputted by the second information input part, the encrypted data generation part being configured to generate the element c₀ where a random value δ is set as a coefficient for a basis vector b_(0,p) (p is prescribed p) of a basis B₀, and where a predetermined value ζ is set as a coefficient for a basis vector b_(0,q) (q is prescribed q) of a basis B₀, and to generate the element c_(t) where x_(t,i′) multiplied by the random value δ is set as a coefficient for a basis vector b_(t,i′) (i=1, . . . , n_(t)) of the basis B_(t) for each identification information t included in the attribute set Γ, and wherein the decryption device includes a data acquisition part which acquires encrypted data c including the elements c₀ and c_(t) and the attribute set Γ, the elements c₀ and c_(t) being generated by the encrypted data generation part, a decryption key acquisition part which acquires a decryption key sk_(s), including the elements k*₀ and k*_(i) and the variable number ρ(i), the elements k*₀ and k*_(i) being generated by the decryption key generation part, a complementary coefficient calculation part which, based on the attribute set Γ included in the encrypted data c acquired by the data acquisition part, and the variable ρ(i) included in the decryption key sk_(s), acquired by the decryption key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the positive tuple and x^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)s_(i) for i included in the set I specified becomes s₀, and a pairing operation part which calculates a value K=g_(T) ^(ζχ) by conducting a pairing operation indicated in Formula 1 for the elements c₀ and c_(t) included in the encrypted data c and the elements k*₀ and k*_(i) included in the decryption key sk_(s), based on the set I specified by the complementary coefficient calculation part and on the complementary coefficient α_(i) calculated by the complementary coefficient calculation part. $\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{i}})}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 1} \right\rbrack \end{matrix}$
 2. The cryptographic processing system according to claim 1, which executes the cryptographic process using the basis B₀ having at least a basis vector b_(0,i) (i=1, . . . , 5), the basis B_(t) (t=1, . . . , d) having at least a basis vector b_(t,i) (i=1, . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)+z_(t)) (u_(t), w_(t), and z_(t) are each an integer of 1 or more), the basis B*₀ having at least a basis vector b*_(0,i) (i=1, . . . , 5), and the basis B*_(t) (t=1, . . . , d) having at least a basis vector b*_(t,i) (i=1 . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)z_(t)), wherein the decryption key generation part of the key generation device generates the element k*₀ indicated in Formula 2 based on a random value η₀ and the predetermined value κ, generates the element k*_(i) indicated in Formula 3 based on the random value θ_(i) (i=1, . . . , L) and a random value η_(i,i′) (i=1, . . . , L, i′=1, . . . , w_(t)) when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), and generates the element k*_(i) indicated in Formula 4 based on the random value η_(i,i′) (i=1, . . . , L, i′=1, . . . , w_(t)) when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), and wherein the encrypted data generation part of the encryption device generates the element c₀ indicated in Formula 5 based on the random value δ, a random value φ₀, and a predetermined value ζ, and generates the element c_(t) indicated in Formula 6 based on the random value δ and a random value  _(t,i) (i=1, . . . , z_(t)). $\begin{matrix} {\mspace{79mu} {k_{0}^{*}:=\left( {{- s_{0}},0,\kappa,\eta_{0},0} \right)_{B_{0}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 2} \right\rbrack \\ {{k_{i}^{*}:=\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}}} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{\eta_{i,1},\ldots \;,\eta_{i,w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {0^{z_{t}},} \right)}}_{B_{t}^{*}}} & \left\lbrack {{Formula}\mspace{14mu} 3} \right\rbrack \\ {\mspace{76mu} {{k_{i}^{*}:=\overset{\overset{n_{t}}{}}{\left( {s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{\eta_{i,1},\ldots \;,\eta_{i,w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {0^{z_{t}},} \right)}}_{B_{t}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 4} \right\rbrack \\ {\mspace{76mu} {c_{0}:=\left( {\delta,0,\zeta,0,\varphi_{0}} \right)_{B_{0}}}} & \left\lbrack {{Formula}\mspace{14mu} 5} \right\rbrack \\ {{c_{t}:=\overset{\overset{n_{t}}{}}{\left( {\delta \left( {x_{t,1},\ldots \;,t_{t,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{0^{w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {\varphi_{t,1},\ldots \;,\varphi_{t,z_{t}},} \right)}}_{B_{t}}} & \left\lbrack {{Formula}\mspace{14mu} 6} \right\rbrack \end{matrix}$
 3. A key generation device which generates a decryption key sk_(s), in a cryptographic processing system which executes a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), the key generation device comprising: a first information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i) :=(i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and a predetermined matrix M having L rows and r columns (r is an integer of 1 or more); a decryption key generation part which generates an element k*₀, and an element k*_(i) for each integer i=1 . . . , L, based on a column vector s^(→T):=s₁, . . . , L)^(T):=M·f^(→T) generated based on a vector f^(→) and a vector w^(→), each having r pieces of elements, and the matrix M inputted by the first information input part; a value s₀:=w^(→)·f⁴³ ; and a predetermined value θ_(i) (i=1, . . . , L), the decryption key generation part being configured to generate the element k*₀ by setting a value −s₀ as a coefficient for a basis vector b*_(0,p) (p is a predetermined value) of the basis B*₀ and by setting a predetermined value κ as a coefficient for the basis vector b*_(0,q) (q is a predetermined value different from prescribed p), and to generate the element k*_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b*_(t,1) of the basis B*_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b*_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector b*_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t); and a key distribution part which distributes data including the variable ρ(i) inputted by the first information input part and the elements k*₀ and k*_(i) generated by the decryption key generation part, as the decryption key sk_(s).
 4. An encryption device which generates encrypted data c in a cryptographic processing system which executes a cryptographic encryption process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (1 is an integer of 1 or more), the encryption device comprising: a second information input part which takes as input, an attribute set Γ having the identification information t and an attribute vector x^(→) _(t):=(i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d; an encrypted data generation part which generates an element c₀, and an element c_(t) concerning each identification information t included in the attribute set Γ, based on the attribute set Γ inputted by the second information input part, the encrypted data generation part being configured to generate the element c₀ where a random value δ is set as a coefficient for a basis vector b_(0,p) (p is prescribed p) of a basis B₀, and where a predetermined value ζ is set as a coefficient for a basis vector b_(0,q) (q is prescribed q) of a basis B₀, and to generate the element c_(t) where x_(t,i′) multiplied by the random value δ is set as a coefficient for a basis vector b_(t, i′) (i′=1, . . . , n_(t)) of the basis B_(t) for each identification information t included in the attribute set; and a data output part which outputs the attribute set Γ inputted by the second information input part and the elements c₀ and c_(t) generated by the encrypted data generation part, as the encrypted data c.
 5. A decryption device which decrypts encrypted data c with a decryption key sk_(s) in a cryptographic processing system which executes a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), the decryption device comprising: a data acquisition part which acquires an element c₀ and an element c_(t) (each integer included in the attribute set Γ) generated based on an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, together with the attribute set Γ, as the encrypted data c, the element c₀ being set with a random value δ as a coefficient for a basis vector b_(0,p) (p is a predetermined value) of a basis B₀ and being set with a predetermined value ζ as a coefficient for a basis vector b_(0,q) (q is a predetermined value different from prescribed p) of the basis B₀, the element c_(t) being set with x_(t,i′) multiplied by the random value δ, as a coefficient for a basis vector b_(t, i′) (i′=1, . . . , n_(t)) of a basis B_(t) for each identification information t included in the attribute set Γ; a decryption key acquisition part which acquires an element k*₀ and an element k*_(i) (each integer i=1 . . . , L) generated based on a column vector s^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) and a vector w^(→) each having r (r is an integer of 1 or more) pieces of elements, and a predetermined matrix M having L rows and r columns; a value s₀:=w^(→)·f^(→); a predetermined value θ_(i) (i=1, . . . , L); and a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), together with the variable ρ(i), the variable ρ(i) being either one of a positive tuple (t, v^(→) _(i))) and a negative tuple

(t, v^(→) _(i)), of the identification information t (t is any integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t), n_(t) is an integer of 1 or more), as the decryption key sk_(s), the element k*₀ being set with the value −s₀ as a coefficient for a basis vector b*_(0,p) (p is prescribed p) of a basis B*₀ and being set with a predetermined value κ as a coefficient for the basis vector b*_(0,q) (q is prescribed q) of the basis B*₀, and the element k*_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), being set with s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b*_(t,1) of the basis B*_(t) indicated by identification information t of the positive tuple, and being set with θ_(i)v_(i,i′) as a coefficient of a basis vector b*_(t,i′) indicated by the identification information t and by each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), being set with s_(i)v_(i,i′) as a coefficient for the basis vector b*_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t); a complementary coefficient calculation part which, based on the attribute set Γ included in the encrypted data c acquired by the data acquisition part, and the variable ρ(i) included in the decryption key sk_(s) acquired by the decryption key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the positive tuple and x^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)s_(i) for i included in the set I specified becomes s₀; and a pairing operation part which calculates a value K=g_(T) ^(ζχ) by conducting a pairing operation indicated in Formula 7 for the elements c₀ and c_(t) included in the encrypted data c and the elements k*₀ and k*_(i) included in the decryption key sk_(s), based on the set I specified by the complementary coefficient calculation part and on the complementary coefficient α_(i) calculated by the complementary coefficient calculation part. $\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{i}})}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 7} \right\rbrack \end{matrix}$
 6. A cryptographic processing system comprising a key generation device, an encryption device, and a decryption device, and serving to execute a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), wherein the key generation device includes a first information input part which takes as input, an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, and a decryption key generation part which generates an element k*₀, and an element k*_(t) concerning each identification information t included in the attribute set Γ, based on the attribute set Γ inputted by the first information input part, the decryption key generation part being configured to generate the element k*₀ where a random value δ is set as a coefficient for a basis vector b*_(0,p) (p is a predetermined value) of a basis B*₀, and where a predetermined value κ is set as a coefficient for a basis vector b*_(0,q) (q is a predetermined value different from prescribed p), and to generate the element k*_(t) where x_(t,i′) multiplied by the random value δ is set as a coefficient for a basis vector b*_(t,i′) (i=1, . . . , n_(t)) of the basis B*_(t), for each identification information t included in the attribute set Γ, wherein the encryption device includes a second information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and a predetermined matrix M having L rows and r columns (r is an integer of 1 or more), and a encrypted data generation part which generates an element c₀, and an element c_(i) for each integer i=1 . . . , L, based on a column vector s^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) and a vector w^(→) each having r pieces of elements, and the matrix M inputted by the second information input part; a value s₀:=w^(→)·f^(→); and a predetermined value θ_(i) (i=1, . . . , L), the encrypted data generation part being configured to generate the element c₀ by setting the value −s₀ as a coefficient for a basis vector b_(0,p) (p is prescribed p) of the basis B₀ and by setting a predetermined value as a coefficient for the basis vector b_(0,q) (q is prescribed q), and to generate the element c_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b_(t,1) of the basis B_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector b_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t), and wherein the decryption device includes a data acquisition part which acquires encrypted data c including the elements c₀ and c_(t) and the variable ρ(i), the elements c₀ and c_(t) being generated by the encrypted data generation part, a decryption key acquisition part which acquires the decryption key sk_(Γ) including the elements k*₀ and k*_(i) and the attribute set Γ, the elements k*₀ and k*_(i) being generated by the decryption key generation part, a complementary coefficient calculation part which, based on the variable ρ(i) concerning each integer i=1, . . . , L included in the encrypted data c acquired by the data acquisition part and the attribute set Γ included in the decryption key sk_(Γ) acquired by the decryption key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i))) and with which an inner-product of the positive tuple and x^(→) _(t) included in Γ indicated by the identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by the identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)s_(i) for i included in the set I specified becomes s₀, and a pairing operation part which calculates a value K=g_(T) ^(ζχ) by conducting a pairing operation indicated in Formula 8 for the elements c₀ and c_(t) included in the encrypted data c and the elements k*₀ and k*_(i) included in the decryption key sk_(Γ), based on the set I specified by the complementary coefficient calculation part and the complementary coefficient α_(i) calculated by the complementary coefficient calculation part. $\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 8} \right\rbrack \end{matrix}$
 7. The cryptographic processing system according to claim 6, which executes the cryptographic process using the basis B₀ having at least a basis vector b_(0,i) (i=1, . . . , 5), the basis B_(t) (t=1, . . . , d) having at least a basis vector b_(t,i) (i=1, . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)+z_(t)) (u_(t), w_(t), and z_(t) are each an integer of 1 or more), the basis B*₀ having at least a basis vector b*_(0,i) (i=1, . . . , 5), and the basis B*_(t) (t=1, . . . , d) having at least a basis vector b*_(t,i) (i=1, . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)+z_(t)), wherein the decryption key generation part of the key generation device generates the element k*₀ indicated in Formula 9 based on the random value δ, a random value φ₀, and the predetermined value κ, and generates the element k*_(t) indicated in Formula 10 based on the random values δ and φ_(t,i) (i=1, . . . , w_(t)), and wherein the encrypted data generation part of the encryption device generates the element c₀ indicated in Formula 11 based on a random value η₀ and a predetermined value ζ, generates an element c_(i) indicated in Formula 12 based on a random value θ_(i) (i=1, . . . , L) and a random value η_(i,i′) (i=1, . . . , L, i′=1, . . . , z_(t)) when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), and generates an element c_(i) indicated in Formula 13 based on the random value η_(i,i′) (i=1, . . . , L, i′=1, . . . , z_(t)) when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)). $\begin{matrix} {\mspace{79mu} {k_{0}^{*}:=\left( {\delta,0,\kappa,\varphi_{0},0} \right)_{B_{0}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 9} \right\rbrack \\ {\mspace{79mu} {{k_{t}^{*}:=\overset{\overset{n_{t}}{}}{\left( {\delta \left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{\varphi_{t,1},\ldots \;,\varphi_{t,w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {0^{z_{t}},} \right)}}_{B_{t}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 10} \right\rbrack \\ {\mspace{79mu} {c_{0}:=\left( {{- s_{0}},0,\zeta,0,\eta_{0}} \right)_{B_{0}}}} & \left\lbrack {{Formula}\mspace{14mu} 11} \right\rbrack \\ {{c_{i}:=\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}}} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{0^{w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{B_{t}}} & \left\lbrack {{Formula}\mspace{14mu} 12} \right\rbrack \\ {\mspace{76mu} {{c_{i}:=\overset{\overset{n_{t}}{}}{\left( {s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{0^{w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{B_{t}}}} & \left\lbrack {{Formula}\mspace{14mu} 13} \right\rbrack \end{matrix}$
 8. A key generation device which generates a decryption key sk_(Γ) in a cryptographic processing system which executes a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), the key generation device comprising: a first information input part which takes as input, an attribute set IT having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′))(i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d; a decryption key generation part which generates an element k*₀, and an element k*_(t) concerning each identification information t included in the attribute set Γ, based on the attribute set Γ inputted by the first information input part, the decryption key generation part being configured to generate the element k*₀ where a random value δ is set as a coefficient for a basis vector b*_(0,p) (p is a predetermined value) of a basis B*₀, and where a predetermined value κ is set as a coefficient for a basis vector b*_(0,q) (q is a predetermined value different from prescribed p), and to generate the element k*_(t) where x_(t,i′) multiplied by the random value δ is set as a coefficient for a basis vector b*_(t,i′) (i′=1, . . . , n_(t)) of the basis B*_(t), for each identification information t included in the attribute set Γ; and a key distribution part which distributes data including the attribute set Γ inputted by the first information input part and the elements k*₀ and k*_(i) generated by the decryption key generation part, as the decryption key sk_(s).
 9. An encryption device which generates encrypted data c in a cryptographic processing system which executes a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), the encryption device comprising: a second information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and a predetermined matrix M having L rows and r columns (r is an integer of 1 or more); an encrypted data generation part which generates an element c₀, and an element c_(i) for each integer i=1 . . . , L, based on a column vector s^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(÷) and a vector w^(→) each having r pieces of elements, and the matrix M inputted by the second information input part; a value s₀:=w^(→)·f^(→); and a predetermined value θ(i=1, . . . , L), the encrypted data generation part being configured to generate the element c₀ by setting a value −s₀ as a coefficient for a basis vector b*_(0,p) (p is prescribed p) of a basis B₀ and by setting a predetermined value ζ as a coefficient for a basis vector b_(0,q) (q is prescribed q), and to generate the element c_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b_(t,1) of the basis B_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector b_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t); and a data output part which outputs the variable ρ(i) inputted by the second information input part and the elements c₀ and c_(t) generated by the encrypted data generation part, as the encrypted data c.
 10. A decryption device which decrypts encrypted data c with a decryption key sk_(Γ) in a cryptographic processing system which executes a cryptographic process using a basis B_(t) and a basis B*_(t) for each integer t=0, . . . , d (d is an integer of 1 or more), the decryption device comprising: a data acquisition part which acquires an element c₀ and an element c_(t) (for each integer i=1 . . . , L) generated based on a column vector s^(→T):=(S₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) and a vector w^(→) each having r (r is an integer of 1 or more) pieces of elements, and a predetermined matrix M having L rows and r columns; a value s₀:=w^(→)·f^(→); a predetermined value θ_(i) (i=1, . . . , L); and a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), together with the variable ρ(i), the variable ρ(i) being either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)), of identification information t (t is any integer of t=1, . . . , d) and an attribute vector v′_(t):=(v_(i,i′)) (i′=1, . . . , n_(t), n_(t) is an integer of 1 or more), as the encrypted data c, the element c₀ being set with a value −s₀ as a coefficient for a basis vector b_(0,p) (p is a predetermined value) of a basis B₀ and being set with a predetermined value ζ as a coefficient for a basis vector b_(0,q) (q is a predetermined value different from prescribed p) of the basis B₀, and the element c_(i) for each integer i=1, . . . , L, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)) being set with s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b_(t,1) of the basis B_(t) indicated by identification information t of the positive tuple, and being set with θ_(i)v_(i,i′) as a coefficient for a basis vector N_(t,i′) indicated by the identification information t and by each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(y, v^(→) _(i)), being set with as a coefficient for the basis vector b_(t,i′) indicated by the identification information t of the negative tuple and by each integer i′=1, . . . , n_(t); a decryption key acquisition part which acquires an element k*₀ generated based on an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, and an element k*_(t) (t is each integer included in the attribute set Γ), as the decryption key sk_(Γ) together with the attribute set Γ, the element k*₀ being set with a random value δ as a coefficient for a basis vector b*_(0,p) (p is prescribed p) of a basis B*₀ and being set with a predetermined value κ as a coefficient for a basis vector b*_(0,q) (q is prescribed q) of the basis B*₀, the element k*_(t) being set with x_(t,i′) multiplied by the random value δ, as a coefficient for a basis vector b*_(t, i′) (i′=1, . . . , n_(t)) of a basis B*_(t), for each identification information t included in the attribute set Γ; a complementary coefficient calculation part which, based on the variable ρ(i) included in the encrypted data c acquired by the data acquisition part, and the attribute set Γ included in the decryption key sk_(s) acquired by the decryption key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of the positive tuple and v^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)s_(i) for i included in the set I specified becomes s₀; and a pairing operation part which calculates a value K=g_(T) ^(ζχ) by conducting a pairing operation indicated in Formula 14 for the elements c₀ and c_(t) included in the encrypted data c and the elements k*₀ and k*_(i) included in the decryption key sk_(s), based on the set I specified by the complementary coefficient calculation part and the complementary coefficient α_(i) calculated by the complementary coefficient calculation part. $\begin{matrix} {K:={{e\left( {c_{0},k_{0}^{*}} \right)} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}^{\;}\; {{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot {\prod\limits_{{i \in {I\bigwedge{\rho {(i)}}}} = {{({t,{\overset{\rightarrow}{v}}_{i}})}}}^{\;}{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}/{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{i}})}}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 14} \right\rbrack \end{matrix}$
 11. A signature processing system comprising a key generation device, a signature device, and a verification device, and serving to execute a signature process using a basis B_(t) and a basis B*_(t) for each integer t=1, . . . , d, d+2 (d is an integer of 1 or more), wherein the key generation device includes a first information input part which takes as input, an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d, and a signature key generation part which generates an element k*_(t) concerning each identification information t included in the attribute set Γ, and an element k*_(d+2) and an element k*_(d+3) based on the attribute set Γ inputted by the first information input part, the signature key generation part being configured to generate the element k*_(t) where x_(t,i′) multiplied by a random value δ is set as a coefficient for a basis vector b*_(t,i′) (i′=1, . . . , n_(t)) of the basis B*_(t), for each identification information t included in the attribute set Γ, to generate the element k*_(d+2) where the random value δ is set as a coefficient for a basis vector b*_(d+2,p′) (p′ is a predetermined value) of a basis B*_(d+2), and to generate the element k*_(d+3) where the random value δ is set as a coefficient for a basis vector b*_(d+2,q′) (q′ is a predetermined value different from prescribed p′) of the basis B*_(d+2), wherein the signature device includes a second information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v_(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), a predetermined matrix M having L rows and r columns (r is an integer of 1 or more), and a message m, a signature key acquisition part which acquires the elements k*_(t), k*_(d+2), and k*_(d+3) generated by the signature key generation part, and the attribute set Γ, as a signature key sk_(Γ), a complementary coefficient calculation part which, based on the variable ρ(i) for each integer i=1, . . . , L and the attribute set Γ included in the signature key sk_(Γ) acquired by the signature key acquisition part, specifies, among integers i=1, . . . , L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the positive tuple and x^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by the identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)M_(i) for i included in the set I specified, based on M_(i) which is an element on an i-th row of the matrix M inputted by the second information input part, becomes a predetermined vector w^(→), and a signature generation part which, based on the variable ρ(i), the attribute set Γ, the set I specified by the complementary coefficient calculation part, and the complementary coefficient α_(i) calculated by the complementary coefficient calculation part, generates s*_(i) for each integer i=1, . . . , L representing each row number of the matrix M, and s*_(x), as indicated in Formula 15, where β_(i) is a value with which every element becomes 0 when B_(i)M_(i) is totaled for each integer i representing each row number of the matrix M, and for each integer i representing each row number of the matrix M, when iεI is established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=α_(i), and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i)) is 0 and y_(i,1)=1, when iεI is established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=α_(i)/(v^(→) _(i)·x^(→) _(t)), and let a vector y^(→):=(y_(i,t)):=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 1, when iεI is not established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(y_(i,t))(t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 0 and y_(i,1)=1, and when iεI is not established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 1, and wherein the verification device includes a data acquisition part which acquires signature data sig including s*_(i) and s*_(x) generated by the signature generation part, the message m, the variable ρ(i), and the matrix M, an encrypted data generation part which generates an element c_(i) and an element c_(x), the element c_(i) being generated for each integer i representing a row number of the matrix M, based on a column vector s^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) having r pieces of elements, the vector w^(→), and the matrix M acquired by the data acquisition part; a value s₀=w^(→·f) ^(→T); and a predetermined value θ_(i) (i is each row number of the matrix M, and X), the encrypted data generation part being configured to generate the element c_(i) for each integer i=1 representing a row number of the matrix M, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b_(t,i) of the basis B_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting s_(i)v_(i,i′) as a coefficient for the basis vector b_(t,i′) indicated by the identification information t of the negative tuple and each integer i′=1, . . . , n_(t), and to generate the element c_(x) by setting s₀−θ_(x)m in a basis vector b_(d+2,p′) (′p is prescribed p′) of a basis vector B_(d+2) and by setting θ_(x) in a basis vector b_(d+2,q′) (′q is prescribed q′) of the basis vector B_(d+2), and a pairing operation part which verifies validity of the signature data sig by performing a pairing operation indicated in Formula 16 for each integer i indicating X and a row number of the matrix M. s _(i)*:=γ_(i) ·ξk _(t)*+β_(i)·(Σ_(t=1) ^(n) ^(t) y _(i,t) ·b _(t,t)*)+r _(i)* s _(X)*:=ξ(k _(d+2) *+m·k _(d+3)*)+r _(X)*  [Formula 15] where ξ, r_(i)*, and r_(X)* are predetermined values. Πe(c _(i) ,s _(i)*)  [Formula 16]
 12. The signature processing system according to claim 11, which executes the signature process using a basis B₀ having at least a basis vector b_(0,i) (i=1, . . . , 4), a basis B_(t) (t=1, . . . , d) having at least a basis vector b_(t,i) (i=1, . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)+z_(t)) (u_(t), w_(t), and z_(t) are each an integer of 1 or more), a basis B_(d+1) having at least a basis vector b_(d+1,i) (i=1, . . . , 4), a basis B_(d+2) having at least a basis vector b_(d+2,i) (i=1, . . . , 8), a basis B*₀ having at least a basis vector b*_(0,i) (i=1, . . . , 4), a basis B*_(t) (t=1, . . . , d) having at least a basis vector b*_(t,i) (i=1, . . . , n_(t), . . . , n_(t)+u_(t), . . . , n_(t)+u_(t)+w_(t), . . . , n_(t)+u_(t)+w_(t)+z_(t)), a basis B^(*) _(d+1) having at least a basis vector b*_(d+1,i) (i=1, . . . , 4), and the basis B^(*) _(d+2) having at least a basis vector b*_(d+2,i) (i=1, . . . , 8), wherein the signature key generation part of the key generation device generates an element k*₀, an element k*_(t), an element k*_(d+2), and an element k*_(d+3), for each identification information t included in the attribute set Γ and each integer t=1, . . . , . . . , w_(t), based on random values δ, φ₀, φ_(t,t)φ_(d+2,1),φ_(d+2,2), φ_(d+3,1), and φ_(d+)3,2, as indicated in Formula 17, wherein the signature device further includes a matrix generation part which adds a predetermined row vector M_(L+1) to an (L+1)th row of the matrix M, wherein the signature generation part of the signature device generates s*_(i) for each integer i=1, . . . , L+1, and s*₀ and s*_(L+2) as s*_(x), based on the elements k*₀, k*_(t), k*_(d+2), and k*_(d+3), and the random value 4, as indicated in Formula 18, wherein the encrypted data generation part of the verification device generates an element c_(i), and elements c₀ and c_(L+2) as an element c_(x), for each integer i=1, . . . , L+1 and each integer i′=1, . . . , z_(t), based on random values θ_(i), η_(i,i′), η_(L+2,1), and η_(L+2,2), as indicated in Formula 19, and wherein the pairing operation part performs the pairing operation for each integer i=0, . . . , L+2. $\begin{matrix} {\mspace{79mu} {{k_{0}^{*}:=\left( {\delta,0,\varphi_{0},0} \right)_{B_{0}^{*}}}{{k_{t}^{*}:=\overset{\overset{n_{t}}{}}{\left( {\delta \left( {x_{t,1},\ldots \;,x_{t,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{\varphi_{t,1},\ldots \;,\varphi_{t,w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {0^{z_{t}},} \right)}}_{B_{t}^{*}}}\mspace{79mu} {k_{d + 2}^{*}:={\left( {{\delta \left( {1,0} \right)},0,0,\varphi_{{d + 2},1},\varphi_{{d + 2},2},0,0} \right)B_{d + 2}^{*}}}\mspace{79mu} {k_{d + 3}^{*}:={\left( {{\delta \left( {0,1} \right)},0,0,\varphi_{{d + 3},1},\varphi_{{d + 3},2},0,0} \right)B_{d + 2}^{*}}}}} & \left\lbrack {{Formula}\mspace{14mu} 17} \right\rbrack \end{matrix}$ s ₀ *:=ξk ₀ *+r ₀* s _(i)*:=γ_(i) ·ξk _(t)*+β_(i)·(Σ_(t=1) ^(n) ^(t) y _(i,t) ·b _(t,t)*)+r _(i)* s _(L+2)*:=ξ(k _(d+2) *+m·k _(d+3)*)+r _(L+2)*  [Formula 4-9 18] where ξ, r₀*, r_(i)* and r_(L+2)* are predetermined values. $\begin{matrix} {\mspace{79mu} {{c_{0}:=\left( {{{- s_{0}} - s_{L + 2}},0,0,\eta_{0}} \right)_{B_{0}}}{{{{if}\mspace{14mu} {\rho ()}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in F_{q}^{n_{t}}}}} \right)},\eta_{i,1},\ldots \;,{\eta_{i,z_{t}}\overset{\mspace{14mu} U\mspace{14mu}}{\leftarrow}F_{q}},{c_{i}:=\overset{\overset{n_{t}}{}}{\left( {{s_{i} + {\theta_{i}v_{i,1}}},{\theta_{i}v_{i,2}},\ldots \;,{\theta_{i}v_{i,n_{t}}}} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{0^{w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{B_{t}},{{{if}\mspace{14mu} {\rho ()}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right) \in F_{q}^{n_{t}}}}} \right)}},\eta_{i,1},\ldots \;,{\eta_{i,z_{t}}\overset{\mspace{14mu} U\mspace{11mu}}{\leftarrow}F_{q}},\mspace{79mu} {c_{i}:=\overset{\overset{n_{t}}{}}{\left( {s_{i}\left( {v_{i,1},\ldots \;,v_{i,n_{t}}} \right)} \right.}},\overset{\overset{u_{t}}{}}{0^{u_{t}}},\overset{\overset{w_{t}}{}}{0^{w_{t}}},{\overset{\overset{z_{t}}{}}{\left. {\eta_{i,1},\ldots \;,\eta_{i,z_{t}},} \right)}}_{B_{t}},{c_{L + 2}:=\left( {{s_{L + 2} - {\theta_{L + 2}m}},\theta_{L + 2},0,0,0,0,\eta_{{L + 2},1},\eta_{{L + 2},2}} \right)_{B_{d + 2}}}}}} & \left\lbrack {{Formula}\mspace{14mu} 19} \right\rbrack \end{matrix}$
 13. A key generation device which generates a signature key sk_(Γ) in a signature processing system which executes a signature process using a basis B_(t) and a basis B*_(t) for each integer t=1, . . . , d, d+2 (d is an integer of 1 or more), the key generation device comprising: a first information input part which takes as input, an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) for at least one integer t=1, . . . , d; a signature key generation part which generates an element k*_(t), an element k*_(d+2), and an element k*_(d+3) based on the attribute set Γ inputted by the first information input part, the element k*_(t) concerning each identification information t included in the attribute set Γ, the signature key generation part being configured to generate the element k*_(t) where x_(t,i′) multiplied by the random value δ is set as a coefficient for a basis vector b*_(t, i′) (i′=1, . . . , n_(t)) of a basis B*_(t), for each identification information t included in the attribute set Γ, to generate the element k*_(t+2) where the random value δ is set as a coefficient for a basis vector b*_(d+2,p′) (p′ is a predetermined value) of a basis B*_(d+2), and to generate the element k*_(d+3) where the random value δ is set as a coefficient for a basis vector b*_(d+2,q′) (q′ is a predetermined value different from prescribed p′) of the basis B*_(d+2); and a key distribution part which distributes data including the attribute set Γ inputted by the information input part and the elements k*_(t), k*_(d+2), and k*_(d+3), as the signature key sk_(Γ).
 14. A signature device which generates signature data sig in a signature processing system which executes a signature process using a basis B_(t) and a basis B*_(t) for each integer t=1, . . . , d, d+2 (d is an integer of 1 or more), the signature device comprising: a second information input part which takes as input, a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more), a predetermined matrix M having L rows and r columns (r is an integer of 1 or more), and a message m; a signature key acquisition part which acquires an element k*_(t), an element k*_(d+2), and an element k*_(d+3) generated for at least one integer t=1, . . . , d, based on an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) (t is each identification information included in the attribute set Γ), together with the attribute set Γ, as a signature key sk_(Γ), the signature key acquisition part being configured to generate the element k*_(t) being set with x_(t,i′) multiplied by the random value δ as a coefficient for a basis vector b*_(t,i′) (i′=1, . . . , n_(t)) of a basis B*_(t), for each identification information t included in the attribute set Γ, to generate the element k*_(d+2) being set with the random value δ as a coefficient for a basis vector b*_(d+2,p′) (p′ is a predetermined value) of a basis B*_(d+2), and to generate the element k*_(d+3) being set with the random value δ as a coefficient for a basis vector b*_(d+2,q′) (q′ is a predetermined value different from prescribed p′) of the basis B*_(d+2); a complementary coefficient calculation part which, based on the variable ρ(i) for each integer i=1, . . . , L and the attribute set Γ included in the signature key sk_(Γ) acquired by the signature key acquisition part, specifies, among integers i=1, L, a set I of an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the positive tuple and x^(→) _(t) included in Γ indicated by identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of v^(→) _(i) of the negative tuple and x^(→) _(t) included in Γ indicated by the identification information t of the negative tuple does not become 0; and calculates a complementary coefficient α_(i) with which a total of α_(i)M_(i) for i included in the set I specified, based on M_(i) which is an element on an i-th row of the matrix M inputted by the second information input part, becomes a predetermined vector w^(→); a signature generation part which, based on the variable ρ(i), the attribute set Γ, the set I specified by the complementary coefficient calculation part, and the complementary coefficient α_(i) calculated by the complementary coefficient calculation part, generates s*_(i) for each integer i representing each row number of the matrix M, and s*_(x), as indicated in Formula 20, where β_(i) is a value with which every element becomes 0 when β_(i)M_(i) is totaled for each integer i representing each row number of the matrix M, and for each integer i representing each row number of the matrix M, when iεI is established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=α_(i), and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 0 and y_(i,)=1, when iεI is established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=α_(i)/(v^(→) _(i)·x^(→) _(t)), and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 1, when iεI is not established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 0 and y_(i,1)=1, and when iεI is not established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of and is 1; and a data output part which outputs data including the variable ρ(i), the matrix M, and the message m which are inputted by the information input part, and s*₀, s*_(i), and s*_(x) generated by the signature generation part, as signature data sig. s _(i)*:=γ_(i) ·ξk _(t)*+β_(i)·(Σ_(t=1) ^(n) ^(t) y _(i,t) ·b _(t,t)*)+r _(i)* s _(X*):=ξ(k _(d+2) *+m·k _(d+3)*)+r _(X)*  [Formula 20] where ξ, r_(i)*, and r_(X)* are predetermined values.
 15. A verification device which verifies signature data sig in a signature processing system which executes a signature process using a basis B_(t) and a basis B*_(t) for each integer t=1, . . . , d, d+2 (d is an integer of 1 or more), the verification device comprising: a data acquisition part which acquires the signature data sig including s*_(i), s*_(x), a message m, a variable number ρ(i), and a matrix M, out of: elements k*_(t), k*_(d+2), k*_(d+3); a set I and a complementary coefficient α_(i); and S*_(i) and S*_(x); wherein the elements k*_(t), k*_(d+2), and k*_(d+3) are generated for at least one integer t=1, . . . , d, based on an attribute set Γ having identification information t and an attribute vector x^(→) _(t):=(x_(t,i′)) (i′=1, . . . , n_(t) where n_(t) is an integer of 1 or more) (t is each identification information included in the attribute set Γ), the element k*_(t) being set with x_(t,i′) multiplied by the random value δ, as a coefficient for a basis vector b*_(t, i′) (i′=1, . . . , n_(t)) of a basis B*_(t), for each identification information t included in the attribute set Γ, the element k*_(d+2) being set with the random value δ, as a coefficient for a basis vector b*_(d+2,p′) (p′ is a predetermined value) of a basis B^(*) _(d+2), and the element k*_(d+3) being set with the random value δ, as a coefficient for a basis vector b*_(d+2,q′) (q′ is a predetermined value different from prescribed p′) of the basis B^(*) _(d+2), wherein the set I and the complementary coefficient α_(i) are calculated based on a variable ρ(i) for each integer i=1, . . . , L (L is an integer of 1 or more), which is either one of a positive tuple (t, v^(→) _(i)) and a negative tuple

(t, v^(→) _(i)) of identification information t (t is any one integer of t=1, . . . , d) and an attribute vector v^(→) _(i):=(v_(i,i′))=1, . . . , n_(t) where n_(t) is an integer of 1 or more), and based on the attribute set Γ, the set I being a set of, among integers i=1, . . . , L, an integer i for which the variable ρ(i) is a positive tuple (t, v^(→) _(i)) and with which an inner-product of the positive tuple and x^(→) _(t) included in Γ indicated by the identification information t of the positive tuple becomes 0, and an integer i for which the variable ρ(i) is a negative tuple

(t, v^(→) _(i)) and with which an inner-product of the negative tuple and x^(→) _(t) included in Γ indicated by the identification information t of the negative tuple does not become 0, the complementary coefficient α_(i) being such that with which a total of α_(i)M_(i) for i included in the set I, based on M_(i) which is an element on an i-th row of the matrix M inputted, becomes a predetermined vector w^(→), and wherein s*_(i) (each integer of i=1, . . . , L) and s*_(x) are generated based on the variable ρ(i), the attribute set Γ, the set I, and the complementary coefficient α_(i), as indicated in Formula 21, where β_(i) is a value with which every element becomes 0 when β_(i)M_(i) is totaled for each integer i representing each row number of the matrix M, and for each integer i representing each row number of the matrix M, when iεI is established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=α_(i), and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 0 and y_(i,1)=1, when iεI is established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=α_(i)/(v^(→) _(i)·x^(→) _(t)), and let a vector y^(→) _(i):=(y_(i,t)) (t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 1, when iεI is not established and the variable ρ(i) is a positive tuple (t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(t:=1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 0 and y_(i,1)=1, and when iεI is not established and the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), let a value γ_(i):=0, and let a vector y^(→) _(i):=(y_(i,t) (t:=)1, . . . , n_(t)) be a vector with which an inner-product of y^(→) _(i) and v^(→) _(i) is 1; an encrypted data generation part which generates an element c_(i) and an element c_(x), the element c_(i) being generated for each integer i=1, . . . , L, based on a column vector s^(→T):=(s₁, . . . , s_(L))^(T):=M·f^(→T) generated based on a vector f^(→) having r pieces of elements, the vector w^(→), and the matrix M inputted by the data acquisition part; a value s₀:=w^(→)·f^(→T); and a predetermined value θ_(i) (i is each row number of the matrix M, and X), the encrypted data generation part being configured to generate the element c_(i) for each integer i=1 representing a row number of the matrix M, when the variable ρ(i) is a positive tuple (t, v^(→) _(i)), by setting s_(i)+θ_(i)v_(i,1) as a coefficient for a basis vector b_(t,1) of the basis B_(t) indicated by identification information t of the positive tuple, and by setting θ_(i)v_(i,i′) as a coefficient for a basis vector b_(t,i′) indicated by the identification information t and each integer i′=2, . . . , n_(t), and when the variable ρ(i) is a negative tuple

(t, v^(→) _(i)), by setting as a coefficient for the basis vector b_(t,i′) indicated by the identification information t of the negative tuple and each integer i′=1, . . . , n_(t), and to generate the element c_(x) by setting s₀−θ_(x)m in a basis vector b_(d+2,p′) (′p is prescribed p′) of a basis vector B_(d+2) and by setting θ_(x) in a basis vector b_(d+2,q′) (′q is prescribed q′) of the basis vector B_(d+2); and a pairing operation part which verifies validity of the signature data sig by performing a pairing operation indicated in Formula 22 for each integer i indicating X and a row number of the matrix M. s _(i)*:=γ_(i) ·ξk _(t)*+β_(i)·(Σ_(t=1) ^(n) ^(t) y _(i,ξ) ·b _(t,t)*)+r _(i)* s _(X)*:=ξ(kd+2 *+m·k _(d+3)*)+r _(X)*  [Formula 21] where ξ, r_(i)* and r_(X)* are predetermined values. Πe(c _(i) ,s _(i)*)  [Formula 22] 