Cryptographic system, encryption device, re-encryption key generation device, re-encryption device, and cryptographic program

ABSTRACT

An encryption device  200  outputs a ciphertext ct including a ciphertext c and a ciphertext c ˜ . The ciphertext c has been set with one of attribute information x and attribute information v related to each other. The ciphertext c ˜  has been set with one of attribute information y and attribute information z related to each other. A decryption device  300  outputs a re-encryption key rk including a decryption key k *rk , a decryption key k ˜*rk , and encrypted conversion information ϕ rk . The decryption key k *rk  is obtained by converting the decryption key k* which is set with the other one of attribute information x and attribute information v, with conversion information W 1,t . The decryption key k ˜*rk  has been set with the other one of the attribute information y and the attribute information z. The encrypted conversion information ϕ rk  is obtained by encrypting the conversion information W 1,t  by setting one of attribute information x′ and attribute information v′ related to each other. A re-encryption device  400  outputs a re-ciphertext ret including a ciphertext c renc  and a decryption key k *renc . The ciphertext c renc  is obtained by setting one of additional information H and additional information Θ to the ciphertext ct. The decryption key k *renc  is obtained by setting the other one of the additional information H and the additional information Θ to the re-encryption key rk.

TECHNICAL FIELD

The present invention relates to a functional proxy re-encryption (FPRE) scheme. More particularly, the present invention relates to a functional conditional proxy re-encryption (FCPRE) scheme being an FPRE scheme that can designate a condition for re-encryption.

BACKGROUND ART

Proxy Re-Encryption (PRE) is a system that delegates the decryption authority of a ciphertext to others without decrypting the ciphertext. Non-Patent Literature 1 includes a description on an Identity-Based PRE (IBPRE) scheme. Non-Patent Literature 2 includes a description on an Attribute-Based PRE (ABPRE) scheme. In the PRE scheme described in Non-Patent Literature 2, only an attribute constituted of an AND operation and negation can be designated to a ciphertext.

Non-Patent Literature 3 includes a description on a conditional proxy re-encryption (CPRE) scheme that can designate a condition for re-encryption.

Patent Literature 1 includes a description on a functional encryption (FE) scheme. Non-Patent Literature 4 includes a description on the FPRE scheme.

CITATION LIST Patent Literature

-   Patent Literature 1: JP 2012-133214 A

Non-Patent Literature

-   Non-Patent Literature 1: M. Green, and G. Ateniese, Identity-Based     Proxy Re-encryption. In Applied Cryptography and Network Security.     volume 4521 of LNCS, pp 288-306, 2007. -   Non-Patent Literature 2: Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun     Shao. Attribute based proxy re-encryption with delegating     capabilities. ASIACCS 2009 pp. 276-286. -   Non-Patent Literature 3: J. Weng, Y. Yang Q. Tang, R. H. Deng,     and F. Bao, “Efficient Conditional Proxy Re-Encryption with     Chosen-Ciphertext Security” in ISC2009. -   Non-Patent Literature 4: Yutaka Kawai and Katuyuki Takashima,     Fully-Anonymous Functional Proxy-Re-Encryption. Cryptology ePrint     Archive: Report 2013/318 -   Non-Patent Literature 5: Okamoto, T Takashima, K.: Decentralized     Attribute-Based Signatures. ePrint http://eprint.iacr.org/2011/701 -   Non-Patent Literature 6: Okamoto, T Takashima, K.: Fully Secure     Unbounded Inner-Product and Attribute-Based Encryption. ePrint     http://eprint.iacr.org/2012/671 -   Non-Patent Literature 7: Okamoto, T., Takashima, K.: Achieving Short     Ciphertexts or Short Secret-Keys for Adaptively Secure General     Inner-Product Encryption. CANS 2011, LNCS, vol. 7092, pp. 138-159     Springer Heidelberg (2011).

SUMMARY OF INVENTION Technical Problem

The CPRE scheme described in Non-Patent Literature 3 is not a functional encryption scheme, and accordingly has constraints on designation of a decryptor and designation of a condition for re-encryption, thus lacking flexibility.

According to the FPRE scheme described in Non-Patent Literature 4, a re-encryption key generated by a certain recipient can re-encrypt all ciphertexts that the recipient can decrypt. The recipient cannot designate a ciphertext to be re-encrypted.

It is an object of the present invention to flexibly designate a condition for a re-encryptable ciphertext when a re-encryption key is to be generated.

Solution to Problem

A cryptographic system according to the present invention is a cryptographic system that implements a proxy re-encryption function in a cryptographic scheme capable of decrypting a ciphertext with a decryption key, the ciphertext being set with one of two pieces of information related to each other, the decryption key being set with the other one of the two pieces of information, and that includes:

an encryption device to output a ciphertext ct including a ciphertext c and a ciphertext c^(˜), the ciphertext c being set with one of attribute information x and attribute information v related to each other, the ciphertext c^(˜) being set with one of attribute information y and attribute information z related to each other;

a re-encryption key generation device to acquire a decryption key k* which is set with the other one of the attribute information x and the attribute information v, and to output a re-encryption key rk including a decryption key k^(*rk), a decryption key k^(˜*rk), and encrypted conversion information ϕ^(rk), the decryption key k^(*rk) being obtained by converting the acquired decryption key k* with conversion information W₁, the decryption key k^(˜*rk) being set with the other one of the attribute information y and the attribute information z, the encrypted conversion information ϕ^(rk) being obtained by encrypting the conversion information W₁ by setting one of attribute information x′ and attribute information v′ related to each other; and

a re-encryption device to output a re-ciphertext rct including a ciphertext c^(renc) and a decryption key k^(*renc), the ciphertext c^(renc) being obtained by setting one of additional information H and additional information Θ related to each other to the ciphertext ct, the decryption key k^(*renc) being obtained by setting the other one of the additional information H and the additional information Θ to the re-encryption key rk.

Advantageous Effects of Invention

In the cryptographic system according to the present invention, the encryption device can generate a ciphertext ct by setting not only a decryption condition (one of attribute information x and attribute information v) of the ciphertext ct but also information (one of attribute information y and attribute information z) for setting a condition that enables re-encryption of the ciphertext ct. Also, the re-encryption key generation device can generate a re-encryption key rk by setting not only a decryption condition (one of attribute information x′ and attribute information v′) of a re-ciphertext ret but also a condition that enables re-encryption (the other one of the attribute information y and the attribute information z). There is no constraint on the attribute information to be set. The decryption condition and the condition for re-encryption can be set flexibly.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an explanatory drawing of a matrix M^(^).

FIG. 2 is an explanatory drawing of a matrix M_(δ).

FIG. 3 is an explanatory drawing of s₀.

FIG. 4 is an explanatory drawing of s^(→T).

FIG. 5 is a configuration diagram of a cryptographic processing system 10 that executes CP-FCPRE scheme.

FIG. 6 is a functional block diagram illustrating a function of a key generation device 100.

FIG. 7 is a functional block diagram illustrating a function of an encryption device 200.

FIG. 8 is a functional block diagram illustrating a function of a decryption device 300.

FIG. 9 is a functional block diagram illustrating a function of a re-encryption device 400.

FIG. 10 is a functional block diagram illustrating a function of a re-ciphertext decryption device 500.

FIG. 11 is a flowchart illustrating a process of Setup algorithm.

FIG. 12 is a flowchart illustrating a process of KG algorithm.

FIG. 13 is a flowchart illustrating a process of Enc algorithm.

FIG. 14 is a flowchart illustrating a process of RKG algorithm.

FIG. 15 is a flowchart illustrating a process of REnc algorithm.

FIG. 16 is a flowchart illustrating a process of Dec1 algorithm.

FIG. 17 is a flowchart illustrating a process of Dec2 algorithm.

FIG. 18 is a configuration diagram of a cryptographic processing system 10 that executes KP-FCPRE scheme.

FIG. 19 is a functional block diagram illustrating a function of a key generation device 100.

FIG. 20 is a functional block diagram illustrating a function of an encryption device 200.

FIG. 21 is a functional block diagram illustrating a function of a decryption device 300.

FIG. 22 is a functional block diagram illustrating a function of a re-encryption device 400.

FIG. 23 is a functional block diagram illustrating a function of a re-ciphertext decryption device 500.

FIG. 24 is a flowchart illustrating a process of KG algorithm.

FIG. 25 is a flowchart illustrating a process of Enc algorithm.

FIG. 26 is a flowchart illustrating a process of RKG algorithm.

FIG. 27 is a flowchart illustrating a process of REnc algorithm.

FIG. 28 is a flowchart illustrating a process of Dec1 algorithm.

FIG. 29 is a flowchart illustrating a process of Dec2 algorithm.

FIG. 30 is a diagram illustrating an example of the hardware configuration of the key generation device 100, encryption device 200, decryption device 300, re-encryption device 400, and re-ciphertext decryption device 500.

DESCRIPTION OF EMBODIMENTS

Embodiments of the present invention will be described hereinafter with reference to the accompanying drawings.

In the following description, a processing device is a CPU 911 (to be described later) and the like. A storage device is a ROM 913, a RAM 914, a magnetic disk 920 (each will be described later), and the like. A communication device is a communication board 915 (to be described later) and the like. An input device is a keyboard 902 (to be described later), the communication board 915, and the like. Namely, the processing device, the storage device, the communication device, and the input device are hardware.

The notation in the following description will be explained.

When A is a random variable or distribution, Formula 101 denotes that y is randomly selected from A according to the distribution of A. Namely, in Formula 101, y is a random number.

$\begin{matrix} {y\overset{R}{\leftarrow}A} & \left\lbrack {{Formula}\mspace{14mu} 101} \right\rbrack \end{matrix}$

When A is a set, Formula 102 denotes that y is uniformly selected from A. Namely, in Formula 102, y is a uniform random number.

$\begin{matrix} {y\overset{U}{\leftarrow}A} & \left\lbrack {{Formula}\mspace{14mu} 102} \right\rbrack \end{matrix}$

Formula 103 denotes that y is a set, defined or substituted by z. y:=z  [Formula 103]

When a is a fixed value, Formula 104 denotes an event that a machine (algorithm) A outputs a on input x. A(x)→a For example, A(x)→1  [Formula 104]

Formula 105, namely, F_(q), denotes a finite field of order q.

  [Formula 105]

A vector symbol denotes a vector representation over the finite field F_(q).

Namely, Formula 106 is established. x denotes (x ₁ , . . . ,x _(n))∈

  [Formula 106]

Formula 107 denotes the inner-product, indicated by Formula 109, of two vectors x^(→) and v^(→)) indicated in Formula 108. {right arrow over (x)}·{right arrow over (v)}  [Formula 107] {right arrow over (x)}=(x ₁ , . . . ,x _(n)) {right arrow over (v)}=(v ₁ , . . . ,v _(n))=  [Formula 108] Σ_(i=1) ^(n) x _(i) v _(i)  [Formula 109]

Note that X^(T) denotes the transpose of matrix X.

Note that for bases B and B* indicated in Formula 110, Formula 111 is established.

:=(b ₁ , . . . ,b _(N)),

:=b ₁ *, . . . ,b _(N)*)  [Formula 110] (x ₁ , . . . ,x _(N))

:=Σ_(i=1) ^(N) x _(i) b _(i), (y ₁ , . . . ,y _(N))

:=Σ_(i=1) ^(N) y _(i) b _(i)*  [Formula 111]

Note that e^(→) _(j) denotes an orthonormal basis vector indicated in Formula 112.

$\begin{matrix} {{{{\overset{\rightarrow}{e}j\text{:~~}\left( {\overset{\overset{j - 1}{︷}}{0\mspace{14mu}\ldots\mspace{14mu} 0},1,\overset{\overset{n - j}{︷}}{0\mspace{14mu}\ldots\mspace{14mu} 0}} \right)} \in {{??}_{q}^{n}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots\mspace{11mu},n} & \left\lbrack {{Formula}\mspace{14mu} 112} \right\rbrack \end{matrix}$

In the following description, when Vt, nt, wt, zt, nu, wu, or zu is indicated as a subscript or superscript, Vt, nt, wt, zt, nu, wu, or zu is V_(t), n_(t), w_(t), z_(t), n_(u), w_(u), or z_(u). Likewise, when δi,j is indicated as a superscript, δi,j is δ_(i,j).

When → indicating a vector is attached to a subscript or superscript, → is attached as a superscript to the subscript or superscript. When ˜ is attached to a subscript or superscript, ˜ is attached as a superscript to the subscript or superscript.

Embodiment 1

This embodiment describes a basic concept as a basis for implementing the FCPRE scheme, and then describes the structure of the FCPRE scheme according to this embodiment.

First, FCPRE will be briefly described.

Second, a space having a rich mathematical structure called dual pairing vector spaces (DPVS) which is a space for implementing the FCPRE scheme will be described.

Third, a concept for implementing the FCPRE scheme will be described. Here, the span program, the inner product of attribute vectors, and an access structure, and secret distribution scheme (secret sharing scheme) will be described.

Fourth, the FCPRE scheme according to this embodiment will be described. In this embodiment, ciphertext-policy FCPRE (CP-FCPRE) scheme will be described. Initially, the basic structure of the CP-FCPRE scheme will be described. Subsequently, the basic structures of a cryptographic system 10 that implements the CP-FCPR scheme will be described thereafter, and components that are employed to implement the CP-FCPRE scheme will be described. Then, the CP-FCPRE scheme and the cryptographic system 10 according to this embodiment will be described in detail.

<1. FCPRE>

FPRE will initially be described. FPRE is a proxy re-encryption scheme in which the relation among an encryption key (ek), a decryption key (dk), and a re-encryption key (rk) is more sophisticated and flexible.

FPRE has the following two features.

First, attribute information x and attribute information v are respectively set in the encryption key and the decryption key. If and only if R(x,v) is established for a relation R, a decryption key dk can decrypt a ciphertext encrypted by an encryption key ek_(x).

Second, in addition to the fact that the attribute information x and the attribute information v are respectively set in the encryption key and the decryption key, two pieces of attribute information (x′,v) are set in the re-encryption key. If and only if R(x,v) is established, a re-encryption key rk_((x′,v)) can change the ciphertext encrypted by the encryption key ek_(x) to a ciphertext that can be decrypted by a decryption key d_(kv′) for which R(x′,v′) is established, namely, to a ciphertext that is encrypted by an encryption key ek_(x′).

If R(x,v) is established if and only if the relation R is an equality relation, that is, if x=v, the PRE scheme is IDPRE.

ABPRE is a more generalized form of PRE than IDPRE. In ABPRE, attribute information that is set in an encryption key and attribute information that is set in a decryption key form a tuple of attribute information. For example, attribute information that is set in the encryption key is X:=(x₁, . . . , x_(d)), and attribute information that is set in the decryption key is V:=(v₁, . . . , v_(d)).

Concerning the components of the attribute information, the equality relation (for example, {x_(t)=v_(t)}t∈{1, . . . , d}) of each component is inputted to an access structure S. If and only if the access structure S accepts the input, R(V,V) is established. That is, the ciphertext encrypted by the encryption key can be decrypted by the decryption key. Non-Patent Literature 2 proposes a ciphertext-policy PRE scheme in which the access structure S is embedded in the ciphertext. An access structure for this case has a structure constituted of only a logical product and negation.

FCPRE will now be described. FCPRE is an FPRE in which a condition for re-encryption can be designated.

In FCPRE, attribute information x and attribute information v are respectively set in the encryption key and the decryption key, and two pieces of attribute information (x′,v) are set in a re-encryption key. In addition, attribute information z and attribute information y are respectively set in the ciphertext and the re-encryption key. If and only if R(x,v) and R(z,y) are established for a relation R, the ciphertext encrypted by the encryption key ek_(x) can be changed to a ciphertext that can be decrypted by the decryption key dk_(v′) for which R(x′,v′) is established, namely, to a ciphertext that is encrypted by the encryption key ek_(x′).

There is ordinary FE in which a ciphertext transfer function does not exist, that is, a re-encryption key does not exist. In FE, a re-encryption key generation process and re-encryption process do not exist, and attribute information x and attribute information v are respectively set in the encryption key and the decryption key. If and only if R(x,v) is established for a relation R, the decryption key dk_(v):=(dk,v) can decrypt a ciphertext encrypted by the encryption key ek_(x):=(ek,x).

<2. Dual Pairing Vector Spaces>

First, symmetric bilinear pairing groups will be described.

The symmetric bilinear pairing groups (q,G,G^(T),g,e) are a tuple of a prime q, a cyclic additive group G of order q, a cyclic multiplicative group G^(T) of order q, g≠0ϵG, and a polynomial-time computable nondegenerate bilinear pairing e:G×G→G_(T). The nondegenerate bilinear pairing signifies e(sg,tg)=e(g,g)^(st) where e(g,g)≠1.

In the following description, let G_(bpg) be an algorithm that takes as input 1^(λ) and outputs the value of a parameter param_(G):=(q,G,G_(T),g,e) of bilinear pairing groups with a security parameter λ.

Dual pairing vector spaces will now be described.

Dual pairing vector spaces (q,V,G_(T),A,e) can be constituted by a direct product of symmetric bilinear pairing groups (param_(G):=(q,G,G_(T),g,e)). The dual pairing vector spaces (q,V,G_(T),A,e) are a tuple of a prime q, an N-dimensional vector space V over F_(q) indicated in Formula 113, a cyclic group G_(T) of the order q, and a canonical basis A:=(a₁, . . . , a_(N)) of a space V, and have the following operations (1) and (2) where a_(i) is as indicated by Formula 114.

$\begin{matrix} {{??}\text{:} = \overset{\overset{N}{︷}}{{??}\; x\mspace{14mu}\ldots\mspace{14mu} x\;{??}}} & \left\lbrack {{Formula}\mspace{14mu} 113} \right\rbrack \\ {{a_{i}\text{:}} = \left( {\overset{\overset{i - 1}{︷}}{0\;,\ldots\mspace{14mu},\mspace{14mu} 0},g,\overset{\overset{N - i}{︷}}{0,\ldots\mspace{14mu},}} \right)} & \left\lbrack {{Formula}\mspace{14mu} 114} \right\rbrack \end{matrix}$

Operation (1): Nondegenerate Bilinear Pairing

The pairing on the space V is defined by Formula 115. e(x,y):=Π_(i=1) ^(N) e(G _(i) ,H _(i))∈

where (G ₁ , . . . ,G _(N)):=x∈

, (H ₁ , . . . ,H _(N)):=x∈

  [Formula 115]

This is nondegenerate bilinear, i.e., e(sx,ty)=e(x,y)^(st) and if e(x,y)=1 for all y∈V, then x=0. For all i and j, e(a_(i),a_(j))=e(g,g)^(δi,j) where δ_(i,j)=1 if i=j, and δ_(i,j)=0 if i≠j. Also, e(g,g)≠1∈G_(T).

Operation (2): Distortion Maps

Linear transformation ϕ_(i,j) on the space V indicated in Formula 116 can achieve Formula 117.

$\begin{matrix} {{{\phi_{i,j}\left( a_{j} \right)} = a_{i}}{{{{if}\mspace{14mu} k} \neq {j\mspace{14mu}{then}\mspace{14mu}{\phi_{i,j}\left( a_{k} \right)}}} = 0}} & \left\lbrack {{Formula}{\mspace{11mu}\;}116} \right\rbrack \\ {{{\phi_{i,j}(x)}\text{:}} = \left( {\overset{\overset{i - 1}{︷}}{0\;,\ldots\mspace{14mu},0},g_{j},\overset{\overset{N - i}{︷}}{0,\ldots\mspace{14mu},0}} \right)} & \left\lbrack {{Formula}{\mspace{11mu}\;}117} \right\rbrack \end{matrix}$

Note that

(g₁, g_(N)):=x

Linear transformation ϕ_(i,j) will be called distortion maps.

In the following description, let G_(dpvs) be an algorithm that takes as input, 1^(λ) (λϵnatural number), N∈natural number, and the values of a parameter param_(G):=(q,G,G_(T),g,e) of bilinear pairing groups, and outputs the value of a parameter param_(v):=(q,V,G_(T),A,e) of dual pairing vector spaces which have a security parameter λ and which form an N-dimensional space V.

A case will be described where dual pairing vector spaces are constructed from the symmetric bilinear pairing groups described above. Dual pairing vector spaces can be constructed from asymmetric bilinear pairing groups as well. The following description can be easily applied to a case where dual pairing vector spaces are constructed from asymmetric bilinear pairing groups.

<3. Concept for Implementing FCPRE Scheme>

<3-1. Span Program>

FIG. 1 is an explanatory drawing of a matrix M^(^).

Let {p₁, . . . , P_(n)} be a set of variables. M^(^):=(M,ρ) is a labeled matrix where a matrix M is an (L rows×r columns) matrix over F_(q), and ρ is a label of each row of the matrix M and is related to one of literals {p₁, . . . , p_(n),

p₁, . . . ,

p_(n)}. A label ρ_(i) (i=1, . . . , L) of every row of M is related to one of the literals, namely, ρ: {1, . . . , L}→{p₁, . . . , p_(n),

p₁, . . . ,

p_(n)}.

For every input sequence δδ{0, 1}^(n), a submatrix M_(δ) of the matrix M is defined. The matrix M_(δ) is a submatrix consisting of those rows of the matrix M, whose labels p are related to value “1” by the input sequence δ. Namely, the matrix M_(δ) is a submatrix consisting of the rows of the matrix M which are related to p_(i) with which δ_(i)=1 and the rows of the matrix M which are related to

p_(i) with which δ_(i)=0.

FIG. 2 is an explanatory drawing of the matrix M_(δ). Note that in FIG. 2, n=7, L=6, and r=5. That is, the set of variables is {p₁, . . . , p₇}, and the matrix M is a (6 rows×5 columns) matrix. In FIG. 2, assume that the labels p are related such that ρ₁ corresponds to

p₂, ρ₂ to p₁, ρ₃ to p₄, ρ₄ to

ρ₅, p₅ to

p₃, and ρ₆ to

p₅.

Assume that in an input sequence δ∈{0,1}⁷, δ₁=1, δ₂=0, δ₃=1, δ₄=0, δ₅=0, δ₆=1, and δ₇=1. In this case, a submatrix consisting of the rows of the matrix M which are related to literals (p₁, p₃, p₆, p₇,

p₂,

p₄,

p₅) surrounded by broken lines is the matrix M_(δ). That is, the submatrix consisting of the 1st row (M₁), 2nd row (M₂), and 4th row (M₄) of the matrix M is the matrix M_(δ).

In other words, when map γ: {1, . . . , L}→{0, 1} is [ρ(j)=p_(i)]

[δ_(i)=1] or [ρ(j)=

p_(i)]

[δ_(i)=0], then γ(j)=1; otherwise γ(j)=0. In this case, M_(δ):=(M_(j))_(γ(j)=1). Note that M_(j) is the j-th row of the matrix M.

That is, in FIG. 2, map γ(j)=1 (j=1, 2, 4), and map γ(j)=0 (j=3, 5, 6). Hence, (M_(j))_(γ(j)=1) is M₁, M₂, and M₄, and the matrix M.

More specifically, whether or not the j-th row of the matrix M is included in the matrix M_(δ) is determined by whether the value of the map γ(j) is “0” or “1”.

The span program M^(^) accepts an input sequence δ if and only if 1^(→)ϵspan<M_(δ)>, and rejects the input sequence δ otherwise. Namely, the span program M^(^) accepts the input sequence δ if and only if linear combination of the rows of the matrix M_(δ) which are obtained from the matrix M^(^) by the input sequence δ gives 1^(→). 1^(→) is a row vector which has value “1” in each element.

For example, in FIG. 2, the span program M^(^) accepts the input sequence δ if and only if linear combination of the respective rows of the matrix M_(δ) consisting of the 1st, 2nd, and 4th rows of the matrix M gives 1^(→). That is, if there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), the span program M^(^) accepts the input sequence δ.

The span program is called monotone if its labels p are related to only positive literals {p₁, . . . , p_(n)}. The span program is called non-monotone if its labels p are related to the literals {p₁, . . . , p_(n),

p₁ . . . ,

p_(n)}. Suppose that the span program is non-monotone. An access structure (non-monotone access structure) is constituted using the non-monotone span program. Briefly, an access structure controls access to encryption, namely, it controls whether a ciphertext is to be decrypted or not.

Because the span program is not monotone but non-monotone, as will be described later in detail, the application of the FCPRE scheme constituted using the span program widens.

<3-2. Inner-Product of Attribute Information and Access Structure>

Map γ(j) described above will be calculated using the inner-product of attribute information. Namely, which row of the matrix M is to be included in the matrix M_(δ) will be determined using the inner-product of the attribute information.

U_(t) (t=1, . . . , d and U_(t)⊂{0, 1}*) is a sub-universe and an attribute set. Each U_(t) includes identification information (t) of the sub-universe and n-dimensional vector (v^(→)). Namely, U_(t) is (t,v^(→)) where t∈{1, . . . , d} and v^(→)∈F_(q) ^(n).

Let U_(t):=(t,v^(→)) be a variable p of the span program M^(^):=(M,ρ), that is, p:=(t,v^(→)). Let the span program M^(^):=(M,ρ) having the variable (p:=(t,v^(→)), (t,v′^(→)), . . . ) be an access structure S.

That is, the access structure S:=(M,ρ), and ρ:={1, . . . , L}→{(t,v^(→)), (t,v′^(→)), . . . ,

(t,v^(→)),

(t,v′^(→)), . . . }.

Let Γ be an attribute set, that is, Γ:={(t,x^(→) _(t))|x^(→) _(t)∈F_(q) ^(n), 1≤t≤d}.

When Γ is given to the access structure S, map γ: {1, . . . , L}→{0, 1} for the span program M^(^):=(M,ρ) is defined as follows. For each integer i of i=1, . . . , L, set γ(j)=1 if [ρ(i)=(t,v^(→) _(i))]

[(t,x^(→) _(t))∈Γ]

[v^(→) _(i)·x^(→) _(t)=0] or [ρ(i)=

(t,v^(→) _(i))]

[(t,x^(→) _(t))ϵΓ]

[v^(→) _(i)·x^(→) _(t)≠0]. Set γ(j)=0 otherwise.

Namely, the map γ is calculated based on the inner-product of the attribute information v^(→) and x^(→). As described above, which row of the matrix M is to be included in the matrix M_(δ) is determined by the map γ. More specifically, which row of the matrix M is to be included in the matrix M_(δ) is determined by the inner-product of the attribute information v^(→) and x^(→). The access structure S:=(M,ρ) accepts Γ if and only if 1^(→∈span<(M) _(i))_(γ(i)=1)>.

<3-3. Secret Distribution Scheme>

A secret distribution scheme for the access structure S:=(M,ρ) will be described.

The secret distribution scheme is distributing secret information to render it nonsense distributed information. For example, secret information s is let to be distributed among 10 lumps to generate 10 pieces of distributed information. Each of the 10 pieces of distributed information does not have information on the secret information s. Hence, even when certain one piece of distributed information is obtained, no information can be obtained on the secret information s. On the other hand, if all of the 10 pieces of distributed information are obtained, the secret information s can be recovered.

Another secret distribution scheme is also available according to which even when all of the 10 pieces of distributed information cannot be obtained, if one or more, but not all, (for example, 8 pieces) of distributed information can be obtained, then the secret information s can be recovered. A case like this where the secret information s can be recovered using 8 pieces out of 10 pieces of distributed information will be called 8-out-of-10. That is, a case where the secret information s can be recovered using t pieces out of n pieces of distributed information will be called t-out-of-n. This t will be called a threshold.

Still another secret distribution scheme is available according to which when 10 pieces of distributed information d₁, . . . , d₁₀ are generated, the secret information s can be recovered if 8 pieces of distributed information d₁, . . . , d₈ are given, but cannot if 8 pieces of distributed information d₃, . . . , d₁₀ are given. Namely, this is a secret distribution scheme with which whether or not the secret information s can be recovered is controlled not only by the number of pieces of distributed information obtained but also depending on the combination of the distributed information.

FIG. 3 is an explanatory drawing of s₀. FIG. 4 is an explanatory drawing of s^(→T).

Let a matrix M be an (L rows×r columns) matrix. Let f^(→T) be a column vector indicated in Formula 118.

$\begin{matrix} {{\overset{\rightarrow}{f}}^{T}{\text{:} = {\left( {f_{1},{\ldots\mspace{14mu} f_{r}}} \right)^{T}\overset{U}{\leftarrow}{??}_{q}^{r}}}} & \left\lbrack {{Formula}\mspace{14mu} 118} \right\rbrack \end{matrix}$

Let s₀ indicated in Formula 119 be secret information to be shared. s ₀:={right arrow over (1)}·{right arrow over (f)} ^(t):=Σ_(k=1) ^(r) f _(k)  [Formula 119]

Let s^(→T) indicated in Formula 120 be a vector of L pieces of distributed information of s₀. {right arrow over (s)} ^(T):=(s ₁ , . . . s _(L))^(T) :=M·{right arrow over (f)} ^(T)  [Formula 120]

Let distributed information s, belong to ρ(i).

If the access structure S:=(M,ρ) accepts Γ, that is, 1^(→)∈span<(M_(i))_(γ(i)=1)> for γ: {1, . . . , L}→{0.1}, then there exist constants {α_(i)∈F_(q)|i∈I} such that I⊂{i∈{1, . . . , L}|γ(i)=1}.

This is obvious from the explanation on FIG. 2 in that if there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), the span program M^(^) accepts the input sequence δ. Namely, if the span program M^(^) accepts the input sequence δ when there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→), then there exist α₁, α₂, and α₄ with which α₁(M₁)+α₂(M₂)+α₄(M₄)=1^(→).

Note Formula 121. Σ_(i∈I)α_(i) s _(i) :=s ₀  [Formula 121]

Note that the constants {α_(i)} can be computed in time polynomial in the size of the matrix M.

With the FCPRE scheme according to the following embodiment, an access structure is constructed by applying the inner-product predicate and the secret distribution scheme to the span program, as described above. Therefore, access control can be designed flexibly by designing the matrix M in the span program and the attribute information x and the attribute information v (predicate information) in the inner-product predicate. Namely, access control can be designed very flexibly. Designing of the matrix M corresponds to designing conditions such as the threshold of the secret distribution scheme.

For example, the attribute-based encryption scheme described above corresponds to a case, in the access structure in the FCPRE scheme according to the following embodiment, where designing of the inner-product predicate is limited to a certain condition. That is, when compared to the access structure in the FCPRE scheme according to the following embodiment, the access structure in the attribute-based encryption scheme has a lower flexibility in access control design because it lacks the flexibility in designing the attribute information x and the attribute information v (predicate information) in the inner-product predicate. More specifically, the attribute-based encryption scheme corresponds to a case where attribute information {x^(→) _(t)}_(t∈{1, . . . ,d}) and {v^(→) _(t)}_(t∈{1, . . . ,d}) are limited to two-dimensional vectors for the equality relation, for example, x^(→) _(t):=(1,x_(t)) and v^(→) _(t):=(v_(t),−1).

Also, PRE in the inner-product predicate encryption scheme corresponds to a case, in the access structure in the FCPRE scheme according to the following embodiment, where designing of the matrix M in the span program is limited to a certain condition. That is, when compared to the access structure in the FCPRE scheme according to the following embodiments, the access structure in the inner-product predicate encryption scheme has a lower flexibility in access control design because it lacks the flexibility in designing the matrix M in the span program. More specifically, the inner-product predicate encryption scheme is a case where the secret distribution scheme is limited to 1-out-of-1 (or d-out-of-d).

In particular, the access structure in the FCPRE scheme according to the following embodiment constitutes a non-monotone access structure that uses a non-monotone span program Thus, the flexibility in access control design improves.

More specifically, since the non-monotone span program includes a negative literal (

p), a negative condition can be set. For example, assume that First Company includes four departments of A, B, C, and D. Assume that access control is to be performed that only the users belonging to departments other than B department of First Company are capable of access (capable of decryption). In this case, if a negative condition cannot be set, a condition that “the user belongs to any one of A, C, and D departments of First Company” must be set. On the other hand, if a negative condition can be set, a condition that “the user is an employee of First Company and belongs to a department other than department B” can be set. Namely, since a negative condition can be set, natural condition setting is possible. Although the number of departments is small in this case, this scheme is very effective in a case where the number of departments is large.

<4. Basic Structure of FCPRE Scheme>

<4-1. Basic Structure of CP-FCPRE Scheme>

The basic structure of the CP-FCPRE scheme will be briefly described. CP (ciphertext policy) signifies that Policy is embedded in the ciphertext, namely, an access structure is embedded in the ciphertext.

The CP-FCPRE scheme consists of seven algorithms: Setup, KG, Enc, RKG, REnc, Dec1, and Dec2.

(Setup)

The Setup algorithm is a randomized algorithm that takes as input a security parameter λ and attribute format n^(→):=(d; n₁, . . . , n_(d); w₁, . . . , w_(d); z₁, . . . , z_(d)), and outputs public parameters pk and a master key sk.

(KG)

The KG algorithm is a randomized algorithm that takes as input an attribute set Γ:{(t,x^(→) _(t))|x^(→) _(t)∈F_(q) ^(nt), 1≤t≤d}, the public parameters pk, and the master key sk, and outputs a decryption key sk_(Γ).

(Enc)

The Enc algorithm is a randomized algorithm that takes as input a message m, access structures S=(M,ρ) and S^(˜)=(M^(˜),ρ^(˜)), and the public parameters pk, and outputs a ciphertext ct_(S).

(RKG)

The RKG algorithm is a randomized algorithm that takes as input the decryption key sk_(Γ), an access structure S′:=(M′,ρ′), an attribute set Γ^(˜), and the public parameters pk, and outputs a re-encryption key rk_(Γ,S′).

(REnc)

The REnc algorithm is a randomized algorithm that takes as input the ciphertext ct_(S), the re-encryption key rk_(Γ,S′), and the public parameters pk, and outputs a re-ciphertext rct_(S′).

(Dec1)

The Dec1 algorithm is an algorithm that takes as input the re-ciphertext rct_(S′), a decryption key sk_(Γ′), and the public parameters pk, and outputs the message m or distinguished symbol ⊥.

(Dec2)

The Dec2 algorithm is an algorithm that takes as input the ciphertext ct_(S), the decryption key sk_(Γ), and the public parameters pk, and outputs the message m or distinguished symbol ⊥.

<4-2. Cryptographic System 10>

The cryptographic system 10 that implements the algorithm of the CP-FCPRE scheme will be described.

FIG. 5 is a configuration diagram of the cryptographic system 10 that executes the CP-FCPRE scheme.

The cryptographic system 10 is provided with a key generation device 100, an encryption device 200, a decryption device 300 (re-encryption key generation device), a re-encryption device 400, and a re-ciphertext decryption device 500.

The key generation device 100 executes the Setup algorithm by taking as input the security parameter λ and the attribute format n^(→):=(d; n₁, . . . , n_(d); w₁, . . . , w_(d); z₁, . . . , z_(d)), and generates the public parameters pk and the master key sk.

Then, the key generation device 100 publicizes the public parameters pk. The key generation device 100 also executes the KG algorithm by taking as input the attribute set Γ, to generate the decryption key sk_(Γ), and transmits the decryption key sk_(Γ) to the decryption device 300 in secrecy. The key generation device 100 also executes the KG algorithm by taking as input an attribute set Γ′, to generate the decryption key sk_(Γ′), and transmits the decryption key sk_(Γ′) to the re-ciphertext decryption device 500 in secrecy.

The encryption device 200 executes the Enc algorithm by taking as input the message m, the access structures S and S^(˜), and the public parameters pk, to generate the ciphertext ct_(S). The encryption device 200 transmits the ciphertext ct_(S) to the re-encryption device 400.

The decryption device 300 executes the RKG algorithm by taking as input the decryption key sk_(Γ), the access structure S′, the attribute set Γ^(˜), and the public parameters pk, to generate the re-encryption key rk_(Γ,S′). The decryption device 300 transmits the re-encryption key rk_(Γ,S′) to the re-encryption device 400 in secrecy.

The decryption device 300 also executes the Dec2 algorithm by taking as input the public parameters pk, the decryption key sk_(Γ), and the ciphertext ct_(S), and outputs the message m or distinguished symbol ⊥.

The re-encryption device 400 executes the REnc algorithm by taking as input the re-encryption key rk_(Γ,S′), the ciphertext ct_(S), and the public parameters pk, to generate the re-ciphertext rct_(S′). The re-encryption device 400 transmits the re-ciphertext rct_(S′) to the re-ciphertext decryption device 500.

The re-ciphertext decryption device 500 executes the Dec1 algorithm by taking as input the decryption key sk_(Γ′), the re-ciphertext rct_(S′), and the public parameters pk, and outputs the message m or distinguished symbol ⊥.

<4-3. Components Employed to Implement CP-FCPRE Scheme>

The ciphertext-policy functional encryption (CP-FE) and one-time signature are employed to implement the CP-FCPRE scheme. CP-FE and the one-time signature are both known technique, and a scheme employed in the following description will be briefly explained. Patent Literature 1 describes an example of the CP-FE scheme.

The CP-FE scheme consists of four algorithms: SetUP_(CP-FE), KG_(CP-FE), Enc_(CP-FE), and Dec_(CP-FE).

(Setup_(CP-FE))

The Setup_(CP-FE) algorithm is a randomized algorithm that takes as input a security parameter λ and attribute format if n^(→):=(d; n₁, . . . , n_(d)), and outputs public parameters pk^(CP-FE) and a master key sk^(CP-FE).

(KG_(CP-FE))

The KG_(CP-FE) algorithm is a randomized algorithm that takes as input an attribute set Γ:={(t,x^(→) _(t))|x^(→) _(t)∈F_(q) ^(nt), 1≤t≤d}, the public parameters pk^(CP-FE), and the master key sk^(CP-FE), and outputs a decryption key sk_(Γ) ^(CP-FE).

(Enc_(CP-FE))

The Enc_(CP-FE) algorithm is a randomized algorithm that takes as input the message m, the access structure S=(M,ρ), and the public parameters pk^(CP-FE), and outputs a ciphertext ϕ.

(Dec_(CP-FE))

The Dec_(CP-FE) algorithm is an algorithm that takes as input the ciphertext ϕ, the decryption key sk_(Γ) ^(CP-FE), and the public parameters pk^(CP-FE), and outputs the message m or distinguished symbol ⊥.

One-time signature scheme consists of three algorithms: SigKG, Sig, and Ver.

(SigKG)

The SigKG algorithm is a randomized algorithm that takes as input a security parameter λ and outputs a signature key sigk and a verification key verk.

(Sig)

The Sig algorithm is a randomized algorithm that takes as input the signature key sigk and a message m, and outputs a signature S.

(Ver)

The Ver algorithm is an algorithm that takes as input the verification key verk, the message m, and the signature S, and outputs 1 if the signature S is authentic with respect to the verification key verk and the message m, and 0 otherwise.

<4-4. CP-FCPRE Scheme and Cryptographic Processing System 10 in Detail)

The CP-FCPRE scheme, and the function and operation of the cryptographic processing system 10 which executes the CP-FCPRE scheme will be described with reference to FIGS. 6 to 17.

FIG. 6 is a functional block diagram illustrating a function of the key generation device 100. FIG. 7 is a functional block diagram illustrating a function of the encryption device 200. FIG. 8 is a functional block diagram illustrating a function of the decryption device 300. FIG. 9 is a functional block diagram illustrating a function of the re-encryption device 400. FIG. 10 is a functional block diagram illustrating a function of the re-ciphertext decryption device 500.

FIGS. 11 and 12 are flowcharts each illustrating an operation of the key generation device 100, in which FIG. 11 is a flowchart illustrating a process of the Setup algorithm, and FIG. 12 is a flowchart illustrating a process of the KG algorithm. FIG. 13 is a flowchart illustrating an operation process of the encryption device 200 and a process of the Enc algorithm. FIG. 14 is a flowchart illustrating an operation of the decryption device 300 and a process of the RKG algorithm. FIG. 15 is a flowchart illustrating an operation of the re-encryption device 400 and a process of the REnc algorithm. FIG. 16 is a flowchart illustrating an operation of the re-ciphertext decryption device 500 and a process of the Dec1 algorithm. FIG. 17 is a flowchart illustrating an operation of the decryption device 300 and a process of the Dec2 algorithm.

The function and operation of the key generation device 100 will be described.

The key generation device 100 is provided with a master key generation part 110, a master key storage part 120, an information input part 130, a decryption key generation part 140, and a key transmission part 150 (key output part), as illustrated in FIG. 6. The decryption key generation part 140 is provided with a CP-FE key generation part 141, a random number generation part 142, and a decryption key k* generation part 143.

First, the process of the Setup algorithm will be described with reference to FIG. 11.

(S101: Orthogonal Basis Generation Step)

With the processing device, the master key generation part 110 calculates Formula 122-1 and Formula 122-2, to generate parameters param_(n→), bases B₀ and B*₀, bases B_(t) and B*_(t), and bases H_(t) and H*_(t).

$\begin{matrix} \; & \left\lbrack {{Formula}\mspace{14mu} 122\text{-}1} \right\rbrack \\ {{(1)\mspace{14mu}{input}\mspace{14mu} 1^{\lambda}},\overset{\rightarrow}{n}} & \; \\ {{(2)\mspace{14mu}{param}_{??}}:={{\left( {q,{??},{??}_{T},g,e} \right)\overset{R}{\longleftarrow}{??}_{bpg}}\left( 1^{\lambda} \right)}} & \; \\ {{{(3)\mspace{14mu} N_{0}}:=9},\mspace{34mu}{N_{t}:={{n_{t} + w_{t} + z_{t} + {1\mspace{14mu}{for}\mspace{14mu} t}} = 1}},\ldots\mspace{14mu},d,\mspace{34mu}{\psi\overset{U}{\longleftarrow}{??}_{q}^{\times}},{g_{T}:={{e\left( {g,g} \right)}\psi}}} & \; \end{matrix}$

Processes of (4) to (10) are executed concerning each integer t of t=0, . . . , d.

$\begin{matrix} {{(4)\mspace{14mu}{param}_{{??}_{t}}}:=\mspace{34mu}{\left( {q,{??},{??}_{T},{??}_{T},e} \right)\overset{R}{\longleftarrow}{{??}_{dpvs}\left( {1^{\lambda},N_{t},{param}_{??}} \right)}}} & \; \\ {{(5)\mspace{14mu} X_{t}} = {\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1} \\ \vdots \\ {{\overset{\rightarrow}{\chi}}_{t},N_{t}} \end{pmatrix}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{\longleftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}}}} & \; \\ {{(6)\mspace{14mu}\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1} \\ \vdots \\ {{\overset{\rightarrow}{v}}_{t},N_{t}} \end{pmatrix}}:={\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}}} & \; \\ {{{(7)\mspace{14mu} b_{t,i}}:={\sum\limits_{j = 1}^{N_{t}}\;{\chi_{t,i,j}a_{t,j}}}},\mspace{45mu}{{??}_{t}:=\left( {b_{t,1},\ldots\mspace{14mu},b_{t,N_{t}}} \right)},\mspace{45mu}{b_{t,i}^{*}:={\sum\limits_{j = 1}^{N_{t}}\;{v_{t,i,j}a_{t,j}}}},{{??}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots\mspace{14mu},b_{t,N_{t}}^{*}} \right)}} & \; \\ \; & \left\lbrack {{Formula}\mspace{14mu} 122\text{-}2} \right\rbrack \\ {{(8)\mspace{14mu} X_{t}^{\prime}} = {\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1}^{\prime} \\ \vdots \\ {{\overset{\rightarrow}{\chi}}_{t}^{\prime},N_{t}} \end{pmatrix}:={\left( \chi_{t,i,j}^{\prime} \right)_{i,j}\overset{U}{\longleftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}}}} & \; \\ {{(9)\mspace{14mu}\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1}^{\prime} \\ \vdots \\ {{\overset{\rightarrow}{v}}_{t}^{\prime},N_{t}} \end{pmatrix}}:={\left( v_{t,i,j}^{\prime} \right)_{i,j}:={\psi \cdot \left( X_{t}^{\prime\; T} \right)^{- 1}}}} & \; \\ {{{(10)\mspace{14mu} h_{t,i}}:={\sum\limits_{j = 1}^{N_{t}}\;{\chi_{t,i,j}^{\prime}a_{t,j}}}},\mspace{40mu}{{\mathbb{H}}_{t}:=\left( {h_{t,1},\ldots\mspace{14mu},h_{t,N_{t}}} \right)},\mspace{34mu}{h_{t,i}^{*}:={\sum\limits_{j = 1}^{N_{t}}\;{v_{t,i,j}^{\prime}a_{t,j}}}},{{\mathbb{H}}_{t}^{*}:=\left( {h_{t,1}^{*},\ldots\mspace{14mu},h_{t,N_{t}}^{*}} \right)}} & \; \\ {{(11)\mspace{14mu}{parm}_{\overset{\rightarrow}{n}}}:=\left( {\left\{ {parm}_{{??}_{t}} \right\}_{{t = 0},\ldots\mspace{14mu},d},g_{T}} \right)} & \; \end{matrix}$

Namely, the master key generation part 110 executes the following processes.

(1) With the input device, the master key generation part 110 takes as input a security parameter λ(1^(k)) and the attribute format n^(→):=(d; n₁, . . . , n_(d); w₁, . . . , w_(d); z₁, . . . , z_(d)) where d is an integer of 1 or more. For each integer t of t=1 . . . , d, n_(t) is an integer of 1 or more, and w_(t) and z_(t) are each an integer of 0 or more.

(2) With the processing device, the master key generation part 110 executes algorithm G_(bpg) by taking as input the security parameter λ, inputted in (1), to generate the values of parameters param_(G):=(q,G,G_(T),g,e) of bilinear pairing groups.

(3) The master key generation part 110 sets 9 in N₀, and sets n_(t)+w_(t)+z_(t)+1 in N_(t) concerning each integer t of t=1, . . . , d. The master key generation part 110 generates a random number ϕ. The master key generation part 110 also sets e(G,G)^(ϕ) in g_(T).

Subsequently, the master key generation part 110 executes the following processes (4) to (10) concerning each integer t of t=0, . . . , d.

(4) The master key generation part 110 executes algorithm G_(dpvs) by taking as input the security parameter λ inputted in (1), N_(t) set in (3), and the values of param_(G):=(q,G,G_(T),g,e) generated in (2), to generate the values of parameters param_(V) _(t) :=(q,V_(t),G_(T),A_(t),e) of the dual pairing vector spaces.

(5) The master key generation part 110 takes as input, N_(t) that is set in (3), and F_(q), and generates linear transformation X_(t):=(χ_(t,i,j))_(i,j) randomly. Note that GL stands for General Linear. Namely, GL is a general linear group, a set of square matrices in which the determinant is not 0, and a group with respect to multiplication. Note that (χ_(t,i,j))_(i,j) signifies a matrix concerning suffixes i and j of a matrix χ_(t,i,j) where for (χ_(t,i,j))_(i,j), i, j=1, . . . , N_(t).

(6) Based on the random number ϕ and the linear transformation X_(t), the master key generation part 110 generates (ν_(t,i,j))_(i,j):=ϕ·(X_(t) ^(T))⁻¹. As (Ψ_(t,i,j))_(i,j) does, (ν_(t,i,j))_(i,j) signifies a matrix concerning suffixes i and j of a matrix ν_(t,i,j) where for (ν_(t,i,j))_(i,j), i, j=1, . . . , N_(t).

(7) Based on the linear transformation X_(t) generated in (5), the master key generation part 110 generates a basis B_(t) from a canonical basis A_(t) generated in (4). Based on (ν_(t,i,j))_(i,j) generated in (6), the master key generation part 110 generates a basis B*_(t) from the canonical basis A_(t) generated in (4).

(8) In the same manner as in (5), the master key generation part 110 takes as input N_(t) set in (3), and F_(q), and generates linear transformation X′_(t):=(χ′_(t,i,j))_(i,j) randomly.

(9) In the same manner as in (6), based on the random number ϕ and the linear transformation X′_(t), the master key generation part 110 generates (ν′_(t,i,j))_(i,j):=ϕ·(X′_(t) ^(T))⁻¹.

(10) Based on the linear transformation X′_(t) generated in (8), the master key generation part 110 generates the basis H_(t) from the basis A_(t) generated in (4). Based on (ν′_(t,i,j))_(i,j) generated in (9), the master key generation part 110 generates the basis H*_(t) from the basis A_(t) generated in (4).

(11) The master key generation part 110 sets {param_(Vt)}_(t=0, . . . ,d) generated in (4), and g_(t), in param_(n→).

(S102: CP-FE Master Key Generation Step)

With the processing device, the master key generation part 110 calculates Formula 123, to generate the public parameters pk^(CP-FE) and the master key sk^(CP-FE) of functional encryption.

$\begin{matrix} {\left( {{pk}^{{CP} - {FE}},{sk}^{{CP} - {FE}}} \right)\overset{R}{\longleftarrow}{{Setup}_{{CP} - {FE}}\left( {1^{\lambda},\overset{\rightarrow}{n}} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 123} \right\rbrack \end{matrix}$

(S103: Public Parameter Generation Step)

With the processing device, the master key generation part 110 generates subbases B^(^) ₀, B^(^) _(t), H^(^) _(D), B^(^*) ₀, B^(^*) _(t), and H^(^*) _(u) of the bases B₀, B_(t), H_(t), B*₀, B*_(t), and H*_(t), respectively, as indicated in Formula 124.

:=(b _(0,1) , . . . ,b _(0,4) ,b _(0,9)),

=(b _(t,1) , . . . ,b _(t,n) _(t) ,b _(t,N) _(t) ) for t=1, . . . ,d,

:==(h _(u,1) , . . . h _(u,n) _(u) ,h _(u,N) _(u) ) for u=1, . . . ,d,

:=(b _(0,2) *,b _(0,3) *,b _(0,4) *,b _(0,7) *,b _(0,8)*),

:=(b _(t,1) *, . . . ,b _(t,n) _(t) *,b _(t,n) _(t) _(+w) _(t) ₁ *, . . . ,b _(t,n) _(t) _(+w) _(t) _(+z) _(t) *) for t=1, . . . ,d,

:=h _(u,n) _(u) _(+w) _(u) ₊₁ *, . . . ,h _(u,n) _(u) _(+w) _(u) _(+z) _(u) ) for u=1, . . . ,d  [Formula 124]

The master key generation part 110 treats the public parameters pk^(CP-FE), security parameter λ, paramn_(n→), and subbases B^(^) ₀, B^(^) _(t), H^(^*) _(u), B^(^*) ₀, B^(^*) _(t), and H^(^*) _(u), to form the public parameters pk.

(S104: Master Key Generation Step)

The master key generation part 110 uses the master key sk^(CP-FE), basis vector b*_(0,1), and some basis vectors of a basis H*_(u) indicated in Formula 125, to form the master key sk. {h _(u,1) *, . . . h _(u,n) _(u) }_(u=1, . . . ,d)  [Formula 125]

(S105: Master Key Storing Step)

The master key storage part 120 stores the public parameters pk generated in (S103), to the storage device. The master key storage part 120 also stores the master key sk generated in (S104), to the storage device.

In brief, from (S101) through (S104), the key generation device 100 generates the public parameters pk and the master key sk by executing the Setup algorithm indicated in Formula 126-1 and Formula 126-2. Then, in (S105), the key generation device 100 stores the generated public parameters pk and master key sk, to the storage device.

Note that the public parameters are publicized via, e.g., a network, so the encryption device 200, decryption device 300, re-encryption device 400, and re-ciphertext decryption device 500 can acquire them.

$\begin{matrix} {{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{n} = \left( {{d;n_{1}},\ldots\mspace{14mu},{n_{d};w_{1}},\ldots\mspace{14mu},{w_{d};z_{1}},\ldots\mspace{14mu},z_{d}} \right)}} \right)}\text{:}}\mspace{20mu}{{{parm}_{??}:={\left( {q,{??},{??}_{T},g,e} \right)\overset{R}{\longleftarrow}{{??}_{bpg}\left( 1^{\lambda} \right)}}},{N_{0}:=9},{N_{t}:={{n_{t} + w_{t} + z_{t} + {1\mspace{14mu}{for}\mspace{14mu} t}} = 1}},\ldots\mspace{14mu},d,\mspace{20mu}{\psi\overset{U}{\longleftarrow}{??}_{q}^{\times}},{g_{T}:={{e\left( {g,g} \right)}\psi}},{{{for}\mspace{14mu} t} = 0},\ldots\mspace{14mu},d,{{param}_{{??}_{t}}:=\mspace{34mu}{\left( {q,{??},{??}_{T},{??}_{t},e} \right)\overset{R}{\longleftarrow}{{??}_{dpvs}\left( {1^{\lambda},N_{t},{param}_{??}} \right)}}},\mspace{20mu}{X_{t}:={\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1} \\ \vdots \\ {{\overset{\rightarrow}{\chi}}_{t},N_{t}} \end{pmatrix}:={\left( \chi_{t,i,j} \right)_{i,j}\overset{U}{\longleftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}}}},\mspace{20mu}{\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1} \\ \vdots \\ {{\overset{\rightarrow}{v}}_{t},N_{t}} \end{pmatrix}:={\left( v_{t,i,j} \right)_{i,j}:={\psi \cdot \left( X_{t}^{T} \right)^{- 1}}}},\mspace{20mu}{{parm}_{\overset{\rightarrow}{n}}:=\left( \left\{ {parm}_{t} \right\}_{{t = 0},\ldots\mspace{14mu},d,g_{T}} \right)},\mspace{20mu}{b_{t,i}:={\sum\limits_{j = 1}^{N_{t}}\;{\chi_{t,i,j}a_{t,j}}}},{{??}_{t}:=\left( {b_{t,1},\ldots\mspace{14mu},b_{t,N_{t}}} \right)},\mspace{20mu}{b_{t,i}^{*}:={\sum\limits_{j = 1}^{N_{t}}\;{v_{t,i,j}a_{t,j}}}},{{??}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots\mspace{14mu},b_{t,N_{t}}^{*}} \right)},\mspace{20mu}{X_{t}^{\prime} = {\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1}^{\prime} \\ \vdots \\ {{\overset{\rightarrow}{\chi}}_{t}^{\prime},N_{t}} \end{pmatrix}:={\left( \chi_{t,i,j}^{\prime} \right)_{i,j}\overset{U}{\longleftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}}}},\mspace{20mu}{\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1}^{\prime} \\ \vdots \\ {{\overset{\rightarrow}{v}}_{t}^{\prime},N_{t}} \end{pmatrix}:={\left( v_{t,i,j}^{\prime} \right)_{i,j}:={\psi \cdot \left( X_{t}^{\prime\; T} \right)^{- 1}}}},}} & \left\lbrack {{Formula}\mspace{14mu} 126\text{-}1} \right\rbrack \\ {\mspace{79mu}{{{h_{t,i}:={\sum\limits_{j = 1}^{N_{t}}\;{\chi_{t,i,j}^{\prime}a_{t,j}}}},{{\mathbb{H}}_{t}:=\left( {h_{t,1},\ldots\mspace{14mu},h_{t,N_{t}}} \right)},\mspace{20mu}{h_{t,i}^{*}:={\sum\limits_{j = 1}^{N_{t}}\;{v_{t,i,j}^{\prime}a_{t,j}}}},{{\mathbb{H}}_{t}^{*}:=\left( {h_{t,1}^{*},\ldots\mspace{14mu},h_{t,N_{t}}^{*}} \right)},\mspace{20mu}{\left( {{pk}^{{CP} - {FE}},{sk}^{{CP} - {FE}}} \right)\overset{R}{\longleftarrow}{{Setup}_{{CP} - {FE}}\left( {1^{\lambda},\overset{\rightarrow}{n}} \right)}}}\mspace{20mu}{{{\hat{??}}_{0}:=\left( {b_{0,1},\ldots\mspace{14mu},b_{0,4},b_{0,9}} \right)},\mspace{20mu}{{\hat{??}}_{t}:={{\left( {b_{t,1},\ldots\mspace{14mu},b_{t,n_{t}},b_{t,N_{t}}} \right){for}\mspace{14mu} t} = 1}},\ldots\mspace{14mu},d,\mspace{20mu}{{\hat{\mathbb{H}}}_{u}:={{\left( {h_{u,1},\ldots\mspace{14mu},h_{u,n_{u}},h_{u,N_{u}}} \right){for}\mspace{14mu} u} = 1}},\ldots\mspace{14mu},d,\mspace{20mu}{{\hat{??}}_{0}^{*}:=\left( {b_{0,2}^{*},b_{0,3}^{*},b_{0,4}^{*},b_{0,7}^{*},b_{0,8}^{*}} \right)},\mspace{20mu}{{\hat{??}}_{t}^{*}:=\left( {b_{t,1}^{*},\ldots\mspace{14mu},b_{t,n_{t}}^{*},b_{t,{n_{t} + w_{t} + 1}}^{*},\ldots\mspace{14mu},b_{t,{n_{t} + w_{t} + z_{t}}}^{*}} \right)}}\mspace{20mu}{{{{for}\mspace{14mu} t} = 1},\ldots\mspace{14mu},d,\mspace{20mu}{{\hat{\mathbb{H}}}_{u}^{*}:=\left( {h_{u,{n_{u} + w_{u} + 1}}^{*},\ldots\mspace{14mu},h_{u,{n_{u} + w_{u} + z_{u}}}^{*}} \right)}}\mspace{20mu}{{{{for}\mspace{14mu} u} = 1},\ldots\mspace{14mu},d,{{{return}\mspace{14mu}{pk}} = \left( {1^{\lambda},{pk}^{{CP} - {FE}},{param}_{\overset{\rightarrow}{n}},\left\{ {{\hat{??}}_{t},{\hat{??}}_{t}^{*}} \right\}_{{t = 0},\ldots\mspace{14mu},d},\left\{ {{\hat{\mathbb{H}}}_{u},{\hat{\mathbb{H}}}_{u}^{*}} \right\}_{{u = 1},\ldots\mspace{14mu},d}} \right)},\mspace{20mu}{{sk} = {\left( {{sk}^{{CP} - {FE}},b_{0,1}^{*},\left\{ {h_{u,1}^{*},\ldots\mspace{14mu},h_{u,n_{u}}^{*}} \right\}_{{u = 1},\ldots\mspace{14mu},d}} \right).}}}}} & \left\lbrack {{Formula}\mspace{14mu} 126\text{-}2} \right\rbrack \end{matrix}$

The process of the KG algorithm will now be described with reference to FIG. 12.

(S201: Information Input Step)

With the input device, the information input part 130 takes as input the attribute set Γ:={(t,x^(→) _(t):=(x_(t,1), . . . , x_(t,nt)∈F_(q) ^(nt)\{0^(→}))|)1≤t≤d}. Note that t need not be all integers t of 1≤t≤d, but may be at least some of the integers t of 1≤t≤d. The attribute information of the user of the decryption key sk_(Γ), for example, is set in the attribute set Γ.

(S202: CP-FE Decryption Key Generation Step)

With the processing device, the CP-FE key generation part 141 calculates Formula 127, to generate the decryption key sk_(Γ) ^(CP-FE) of functional encryption.

$\begin{matrix} {{sk}_{\Gamma}^{{CP} - {FE}}\overset{R}{\longleftarrow}{{KG}^{{CP} - {FE}}\left( {{pk}^{{CP} - {FE}},{sk}^{{CP} - {FE}},\Gamma} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 127} \right\rbrack \end{matrix}$

(S203: Random Number Generation Step)

With the processing device, the random number generation part 142 generates random numbers, as indicated in Formula 128.

$\begin{matrix} {{\delta\overset{U}{\longleftarrow}{??}_{q}},{{\overset{\rightarrow}{\varphi}}_{0}\overset{U}{\longleftarrow}{??}_{q}^{2}},{{{{\overset{\rightarrow}{\varphi}}_{t}\overset{U}{\longleftarrow}{??}_{q}^{z_{t}}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{{{{\overset{\rightarrow}{\overset{\sim}{\varphi}}}_{t}\overset{U}{\longleftarrow}{??}_{q}^{z_{u}}}\mspace{14mu}{for}\mspace{14mu} u} = 1},\ldots\mspace{14mu},d} & \left\lbrack {{Formula}\mspace{14mu} 128} \right\rbrack \end{matrix}$

(S204: Decryption Key k* Generation Step)

With the processing device, the decryption key k* generation part 143 generates a decryption key k*₀, as indicated in Formula 129. k ₀*:=(1,δ,0²,0²,{right arrow over (ϕ)}₀,0)

  [Formula 129]

For the bases B and B* indicated in Formula 110, Formula 111 is established. Hence, Formula 129 means that: 1 is set as the coefficient for a basis vector b*_(0,1) of a basis B*₀; δ is set as the coefficient for basis vector b*_(0,2); 0 is set as the coefficient for basis vectors b*_(0,3), . . . , b*_(0,6); ϕ_(0,1) and ϕ_(0,2) are set as the coefficients for basis vectors b*_(0,7) and b*_(0,8), respectively; and 0 is set as the coefficient for a basis vector b*_(0,9).

Also, with the processing device, the decryption key k* generation part 143 generates a decryption key k*_(t) for each integer t included in the attribute set Γ, as indicated in Formula 130.

$\begin{matrix} {{k_{t}^{*}:={\left( {\overset{\overset{n_{t}}{︷}}{{\delta\;{\overset{\rightarrow}{x}}_{t}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{{\overset{\rightarrow}{\varphi}}_{t},}\overset{\overset{1}{︷}}{0}} \right)_{{??}_{t}^{*}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}},{\in \Gamma}} & \left\lbrack {{Formula}\mspace{14mu} 130} \right\rbrack \end{matrix}$

Formula 130 means that: δx_(t,1), . . . , δx_(t,nt) are set as the coefficients for basis vectors b*_(t,1), . . . , b*_(t,nt), respectively; 0 is set as the coefficient for basis vectors b*_(t,nt+1), . . . , b*_(t,nt+wt), respectively; ϕ_(t,1), . . . , ϕ_(t,zt) are set as the coefficients for basis vectors b*_(t,nt+wt+1), . . . , b*_(t,nt+wt+zt), respectively; and 0 is set as the coefficient for a basis vector b*_(t,nt+wt+zt+1).

With the processing device, the decryption key k* generation part 143 generates a decryption key k^(˜*) _(u,i) for each integer u of u=1, . . . , d and each integer i of i=1, . . . , n_(u), as indicated in Formula 131.

$\begin{matrix} {{{\overset{\sim}{k}}_{u,i}^{*}:={{\delta\; h_{u,i}^{*}} + \left( {\overset{\overset{n_{u}}{︷}}{0^{n_{u}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{{\overset{\rightarrow}{\overset{\sim}{\varphi}}}_{u},}\overset{\overset{1}{︷}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}}}\mspace{14mu}{{{{for}\mspace{14mu} u} = 1},\ldots\mspace{14mu},{d;{i = 1}},\ldots\mspace{14mu},n_{u}}} & \left\lbrack {{Formula}\mspace{14mu} 131} \right\rbrack \end{matrix}$

(S205: Key Transmission Step)

For example, with the communication device, the key transmission part 150 transmits the decryption key sk_(Γ) constituted as elements by the attribute set Γ, the decryption key sk_(Γ) ^(CP-FE) of functional encryption, and the decryption keys k*₀, k*_(t), and k^(˜*) _(u,i), to the decryption device 300 in secrecy via the network. As a matter of course, the decryption key sk_(Γ) may be transmitted to the decryption device 300 by another method.

In brief, from (S201) through (S204), the key generation device 100 generates the decryption key sk_(Γ) by executing the KG algorithm indicated in Formula 132. Then, in (S205), the key generation device 100 transmits the decryption key sk_(Γ) to the decryption device 300.

$\begin{matrix} {{{KG} = {\left( {{pk},{sk},{\Gamma = \left( {\left. \left\{ {t,{\overset{\rightarrow}{x}}_{t}} \right) \middle| {{\overset{\rightarrow}{x}}_{t} \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}} \right.,{1 \leq t \leq d}} \right\}}} \right)\text{:}}}\mspace{20mu}{{{sk}_{\Gamma}^{{CP} - {FE}}\overset{R}{\longleftarrow}{{KG}^{{CP} - {FE}}\left( {{pk}^{{CP} - {FE}},{sk}^{{CP} - {FE}},\Gamma} \right)}},\mspace{20mu}{\delta\overset{U}{\longleftarrow}{??}_{q}},{{\overset{\rightarrow}{\varphi}}_{0}\overset{U}{\longleftarrow}{??}_{q}^{2}},{{{{\overset{\rightarrow}{\varphi}}_{t}\overset{U}{\longleftarrow}{??}_{q}^{z_{t}}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{{{{\overset{\rightarrow}{\overset{\sim}{\varphi}}}_{u}\overset{U}{\longleftarrow}{??}_{q}^{z_{u}}}\mspace{14mu}{for}\mspace{14mu} u} = 1},\ldots\mspace{14mu},d,\mspace{20mu}{k_{0}^{*}:=\left( {1,\delta,0^{2},0^{2},{\overset{\rightarrow}{\varphi}}_{0},0} \right)_{{??}_{0}^{*}}},\mspace{20mu}{k_{t}^{*}:={\left( {\overset{\overset{n_{t}}{︷}}{{\delta\;{\overset{\rightarrow}{x}}_{t}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{{\overset{\rightarrow}{\varphi}}_{t},}\overset{\overset{1}{︷}}{0}} \right)_{{??}_{t}^{*}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}},{\in \Gamma},\mspace{20mu}{{\overset{\sim}{k}}_{u,i}^{*}:={{\delta\; h_{u,i}^{*}} + \left( {\overset{\overset{n_{u}}{︷}}{0^{n_{u}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{{\overset{\rightarrow}{\overset{\sim}{\varphi}}}_{u},}\overset{\overset{1}{︷}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}}}}{{{return}\mspace{14mu}{sk}_{\Gamma}}:={\left( {\Gamma,{sk}_{\Gamma}^{{CP} - {FE}},k_{0}^{*},\left( k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ {\overset{\sim}{k}}_{u,i}^{*} \right\}_{{u = 1},\ldots\mspace{14mu},{d;{i = 1}},\ldots\mspace{14mu},n_{u}}} \right).}}} & \left\lbrack {{Formula}\mspace{14mu} 132} \right\rbrack \end{matrix}$

In (S201), the key generation device 100 executes the KG algorithm by taking as input an attribute set Γ′:={(t,x′^(→) _(t):=(x′_(t,1), . . . , x′_(t,n)∈F_(q) ^(nt)\{0^(→)}))|1≤t≤d} to which the attribute information of the user of the decryption key sk_(Γ′) has been set, to generate the decryption key sk_(Γ′). Then, the key generation device 100 transmits the decryption key sk_(Γ′):=(Γ′, sk_(Γ′) ^(CP-EE),k′*₀,{k′_(t)}_((t,x→t)∈Γ),{k′^(˜*) _(t,i)}_(u=1, . . . ,d; i=1, . . . ,nu)), to the re-ciphertext decryption device 500.

The function and operation of the encryption device 200 will be described.

As illustrated in FIG. 7, the encryption device 200 is provided with a public parameter reception part 210, an information input part 220, a signature processing part 230, an encryption part 240, and a ciphertext transmission part 250 (ciphertext output part). The encryption part 240 is provided with an f vector generation part 241, an s vector generation part 242, a random number generation part 243, and a ciphertext c generation part 244.

The process of the Enc algorithm will be described with reference to FIG. 13.

(S301: Public Parameter Reception Step)

For example, with the communication device, the public parameter reception part 210 receives the public parameters pk generated by the key generation device 100, via the network.

(S302: Information Input Step)

With the input device, the information input part 220 takes as input the access structures S:=(M,ρ) and S^(˜):=(M^(˜),ρ^(˜)). The access structures S and S^(˜) are set depending on the condition of a system to be implemented. The attribute information of the user who can decrypt the ciphertext ct_(S), for example, is set to p of the access structure S. Information for setting a condition that enables re-encryption, for example, is set to ρ^(˜) of the access structure S^(˜). Note that ρ(i)=(t,v^(→) _(i):=(v₁, . . . , v_(i,nt))∈F_(q) ^(nt)\{0^(→)}))(v_(i,nt)≠0) and that ρ^(˜)(i)=(u,z^(→) _(i):=(z_(i,1), . . . , z_(i,nu))∈F_(q) ^(nu) \{0^(→)}) (z_(i,nu)≠0). M is an (L rows×r columns) matrix, and M^(˜) is an (L^(˜) rows×r^(˜) columns) matrix.

With the input device, the information input part 220 takes as input the message m to be transmitted to the decryption device 300.

(S303: Signature Key Generation Step)

With the processing device, the signature processing part 230 calculates formula 133, to generate the signature key sigk for one-time signature and the verification key verk.

$\begin{matrix} {\left( {{sigk},{verk}} \right)\overset{R}{\longleftarrow}{{SigKG}\left( 1^{\lambda} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 133} \right\rbrack \end{matrix}$

(S304: f Vector Generation Step)

With the processing device, the f vector generation part 241 generates vectors r^(→) and f^(→) randomly as indicated in Formula 134.

$\begin{matrix} {{\overset{\rightarrow}{f}\overset{U}{\longleftarrow}{??}_{q}^{r}},{\overset{\rightarrow}{\overset{\sim}{f}}\overset{U}{\longleftarrow}{??}_{q}^{\overset{\sim}{r}}}} & \left\lbrack {{Formula}\mspace{14mu} 134} \right\rbrack \end{matrix}$

(S305: s Vector Generation Step)

With the processing device, the s vector generation part 242 generates vectors s^(→T) and s^(˜→T) as indicated in Formula 135. {right arrow over (s)} ^(T):=(s ₁ , . . . ,s _(L))^(T) :=M·{right arrow over (f)} ^(T) {tilde over ({right arrow over (s)})}^(T):=({tilde over (s)} ₁ , . . . ,{tilde over (s)} _(L))^(T) :={tilde over (M)}·{tilde over ({right arrow over (f)})}^(T)  [Formula 135]

With the processing device, the s vector generation part 242 also generates values s₀ and s^(˜) ₀ as indicated in Formula 136. s ₀:={right arrow over (1)}·{right arrow over (f)} ^(T), {tilde over (s)} ₀:={right arrow over (1)}·{tilde over ({right arrow over (f)})}^(T)  [Formula 136]

(S306: Random Number Generation Step)

With the processing device, the random number generation part 243 generates random numbers as indicated in Formula 137.

$\begin{matrix} {\pi,\eta_{0},\zeta,\overset{\sim}{\pi},{\overset{\sim}{\eta}}_{0},{\overset{\sim}{\zeta}\overset{U}{\longleftarrow}{??}_{q}},\theta_{i},\eta_{i},{{{\tau_{i}\overset{U}{\longleftarrow}{??}_{q}}\mspace{14mu}{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{\overset{\sim}{\theta}}_{j},{\overset{\sim}{\eta}}_{j},{{{{\overset{\sim}{\tau}}_{j}\overset{U}{\longleftarrow}{??}_{q}}\mspace{14mu}{for}\mspace{14mu} j} = 1},\ldots\mspace{14mu},\overset{\sim}{L}} & \left\lbrack {{Formula}\mspace{14mu} 137} \right\rbrack \end{matrix}$

(S307: Ciphertext c Generation Step)

With the processing device, the ciphertext c generation part 244 generates a ciphertext c₀ as indicated in Formula 138. c ₀:=(ζ,−s ₀,π(verk,1),0²,0²,η₀)

  [Formula 138]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c, for each integer i of i=1, . . . , L, as indicated in Formula 139.

$\begin{matrix} {{{{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{c_{i}:=\left( {{\overset{\overset{n_{t}}{︷}}{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}\overset{\rightarrow}{v}}}}_{t},\overset{\overset{w_{t}}{︷}}{0^{w_{t}}},\overset{\overset{z_{t}}{︸}}{0^{z_{t}}},\overset{\overset{1}{︷}}{\eta_{i}}} \right)_{{??}_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{c_{i}:=\left( {{\overset{\overset{n_{t}}{︷}}{s_{i}\overset{\rightarrow}{v}}}_{t},\overset{\overset{w_{t}}{︷}}{0^{w_{t}}},\overset{\overset{z_{t}}{︸}}{0^{z_{t}}},\overset{\overset{1}{︷}}{\eta_{i}}} \right)_{{??}_{t}}}} & \left\lbrack {{Formula}\mspace{14mu} 139} \right\rbrack \end{matrix}$

With the processing device, the ciphertext c generation part 244 generates a ciphertext c_(T) as indicated in formula 140. c _(T) :=m·g _(T) ^(ζ)  [Formula 140]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) ₀ as indicated in Formula 141. {tilde over (c)} ₀:=({tilde over (ζ)},−{tilde over (s)} ₀,{tilde over (π)}(verk,1),0²,0²,{tilde over (η)}₀)

  [Formula 141]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) _(j) for each integer j of j=1, . . . , L^(˜), as indicated in Formula 142.

$\begin{matrix} {{{{for}\mspace{14mu} j} = 1},\ldots\mspace{14mu},\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{\overset{\sim}{c}}_{j}:=\left( {{\overset{\overset{n_{u}}{︷}}{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}\overset{\rightarrow}{z}}}}_{j},\overset{\overset{w_{u}}{︷}}{0^{w_{u}}},\overset{\overset{z_{u}}{︸}}{0^{z_{u}}},\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{j}}} \right)_{{\mathbb{H}}_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{c}}_{j}:=\left( {\overset{\overset{n_{u}}{︷}}{{\overset{\sim}{s}}_{j}{\overset{\sim}{z}}_{j}},\overset{\overset{w_{u}}{︷}}{0^{w_{u}}},\overset{\overset{z_{u}}{︸}}{0^{z_{u}}},\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{j}}} \right)_{{\mathbb{H}}_{u}}}} & \left\lbrack {{Formula}\mspace{14mu} 142} \right\rbrack \end{matrix}$

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) _(T) as indicated in Formula 142. {tilde over (c)} _(T) :=m·g _(T) ^({tilde over (ζ)})  [Formula 143]

(S308: Signature Generation Step)

With the processing device, the signature processing part 230 calculates Formula 144, to generate a signature Sig for an element C of the ciphertext ct_(S).

$\begin{matrix} {{Sig}\overset{R}{\longleftarrow}{{Sig}\left( {{sigk},{C:=\left( {{??},\overset{\sim}{??},\left\{ c_{i} \right\}_{{i = 0},\ldots\mspace{14mu},L},\left\{ {\overset{\sim}{c}}_{j} \right\}_{{j = 0},\ldots\mspace{14mu},\overset{\sim}{L}},c_{T},{\overset{\sim}{c}}_{T}} \right)}} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 144} \right\rbrack \end{matrix}$

(S309: Ciphertext Transmission Step)

For example, with the communication device, the ciphertext transmission part 250 transmits the ciphertext ct_(S) constituted as elements by the access structures S and S^(˜), ciphertexts c₀, c₁, . . . , c_(L), c_(T), c^(˜) ₀, c^(˜) ₁, . . . , c^(˜) _(L˜), and c^(˜) _(T), the verification key verk, and the signature Sig, to the decryption device 300 via the network. The ciphertext ct_(S) may be transmitted to the decryption device 300 by another method, as a matter of course.

In brief; from (S301) through (S308), the encryption device 200 executes the Enc algorithm indicated in Formula 145-1 and Formula 145-2, to generate the ciphertext ct_(S). In (S309), the encryption device 200 transmits the generated ciphertext ct_(S) to the decryption device 300.

$\begin{matrix} {\mspace{79mu}{{{Enc} = {\left( {{pk},m,{{??} = \left( {M,\rho} \right)},{\overset{\sim}{??} = \left( {\overset{\sim}{M},\overset{\sim}{\rho}} \right)}} \right)\text{:}}}\mspace{79mu}{{\left( {{sigk},{verk}} \right)\overset{R}{\leftarrow}{{SigKG}\left( 1^{\lambda} \right)}},\mspace{79mu}{\overset{\rightarrow}{f}\overset{U}{\leftarrow}{??}_{q}^{r}},{\overset{\overset{\rightarrow}{\sim}}{f}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}},\mspace{20mu}{{\overset{\rightarrow}{s}}^{T}:={\left( {s_{1},\ldots\mspace{14mu},s_{L}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{T}}}},\mspace{20mu}{s_{0}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\mspace{20mu}{{\overset{\rightarrow}{\overset{\sim}{s}}}^{T}:={\left( {{\overset{\sim}{s}}_{1},\ldots\mspace{14mu},{\overset{\sim}{s}}_{\overset{\sim}{L}}} \right)^{T}:={\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}}},\mspace{20mu}{{\overset{\sim}{s}}_{0}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},\mspace{20mu}\pi,\eta_{0},Ϛ,\overset{\sim}{\pi},{\overset{\sim}{\eta}}_{0},{\overset{\sim}{Ϛ}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{c_{0}:=\left( {Ϛ,{- s_{0}},{\pi\left( {{verk},1} \right)},0^{2},0^{2},\eta_{0}} \right)_{{??}_{0}}},\mspace{20mu}{{\overset{\sim}{c}}_{0}:=\left( {\overset{\sim}{Ϛ},{- {\overset{\sim}{s}}_{0}},{\overset{\sim}{\pi}\left( {{verk},1} \right)},0^{2},0^{2},{\overset{\sim}{\eta}}_{0}} \right)_{{??}_{0}}},\mspace{20mu}{c_{T}:={m \cdot g_{T}^{Ϛ}}},{{\overset{\sim}{c}}_{T}:={m \cdot g_{T}^{\overset{\sim}{Ϛ}}}},}}} & {\left\lbrack {{Formula}\mspace{14mu} 145\text{-}1} \right\rbrack\mspace{14mu}} \\ {\mspace{79mu}{{{{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t\;,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{i,1},\ldots\mspace{14mu},v_{i,n_{t}}} \right) \in {\left. \quad{{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}} \right)\left( {v_{i,n_{t}} \neq 0} \right)}}},\mspace{20mu}\theta_{i},\eta_{i},{\tau_{i}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{c_{i}:=\left( {\overset{\overset{n_{t}}{︷}}{{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}{\overset{\rightarrow}{v}}_{t}}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}}} \right)_{{??}_{t}}},\mspace{20mu}{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},\mspace{20mu}{\eta_{i}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{c_{i}:=\left( {\overset{\overset{n_{t}}{︷}}{{s_{i}{\overset{\rightarrow}{v}}_{t}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}}} \right)_{{??}_{t}}},\mspace{20mu}{{{for}\mspace{14mu} j} = 1},\ldots\mspace{14mu},\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {\left( {u,{{\overset{\rightarrow}{z}}_{j}:={\left( {z_{j,1},\ldots\mspace{14mu},z_{j,n_{u}}} \right) \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}}} \right)\left( {z_{j,n_{u}} \neq 0} \right)}},\mspace{20mu}{\overset{\sim}{\theta}}_{j},{\overset{\sim}{\eta}}_{j},{{\overset{\sim}{\tau}}_{j}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{{\overset{\sim}{c}}_{j}:=\left( {\overset{\overset{n_{u}}{︷}}{{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}{\overset{\sim}{z}}_{j}}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{j}}} \right)_{{\mathbb{H}}_{u}}},\mspace{20mu}{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},\mspace{20mu}{{\overset{\sim}{\eta}}_{j}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{{\overset{\sim}{c}}_{j}:=\left( {\overset{\overset{n_{u}}{︷}}{{{\overset{\sim}{s}}_{j}{\overset{\sim}{z}}_{j}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{i}}} \right)_{{\mathbb{H}}_{u}}},\mspace{20mu}{{Sig}\overset{R}{\leftarrow}{{Sig}\left( {{sigk},\mspace{20mu}{C:=\left( {{??},\overset{\sim}{??},\left\{ c_{i} \right\}_{{i = 0},\ldots\mspace{14mu},L},\mspace{20mu}\left\{ {\overset{\sim}{c}}_{j} \right\}_{{j = 0},\ldots\mspace{14mu},\overset{\sim}{L}},c_{T},{\overset{\sim}{c}}_{T}} \right)}} \right)}},\mspace{20mu}{{ct}_{??}:={\left( {{??},\overset{\sim}{??},\left\{ c_{i} \right\}_{{i = 0},\ldots\mspace{14mu},L},\mspace{20mu}\left\{ {\overset{\sim}{c}}_{j} \right\}_{{j = 0},\ldots\mspace{14mu},L},c_{T},{\overset{\sim}{c}}_{T},{verk},{Sig}} \right).}}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 145\text{-}2} \right\rbrack \end{matrix}$

The function and operation of the decryption device 300 will be described.

As illustrated in FIG. 8, the decryption device 300 is provided with a decryption key reception part 310, an information input part 320, a re-encryption key generation part 330, a re-encryption key transmission part 340 (re-encryption key output part), a ciphertext reception part 350, a verification part 360, a complementary coefficient calculation part 370, a pairing operation part 380, and a message calculation part 390. The re-encryption key generation part 330 is provided with a random number generation part 331, a conversion information W₁ generation part 332, a conversion information W₁ encryption part 333, a decryption key k^(*rk) generation part 334, and a conversion part 335. The verification part 360 is provided with a span program calculation part 361 and a signature verification part 362.

The process of the RKG algorithm will be described with reference to FIG. 14. The Dec2 algorithm will be described later.

(S401: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 310 receives the decryption key sk_(Γ) transmitted from the key generation device 100, via the network. The decryption key reception part 310 also receives the public parameters pk generated by the key generation device 100.

(S402: Information Input Step)

With the input device, the information input part 320 takes as input the access structure S′:=(M′, ρ′). The access structure S′ is set depending on the condition of a system to be implemented. The attribute info′ cation of the user who can decrypt the re-ciphertext ct_(S′), for example, is set to ρ′ of the access structure S′. Note that ρ′(i)=(t,v^(→′) _(i):=(v′_(i,1), . . . , v′_(i,nt))∈F_(q) ^(nt)\{0^(→)}) (v′_(i,nt)≠0).

With the input device, the information input part 320 takes as input the attribute set Γ^(˜):={(u,y^(→) _(u):=y_(u,1), . . . , y_(u,nu)∈F_(q) ^(nu)\{0^(→)}))|1≤t≤d}. Note that u need not be all the integers u of 1≤u≤d but may be at least some of the integers u of 1≤u≤d. Attribute information indicating a condition that enables re-encryption, for example, is set to the attribute set F.

(S403: Random Number Generation Step)

With the processing device, the random number generation part 331 generates random numbers as indicated in Formula 146.

$\begin{matrix} {\delta^{\prime},{\delta_{ran}^{\prime}\overset{U}{\leftarrow}{??}_{q}},{\overset{\rightarrow}{\varphi}}^{\prime},{{\overset{\rightarrow}{\varphi}}_{ran}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{2}},{\overset{\rightarrow}{\varphi}}_{t}^{\prime},{{{\overset{\rightarrow}{\varphi}}_{t,{ran}}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\rightarrow}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{14mu} 146} \right\rbrack \end{matrix}$

(S404: Conversion Information W₁ Generation Step)

With the processing device, the conversion information W₁ generation part 332 generates conversion information W_(1,0), W_(1,t), and W^(˜) _(1,u), as indicated in Formula 147.

$\begin{matrix} {{W_{1,0}\overset{U}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},{{W_{1,t}\overset{U}{\leftarrow}{{{GL}\left( {N_{t},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\sim}{W}}_{1,u}\overset{U}{\leftarrow}{{{GL}\left( {N_{u},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{20mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{20mu} 147} \right\rbrack \end{matrix}$

(S405: Conversion Information W₁ Encryption Step)

With the processing device, the conversion information W₁ encryption part 333 calculates Formula 148, to encrypt the conversion information W_(1,0), W_(1,t), and W^(˜) _(1,u) by functional encryption, thereby generating encrypted conversion information ct^(rk) _(S′)(ϕ^(rk)). As the conversion information W_(1,0), W_(1,t), and W^(˜) _(1,u) are encrypted by functional encryption that takes as input the access structure S′, they are encrypted by setting the attribute information of the user capable of decrypting the re-ciphertext rct_(S).

$\begin{matrix} {{ct}_{{??}^{\prime}}^{rk}\overset{R}{\leftarrow}{{Enc}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{??}^{\prime},\left( {\left\{ W_{1,t} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ W_{1,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},\Gamma,\overset{\sim}{\Gamma}} \right)} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 148} \right\rbrack \end{matrix}$

(S406: Decryption Key k^(*rk) Generation Step)

With the processing device, the decryption key k^(*rk) generation part 334 generates decryption keys k^(*rk) ₀ and k^(*rk) _(0,ran), as indicated in Formula 149. k ₀ ^(*rk):=(k ₀*+(0,0,0⁴,{right arrow over (ϕ)}′,0)

)W _(1,0), k _(0,ran) ^(*rk):=(0,0,0⁴,{right arrow over (ϕ)}_(ran)′,0)

W _(1,0)  [Formula 149]

Also, with the processing device, the decryption key k^(*rk) generation part 334 generates decryption keys k^(*rk) _(t) and k^(*rk) _(t,ran) for each integer t included in the attribute set Γ, as indicated in Formula 150. k _(r) ^(*rk):=(k _(t)*+(0^(n) ^(t) ,0^(w) ^(t) ,{right arrow over (ϕ)}_(t)′;0)

)W _(1,t) for (t,{right arrow over (x)} _(t))∈Γ, k _(t,ran) ^(*rk):=(0^(n) ^(t) ,0^(w) ^(t) ,{right arrow over (ϕ)}_(t,ran)′,0)

W _(1,t) for (t,{right arrow over (x)} _(t))∈Γ  [Formula 150]

Also, with the processing device, the decryption key k^(*rk) generation part 334 generates a decryption key k^(˜*rk) _(u) for each integer u included in the attribute set Γ^(˜), as indicated in Formula 151.

$\begin{matrix} {{{{{{\overset{\sim}{k}}_{u,i}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{y}}_{u,i}{\overset{\sim}{k}}_{u,i}^{*}} + {\left( {\overset{\underset{︷}{n_{u}}}{0^{n_{u}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\varphi}}_{u},}\overset{\underset{︷}{1}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,u}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}};{i = 1}},\ldots,n_{u},{{{\overset{\sim}{k}}_{u}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{i = 1}^{n_{u}}{{\overset{\sim}{k}}_{u,i}^{*{rk}}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{14mu} 151} \right\rbrack \end{matrix}$

(S407: Conversion Step)

With the processing device, the conversion part 335 calculates Formula 152, to generate bases D^(^*) ₀, D^(^*) _(t), and U^(^*) _(u).

:=(d _(0,i) *:=b _(0,i) *W _(1,0))_(i=3,4,7,8),

:=(d _(t,i) *:=b _(0,i)(W _(1,t))_(i=n) _(t) _(+w) _(t) _(+1, . . . ,n) _(t) _(+w) _(t) _(+z) _(t) for t=1, . . . ,d,

:=(d _(u,i) *:=b _(0,i) *W _(1,u))_(i=n) _(u) _(+w) _(u) _(+1, . . . ,n) _(u) _(+w) _(u) _(+z) _(u) for u=1, . . . ,d  [Formula 152]

(S408: Key Transmission Step)

For example, with the communication device, the re-encryption key transmission part 340 transmits the re-encryption key rk_(Γ,S′) constituted as elements by the attribute sets Γ and Γ^(˜), the access structure S′, the decryption keys k^(*rk) ₀, k^(*rk) _(0,ran), k^(*rk) _(t), k^(*rk) _(t,ran), and k^(˜*rk) _(u), the encrypted conversion information ct^(rk) _(S′), and the bases D^(^*) ₀, D^(^*) _(t), and U^(^*) _(u), to the re-encryption device 400 in secrecy via the network. As a matter of course, the re-encryption key rk_(Γ,S′) may be transmitted to the re-encryption device 400 by another method.

In brief, from (S401) through (S407), the decryption device 300 generates the re-encryption key rk_(Γ,S′) by executing the RKG algorithm indicated in Formula 153-1 and Formula 153-2. Then, in (S408), the decryption device 300 transmits the generated re-encryption key rk_(Γ,S′) to the re-encryption device 400.

$\begin{matrix} {\mspace{79mu}{{RKG} = \left( {{pk},{{sk}_{\Gamma}:=\left( {\Gamma,{sk}_{\Gamma}^{{CP}\text{-}{FE}},\mspace{20mu} k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ k_{u}^{*} \right\}_{{u = 1},\ldots\mspace{14mu},d}} \right)},{??}^{\prime},} \right.}} & \left\lbrack {{Formula}\mspace{14mu} 153\text{-}1} \right\rbrack \\ {{\left. {\Gamma:=\left( \left\{ {{\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)❘{{\overset{\rightarrow}{y}}_{u} \in {{??}_{q}^{n_{u}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}},{1 \leq u \leq d}} \right\} \right)} \right)\text{:}}\mspace{20mu}{\delta^{\prime},{\delta_{ran}^{\prime}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{\overset{\rightarrow}{\varphi}}^{\prime},{{\overset{\rightarrow}{\varphi}}_{ran}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{2}},\mspace{20mu}{\overset{\rightarrow}{\varphi}}_{t}^{\prime},{{{\overset{\rightarrow}{\varphi}}_{t,{ran}}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},\mspace{20mu}{{{\overset{\rightarrow}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}}\mspace{20mu}{{W_{1,0}\overset{U}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},\mspace{20mu}{{W_{1,t}\overset{U}{\leftarrow}{{{GL}\left( {N_{t},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},\mspace{20mu}{{{\overset{\sim}{W}}_{1,u}\overset{U}{\leftarrow}{{{GL}\left( {N_{u},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{20mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}}\mspace{20mu}{{ct}_{{??}^{\prime}}^{rk}\overset{R}{\leftarrow}{{Enc}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{??}^{\prime},\mspace{20mu}\left( {\left\{ W_{1,t} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ W_{1,u} \right\}_{u = {{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}},\Gamma,\overset{\sim}{\Gamma}} \right)} \right)}}} & \; \\ {\mspace{79mu}{{{k_{0}^{*{rk}}:={\left( {k_{0}^{*} + \left( {0,0,0^{4},{\overset{\rightarrow}{\varphi}}^{\prime},0} \right)_{{??}^{*}}} \right)W_{1,0}}},\mspace{20mu}{k_{0,{ran}}^{*{rk}}:={\left( {0,0,0^{4},{\overset{\rightarrow}{\varphi}}_{ran}^{\prime},0} \right)_{{??}^{*}}W_{1,0}}},{k_{t}^{*{rk}}:={{\left( {k_{t}^{*} + \left( {0^{n_{t}},0^{w_{t}},{\overset{\rightarrow}{\varphi}}_{t}^{\prime},0} \right)_{{??}_{t}^{*}}} \right)W_{1,t}\mspace{14mu}{{for}{\mspace{11mu}\;}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma}},{k_{t,{ran}}^{*{rk}}:={{\left( {0^{n_{t}},0^{w_{t}},{\overset{\rightarrow}{\varphi}}_{t,{ran}}^{\prime},0} \right)_{{??}_{t}^{*}}W_{1,t}\mspace{14mu}{{for}{\mspace{11mu}\;}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma}},{{\overset{\sim}{k}}_{u,i}^{*{rk}}:={{{\overset{\rightarrow}{y}}_{u,i}{\overset{\sim}{k}}_{u,i}^{*}} + {\left( {\overset{\overset{n_{u}}{︷}}{0^{n_{u}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{{\overset{\rightarrow}{\varphi}}_{u},}\overset{\overset{1}{︷}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,u}}}},\mspace{20mu}{{{{for}{\mspace{11mu}\;}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}};{i = 1}},\ldots\mspace{14mu},n_{u},\mspace{14mu}\mspace{20mu}{{\overset{\sim}{k}}_{u}^{*{rk}}:={{\sum_{i = 1}^{n_{u}}{{\overset{\sim}{k}}_{u,i}^{*{rk}}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}},\mspace{20mu}{{\hat{??}}_{0}^{*}:=\left( {d_{0,i}^{*}:={b_{0,i}^{*}W_{1,0}}} \right)_{{i = 3},4,7,8}},{{\hat{??}}_{t}^{*}:={\left( {d_{t,i}^{*}:={b_{0,i}^{*}W_{1,t}}} \right)_{{i = {n_{t} + w_{t} + 1}},\ldots\mspace{14mu},{n_{t} + w_{t} + z_{t}}}\mspace{14mu}\mspace{20mu}{{{for}\mspace{20mu} t} = 1}}},\ldots\mspace{14mu},d,{{\hat{??}}_{u}^{*}:=\left( {d_{u,i}^{*}:={b_{0,i}^{*}{\overset{\sim}{W}}_{1,u}}} \right)_{{i = {n_{u} + w_{u} + 1}},\ldots\mspace{14mu},{n_{u} + w_{u} + z_{u}}}}}\mspace{20mu}\mspace{20mu}{{{{for}\mspace{20mu} u} = 1},\ldots\mspace{14mu},d,{{{return}\mspace{14mu}{rk}_{\Gamma,{??}^{\prime}}}:={\left( {\Gamma,\overset{\sim}{\Gamma},{??}^{\prime},\left\{ {k_{t}^{*{rk}},k_{t,{ran}}^{*{rk}},{\hat{??}}_{t}^{*}} \right)_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\mspace{20mu}\left\{ {{\overset{\sim}{k}}_{u}^{*{rk}},{\hat{??}}_{u}^{*}} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},{ct}_{{??}^{\prime}}^{rk}} \right).}}}}} & \left\lbrack {{Formula}\mspace{14mu} 153\text{-}2} \right\rbrack \end{matrix}$

The function and operation of the re-encryption device 400 will be described.

As indicated in FIG. 9, the re-encryption device 400 is provided with a public parameter reception part 410, a ciphertext reception part 420, a re-encryption key reception part 430, a verification part 440, an encryption part 450, and a re-ciphertext transmission part 460 (re-ciphertext output part). The verification part 440 is provided with a span program calculation part 441 and a signature verification part 442. The encryption part 450 is provided with a random number generation part 451, an f vector generation part 452, an s vector generation part 453, a conversion information W₂ generation part 454, a conversion information W₂ encryption part 455, a ciphertext c^(renc) generation part 456, and a decryption key k^(*renc) generation part 457.

The process of the REnc algorithm will be described with reference to FIG. 15.

(S501: Public Parameter Reception Step)

For example, with the communication device, the public parameter reception part 410 receives the public parameters pk generated by the key generation device 100, via the network.

(S502: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 420 receives the ciphertext ct_(S) transmitted by the encryption device 200, via the network.

(S503: Re-encryption Key Reception Step)

For example, with the communication device, the re-encryption key reception part 430 receives the re-encryption key rk_(Γ,S′) transmitted from the decryption device 300, via the network.

(S504: Span Program Calculation Step)

With the processing device, the span program calculation part 441 determines whether or not the access structure S included in the ciphertext ct_(S) accepts Γ included in the re-encryption key rk_(Γ,S′), and determines whether or not the access structure S^(˜) included in the ciphertext ct_(S) accepts Γ^(˜) included in the re-encryption key rk_(Γ,S′). The method of determining whether or not the access structure S accepts Γ and whether or not the access structure S^(˜) accepts Γ^(˜) is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S^(˜) accepts Γ^(˜) and the access structure S^(˜) accepts Γ^(˜) (ACCEPT in S504), the span program calculation part 441 advances the process to (S505). If the access structure S rejects Γ or the access structure S^(˜) rejects Γ^(˜) (REJECT in S504), the span program calculation part 441 ends the process.

(S505: Signature Verification Step)

With the processing device, the signature verification part 442 determines whether or not the result of calculating Formula 154 is 1. If the result is 1 (VALID in S505), the signature verification part 442 advances the process to (S506). If the result is 0 (INVALID in S505), the signature verification part 442 ends the process. Ver(verk,C,Sig) where C:=(

,

{c _(i)}_(i=0, . . . ,L) ,{{tilde over (c)} _(j)}_(j=0, . . . ,{tilde over (L)}) ,c _(T) ,{tilde over (c)} _(T))  [Formula 154]

(S506: Random Number Generation Step)

With the processing device, the random number generation part 451 generates random numbers as indicated in Formula 155.

$\begin{matrix} {r,\sigma,\pi^{\prime},\eta^{\prime},{Ϛ^{\prime}\overset{U}{\leftarrow}{??}_{q}},{{\overset{\rightarrow}{\varphi}}_{0}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{2}},{{{\overset{\rightarrow}{\varphi}}_{t}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\rightarrow}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{z_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}},\theta_{i}^{\prime},{{\eta_{i}^{\prime}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu} i}} = 1},\ldots\mspace{14mu},L,{\overset{\sim}{\theta}}_{j}^{\prime},{{{\overset{\sim}{\eta}}_{j}^{\prime}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots\mspace{14mu},\overset{\sim}{L}} & \left\lbrack {{Formula}\mspace{14mu} 155} \right\rbrack \end{matrix}$

(S507: f Vector Generation Step) With the processing device, the f vector generation part 452 generates vectors r^(→′) and f^(˜→′) randomly, as indicated in Formula 156.

$\begin{matrix} {{{\overset{\rightarrow}{f}}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{r}},{\overset{\overset{\rightarrow}{\sim}}{f^{\prime}}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}},} & \left\lbrack {{Formula}\mspace{14mu} 156} \right\rbrack \end{matrix}$

(S508: s Vector Generation Step)

With the processing device, the s vector generation part 453 generates vectors S^(→′T) and s^(˜→′T), as indicated in Formula 157. {right arrow over (s)}′ ^(T):=(s ₁ ′, . . . s _(L)′)^(T) :=M·{right arrow over (f)}′ ^(T), {tilde over ({right arrow over (s)})}′^(T):=({tilde over (s)} ₁ ′, . . . ,{tilde over (s)} _({tilde over (L)})′)^(T) :={tilde over (M)}·{tilde over ({right arrow over (f)})}^(T)  [Formula 157]

With the processing device, the s vector generation part 453 generates values s₀′ and s^(˜) ₀′, as indicated in Formula 158. s ₀′:={right arrow over (1)}·{right arrow over (f)}′ ^(T), {tilde over (s)} ₀′:={right arrow over (1)}·{tilde over ({right arrow over (f)})}′ ^(T)  [Formula 158]

(S509: Conversion Information W₂ Generation Step)

With the processing device, the conversion information W₂ generation part 454 generates conversion information W₂, as indicated in Formula 159.

$\begin{matrix} {W_{2}\overset{R}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 159} \right\rbrack \end{matrix}$

(S510: Conversion Information W₂ Encryption Step)

With the processing device, the conversion information W₂ encryption part 455 calculates Formula 160, to encrypt the conversion information W₂ by functional encryption, thereby generating encrypted conversion information ct^(renc) _(S′)(ϕ^(renc)). The conversion information W₂ is encrypted by functional encryption that takes as input the access structure S′. Hence, the conversion information W₂ is encrypted by setting the attribute information of the user capable of decrypting the re-ciphertext rct_(S′).

$\begin{matrix} {{ct}_{{??}^{\prime}}^{renc}\overset{R}{\leftarrow}{{Enc}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{??}^{\prime},W_{2}} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 160} \right\rbrack \end{matrix}$

(S511: Ciphertext c^(renc) Generation Step)

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(˜renc) ₀, as indicated in Formula 161. {tilde over (c)} ₀ ^(renc):=(c ₀ +{tilde over (c)} ₀+(ζ′,−s ₀ ′−{tilde over (s)} ₀′,π′(verk,1),0²,0^(2,η′)

⁾  [Formula 161]

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(renc) _(i) for each integer i of i=1, . . . , L, as indicated in Formula 162.

$\begin{matrix} {{{{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{c_{i}^{renc}:={c_{i} + \left( {\overset{\overset{n_{t}}{︷}}{{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}^{\prime}}} \right)_{{??}_{t}}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{c_{i}^{renc}:={c_{i} + \left( {\overset{\overset{n_{t}}{︷}}{{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}},}\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}^{\prime}}} \right)_{{??}_{t}}}},} & \left\lbrack {{Formula}\mspace{14mu} 162} \right\rbrack \end{matrix}$

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(˜renc) _(T), as indicated in Formula 163. {tilde over (c)} _(T) ^(renc) :=c _(T) ·{tilde over (c)} _(T) ·g _(T) ^(ζ′)  [Formula 163]

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(˜renc) _(j) for each integer j of j=1, . . . , L^(˜), as indicated in Formula 164.

$\begin{matrix} {{{{for}\mspace{14mu} j} = 1},\ldots\mspace{14mu},\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{\overset{\sim}{c}}_{j}^{renc}:={{\overset{\sim}{c}}_{j} + \left( {\overset{\overset{n_{u}}{︷}}{{{{\overset{\sim}{s}}_{i}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{j}^{\prime}}} \right)_{H_{u}}}},{{{if}\mspace{11mu}\overset{\sim}{\;\rho}(j)} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{c}}_{j}^{renc}:={{\overset{\sim}{c}}_{j} + \left( {\overset{\overset{n_{u}}{︷}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}},}\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{{\overset{\sim}{\eta}}_{j}^{\prime}}} \right)_{H_{u}}}}} & \left\lbrack {{Formula}\mspace{14mu} 164} \right\rbrack \end{matrix}$

(S512: Decryption Key k^(*renc) Generation Step)

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(*renc) ₀, as indicated in Formula 165. k ₀ ^(*renc) :=k ₀ ^(*rk) +rk _(0,ran) ^(*rk)+(0²,σ(−1,verk),0²,{right arrow over (ϕ)}₀′,0)

  [Formula 165]

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(*renc) _(t) for each integer t included in the attribute set Γ, as indicated in Formula 166. k _(t) ^(*renc) :=k _(t) ^(*rk) +rk _(t,ran) ^(*rk)+(0^(n) ^(t) ,0^(w) ^(t) ,{right arrow over (ϕ)}_(t)′;0)

for (t,{right arrow over (x)} _(t))∈Γ  [Formula 166]

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(˜*renc) _(u) for each integer u included in the attribute set Γ^(˜), as indicated in Formula 167. {tilde over (k)} _(u) ^(*renc) :={tilde over (k)} _(u) ^(*rk)+(0^(n) ^(u) ,0^(w) ^(u) ,{tilde over ({right arrow over (ϕ)})}_(u)′,0)

for (u,{right arrow over (y)} _(u))∈{tilde over (Γ)}  [Formula 167]

(S513: Re-Ciphertext Transmission Step)

For example, with the communication device, the re-ciphertext transmission part 460 transmits the re-ciphertext rct_(S′) constituted as elements by the access structures S′, S, and S^(˜), the attribute sets Γ and Γ^(˜), the decryption keys k^(*renc) ₀, k^(*renc) _(t), and k^(˜*renc) _(u), the ciphertexts c^(˜renc) ₀,c^(renc) _(i),c^(renc) _(T), and c^(˜renc) _(j), the encrypted conversion information ct^(rk) _(S′), and the encrypted conversion information ct^(renc) _(S′), to the re-ciphertext decryption device 500 in secrecy via the network. The re-ciphertext rct_(S′) may be transmitted to the decryption device 500 by another method, as a matter of course.

In brief, from (S501) through (S512), the re-encryption device 400 executes the REnc algorithm indicated in Formula 168-1, Formula 168-2, and Formula 168-3, to generate the re-ciphertext rct_(S′). In (S513), the re-encryption device 400 transmits the generated re-ciphertext rct_(S′) to the re-ciphertext decryption device 500.

$\begin{matrix} {{REnc} = \left( {{pk},{{rk}_{\Gamma,{??}^{\prime}}:=\left( {\Gamma,{{??}^{\prime}\left\{ {k_{t}^{*{rk}},k_{t,{ran}}^{*{rk}},{\hat{??}}_{t}^{*}} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\mspace{20mu}\left\{ {{\overset{\sim}{k}}_{u}^{*{rk}},{\hat{??}}_{u}^{*}} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},{ct}_{{??}^{\prime}}^{rk}} \right)},\mspace{20mu}{{ct}_{??}:=\left( {{C:=\left( {{??},\overset{\sim}{??},\mspace{20mu}\left\{ c_{i} \right\}_{{i = 0},\ldots\mspace{14mu},L},\left\{ {\overset{\sim}{c}}_{j} \right\}_{{j = 0},\ldots\mspace{14mu},L},c_{T},{\overset{\sim}{c}}_{T}} \right)},\mspace{20mu}{verk},{Sig}} \right)}} \right)} & \left\lbrack {{Formula}\mspace{14mu} 168\text{-}1} \right\rbrack \end{matrix}$

If

accepts Γ,

accepts {tilde over (Γ)}, and Ver(verk,C,Sig)=1 then compute following

$\begin{matrix} {\mspace{79mu}{r,\sigma,\pi^{\prime},\eta^{\prime},{Ϛ^{\prime}\overset{U}{\leftarrow}{??}_{q}},{{\overset{\rightarrow}{\varphi}}_{0}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{2}},\mspace{79mu}{{{\overset{\rightarrow}{\varphi}}_{t}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{n_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},\mspace{20mu}{{{\overset{\rightarrow}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{{??}_{q}^{n_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}},\mspace{20mu}{{\overset{\rightarrow}{f}}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{r}},{{\overset{\rightarrow}{s}}^{\prime\; T}:={\left( {s_{1}^{\prime},\ldots\mspace{14mu},s_{L}^{\prime}} \right)^{T}:={M \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}}},\mspace{20mu}{{\overset{\overset{\rightarrow}{\sim}}{f}}^{\prime}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{\prime\; T}:={\left( {{\overset{\sim}{s}}_{1}^{\prime},\ldots\mspace{14mu},{\overset{\sim}{s}}_{\overset{\sim}{L}}^{\prime}} \right)^{T}:={\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}}},\mspace{20mu}{{\overset{\rightarrow}{s}}_{0}^{\prime}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},\mspace{20mu}{{\overset{\sim}{s}}_{0}^{\prime}:={\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},\mspace{20mu}{W_{2}\overset{R}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},\mspace{20mu}{{ct}_{{??}^{\prime}}^{renc}\overset{R}{\leftarrow}{{Enc}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{??}^{\prime},W_{2}} \right)}},{{\overset{\sim}{c}}_{0}^{renc}:={\left( {c_{0} + {\overset{\sim}{c}}_{0} + {\left( {Ϛ^{\prime},{- s_{0}^{\prime}},{\overset{\sim}{s}}_{0}^{\prime},{\pi^{\prime}\left( {{verk},1} \right)},0^{2},\mspace{20mu} 0^{2},\eta^{\prime}} \right){??}_{0}}} \right)W_{2}}},\mspace{20mu}{{\overset{\sim}{c}}_{T}^{renc}:={c_{T} \cdot {\overset{\sim}{c}}_{T} \cdot g_{T}^{Ϛ^{\prime}}}},}} & \; \\ {\mspace{79mu}{{{{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{{{if}\mspace{14mu}{\rho(i)}} = {\left( {t,{{\overset{\rightarrow}{v}}_{i}:={\left( {v_{{i{.1}},\;\ldots\;,}v_{i.n_{t}}} \right) \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}}} \right)\left( {v_{i.n_{t}} \neq 0} \right)}},\mspace{20mu}\theta_{i}^{\prime},{\eta_{i}^{\prime}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{c_{i}^{renc}:={c_{i} + \left( {\overset{\overset{n_{t}}{︷}}{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}},{\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}^{\prime}}}} \right)_{{??}_{t}}}},\mspace{20mu}{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{\eta_{i}^{\prime}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{c_{i}^{renc}:={c_{i} + \left( {\overset{\overset{n_{t}}{︷}}{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}},{\overset{\overset{w_{t}}{︷}}{0^{w_{t}},}\overset{\overset{z_{t}}{︷}}{0^{z_{t}},}\overset{\overset{1}{︷}}{\eta_{i}^{\prime}}}} \right)_{{??}_{t}}}},\mspace{20mu}{{{for}\mspace{14mu} j} = 1},\ldots\mspace{14mu},\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {\left( {u,{{\overset{\rightarrow}{z}}_{j}:={\left( {z_{{j{.1}},\ldots\mspace{14mu},}z_{j.n_{u}}} \right) \in {{??}_{q}^{n_{u}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}}} \right)\left( {z_{j,n_{u}} \neq 0} \right)}},\mspace{20mu}{\overset{\sim}{\theta}}_{j}^{\prime},{{\overset{\sim}{\eta}}_{j}^{\prime}\overset{U}{\leftarrow}{??}_{q}},{{\overset{\sim}{c}}_{j}^{renc}:={{\overset{\sim}{c}}_{j} + \left( {\overset{\overset{n_{u}}{︷}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{u}^{\prime}{\overset{\rightarrow}{z}}_{j}}},{\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{\eta_{j}^{\prime}}}} \right)_{{\mathbb{H}}_{u}}}},\mspace{20mu}{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{\eta}}_{i}^{\prime}\overset{U}{\leftarrow}{??}_{q}},\mspace{20mu}{{\overset{\sim}{c}}_{j}^{renc}:={{\overset{\sim}{c}}_{j} + \left( {\overset{\overset{n_{u}}{︷}}{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}},{\overset{\overset{w_{u}}{︷}}{0^{w_{u}},}\overset{\overset{z_{u}}{︷}}{0^{z_{u}},}\overset{\overset{1}{︷}}{\eta_{j}^{\prime}}}} \right)_{{\mathbb{H}}_{u}}}},}} & \left\lbrack {{Formula}\mspace{14mu} 168\text{-}2} \right\rbrack \\ {{k_{0}^{*{renc}}:={k_{0}^{*{rk}} + {rk}_{0,{ran}}^{*{rk}} + \begin{pmatrix} {0^{2},{\sigma\left( {{- 1},{verk}} \right)},} \\ {0^{2},{\overset{\rightarrow}{\varphi}}_{0}^{\prime},0} \end{pmatrix}_{{??}_{0}^{*}}}},{k_{t}^{*{renc}}:={{k_{t}^{*{rk}} + {rk}_{0,{ran}}^{*{rk}} + {\left( {0^{n_{t}},0^{w_{t}},{\overset{\rightarrow}{\varphi}}_{t}^{\prime},0} \right)_{{??}_{t}^{*}}\mspace{14mu}{{for}{\mspace{11mu}\;}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}}} \in \Gamma}},{{\overset{\sim}{k}}_{u}^{*{renc}}:={{{\overset{\sim}{k}}_{u}^{*{rk}} + {\left( {0^{n_{u}},0^{w_{u}},{\overset{\overset{\rightarrow}{\sim}}{\varphi}}_{u}^{\prime},0} \right)_{{??}_{u}^{*}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}},{{{return}\mspace{14mu}{rct}_{{??}^{\prime}}}:={\left( {{??}^{\prime},{??},\overset{\sim}{??},\Gamma,\overset{\sim}{\Gamma},\left\{ k_{t}^{*{renc}} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\mspace{20mu}\left\{ k_{u}^{*{renc}} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},\left\{ c_{i}^{renc} \right\}_{{i = 1},\ldots\mspace{14mu},L},\mspace{20mu}\left\{ {\overset{\sim}{c}}_{j}^{renc} \right\}_{{j = 0},\ldots\mspace{14mu},\overset{\sim}{L}},{\overset{\sim}{c}}_{T}^{renc},{ct}_{{??}^{\prime}}^{rk},{ct}_{{??}^{\prime}}^{renc}} \right).}}} & \left\lbrack {{Formula}\mspace{14mu} 168\text{-}3} \right\rbrack \end{matrix}$

The function and operation of the re-ciphertext decryption device 500 will be described.

As illustrated in FIG. 10, the re-ciphertext decryption device 500 is provided with a decryption key reception part 510, a ciphertext reception part 520, a span program calculation part 530, a complementary coefficient calculation part 540, a conversion information generation part 550, a conversion part 560, a pairing operation part 570, and a message calculation part 580. The pairing operation part 570 and the message calculation part 580 will be collectively referred to as a decryption part.

The process of the Dec1 algorithm will be described with reference to FIG. 16.

(S601: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 510 receives the decryption key sk_(Γ′) transmitted from the key generation device 100, via the network. The decryption key reception part 510 also receives the public parameters pk generated by the key generation device 100.

(S602: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 520 receives the re-ciphertext rct_(S′) transmitted by the re-encryption device 400, via the network.

(S603: Span Program Calculation Step)

With the processing device, the span program calculation part 530 determines whether or not the access structure S′ included in the re-ciphertext rct_(S′) accepts Γ′ included in the decryption key sk_(Γ′), and determines whether or not the access structure S^(˜) included in the re-ciphertext rct_(S′) accepts Γ^(˜) included in the re-ciphertext rct_(S′). The method of determining whether or not the access structure S′ accepts Γ′ and whether or not the access structure S^(˜) accepts Γ^(˜) is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S′ accepts and the access structure S^(˜) accepts Γ^(˜) (ACCEPT in S603), the span program calculation part 530 advances the process to (S604). If the access structure S′ rejects Γ′ or the access structure S^(˜) rejects Γ^(˜) (REJECT in S603), the span program calculation part 530 ends the process.

(S604: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 540 calculates I and J and constants (complementary coefficients) {α_(i)}_(i∈I) and {α^(˜) _(j)}_(j∈J) which satisfy Formula 169.

$\begin{matrix} {{\overset{\rightarrow}{1} = {\sum_{i \in I}{\alpha_{i}M_{i}}}},{\overset{\rightarrow}{1} = {\sum_{j \in J}{{\overset{\sim}{\alpha}}_{j}{\overset{\sim}{M}}_{j}}}}} & \left\lbrack {{Formula}\mspace{14mu} 169} \right\rbrack \end{matrix}$ where M_(i) is the i-th row of M, {tilde over (M)}_(j) is the j-th row of {tilde over (M)} and I⊂{i∈{1, . . . ,L}|[ρ(i)=(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)=0]

[ρ(i)=

(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)≠0]}, J⊂{j∈{1, . . . ,{tilde over (L)}}|[{tilde over (ρ)}(j)=(u,{right arrow over (z)} _(j))

(u,{right arrow over (y)} _(u))∈{tilde over (Γ)}

{right arrow over (z)} _(j) ·{right arrow over (y)} _(u)=0]

[{tilde over (ρ)}(j)=

(u,{right arrow over (z)} _(j))

(u,{right arrow over (y)} _(u))∈{tilde over (Γ)}

{tilde over (z)} _(j) ·{tilde over (y)} _(u)≠0]}

(S605: Conversion Information Generation Step)

With the processing device, the conversion information generation part 550 generates the conversion information W_(1,0), W_(1,t), W^(˜) _(1,u), and W₂, as indicated in Formula 170.

$\begin{matrix} {\mspace{79mu}{{\left( {\left\{ W_{1,t} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ W_{1,u} \right\}_{u = {{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}},\Gamma,\overset{\sim}{\Gamma}} \right)\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{rk}} \right)}},\mspace{20mu}{{\overset{\sim}{W}}_{2}\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{renc}} \right)}}}} & \left\lbrack {{Formula}\mspace{14mu} 170} \right\rbrack \end{matrix}$

(S606: Conversion Step)

With the processing device, the conversion part 560 generates the decryption keys k*₀, k*_(t), and k^(˜*) _(u), and generates the ciphertext c^(˜) ₀, as indicated in Formula 171. k ₀ *:=k ₀ ^(*renc) W _(1,0) ⁻¹, k _(t) *:=k _(t) ^(*renc) W _(1,t) ⁻¹ for (t,{right arrow over (x)})∈Γ, {right arrow over (k)} _(u) *:=k _(u) ^(*renc) W _(1,u) ⁻¹ for (u,{right arrow over (y)})∈{tilde over (Γ)}, {tilde over (c)} ₀ :={tilde over (c)} ₀ ^(renc) W ₂ ⁻¹  [Formula 171]

(S607: Pairing Operation Step)

With the processing device, the pairing operation part 570 calculates Formula 172, to generate a session key K^(˜).

$\begin{matrix} \begin{matrix} {\overset{\sim}{K}\mspace{14mu}\text{:=}\mspace{14mu}{e\left( {{\overset{\sim}{c}}_{0},k_{0}^{*}} \right)}\underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}{e\left( {c_{i}^{renc},k_{t}^{*}} \right)}^{\alpha_{i}}} \\ {\underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}{e\left( {c_{i}^{renc},k_{t}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {({u,{\overset{\rightarrow}{z}}_{j}})}}{\Pi}{e\left( {{\overset{\sim}{c}}_{j}^{renc},{\overset{\sim}{k}}_{u}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {⫬ {({u,{\overset{\rightarrow}{z}}_{j}})}}}{\Pi}{e\left( {{\overset{\sim}{c}}_{j}^{renc},{\overset{\sim}{k}}_{u}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}\text{/}{({{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}})}}} \end{matrix} & \left\lbrack {{Formula}\mspace{14mu} 172} \right\rbrack \end{matrix}$

(S608: Message Calculation Step)

With the processing device, the message calculation part 580 calculates m′=c^(˜renc) _(T)/K^(˜), to generate a message m′ (=m).

In brief, from (S601) through (S608), the re-ciphertext decryption device 500 executes the Dec1 algorithm indicated in Formula 173-1 and Formula 173-2, to generate the message message m′ (=m). Dec ₁(rct

:=(

,

,

,Γ,{tilde over (Γ)},{k _(t) ^(*renc)}_(t=0,(t,{right arrow over (x)}) _(t) _()∈Γ) ,{k _(u) ^(*renc)}_((u,{right arrow over (y)}) _(u) _()∈{tilde over (Γ)}) ,{c _(i) ^(renc)}_(i=1, . . . ,L) ,{{tilde over (c)} _(j) ^(renc)}_(j=0, . . . ,{tilde over (L)}) ,{tilde over (c)} _(T) ^(renc) ,c

,ct

sk _(Γ′):=(Γ′,sk ^(CP-FE) ,k ₀ *,{k _(t)*}_((t,{right arrow over (x)}) _(t) _()∈Γ′) ,{k _(u)*}_(u=1, . . . ,d)))  [Formula 173-1] If

accepts Γ″ and

accepts {tilde over (Γ)}, then compute I, J and {α_(i)}_(i∈I), {{tilde over (α)}_(j)}_(j∈J) such that {right arrow over (1)}=Σ_(i∈I)α_(i) M _(i),{right arrow over (1)}=Σ_(j∈J){tilde over (α)}_(j) {tilde over (M)} _(j) where M_(i) is the i-th row of M, {tilde over (M)}_(j) is the j-th row of {tilde over (M)} and

${I \subseteq \left\{ {i \in \left\{ {1,\ldots,L} \right\}} \middle| {\left\lbrack {{\rho(i)} = {{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right) ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack ⩔ \left\lbrack {{\rho(i)} = {{⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)} ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}} \right\rbrack} \right\}},{J \subseteq \left\{ {j \in \left\{ {1,\ldots,\overset{\sim}{L}} \right\}} \middle| {\left\lbrack {{\overset{\sim}{\rho}(j)} = {{\left( {u,{\overset{\rightarrow}{z}}_{j}} \right) ⩓ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right) \in \overset{\sim}{\Gamma}} ⩓ {{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}}} = 0}} \right\rbrack ⩔ \left\lbrack {{\overset{\sim}{\rho}(j)} = {{⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)} ⩓ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right) \in \overset{\sim}{\Gamma}} ⩓ {{{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}} \neq 0}}} \right\rbrack} \right\}},{\left( {\left\{ W_{1,t} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ W_{1,u} \right\}_{u = {{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}},\Gamma,\overset{\sim}{\Gamma}} \right)\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{??}^{rk}} \right)}},{{\overset{\sim}{W}}_{2}\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{??}^{renc}} \right)}},\begin{matrix} {{{k_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{0}^{*{renc}}W_{1,0}^{- 1}},{{k_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{t}^{*{renc}}W_{1,t}^{- 1}\mspace{14mu}{for}\mspace{14mu}\left( {t,\overset{\rightarrow}{x}} \right)} \in \Gamma},{{{\overset{\sim}{k}}_{u}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{u}^{*{renc}}{\overset{\sim}{W}}_{1,u}^{- 1}\mspace{14mu}{for}\mspace{14mu}\left( {u,\overset{\rightarrow}{y}} \right)} \in \overset{\sim}{\Gamma}},{{\overset{\sim}{c}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{0}^{renc}W_{2}^{- 1}},\begin{matrix} {\overset{\sim}{K}\mspace{14mu}\text{:=}\mspace{14mu}{e\left( {{\overset{\sim}{c}}_{0},k_{0}^{*}} \right)}\underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}{e\left( {c_{i}^{renc},k_{t}^{*}} \right)}^{\alpha_{i}}} \\ {\underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}{e\left( {c_{i}^{renc},k_{t}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {({u,{\overset{\rightarrow}{z}}_{j}})}}{\Pi}{e\left( {{\overset{\sim}{c}}_{j}^{renc},{\overset{\sim}{k}}_{u}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}}} \\ {{\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {⫬ {({u,{\overset{\rightarrow}{z}}_{j}})}}}{\Pi}{e\left( {{\overset{\sim}{c}}_{j}^{renc},{\overset{\sim}{k}}_{u}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}\text{/}{({{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}})}}},} \end{matrix}}{{m^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{T}^{renc}\text{/}\overset{\sim}{K}},{{return}\mspace{14mu}{m^{\prime}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 173\text{-}2} \right\rbrack \end{matrix}$

The process of the Dec2 algorithm will be described with reference to FIG. 17.

(S701: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 310 receives the decryption key sk_(Γ) transmitted from the key generation device 100, via the network. The decryption key reception part 310 also receives the public parameters pk generated by the key generation device 100.

(S702: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 350 receives the ciphertext ct_(S) transmitted by the re-encryption device 400, via the network.

(S703: Span Program Calculation Step)

With the processing device, the span program calculation part 361 determines whether or not the access structure S included in the ciphertext ct_(S) accepts Γ included in the decryption key sk_(Γ). The method of determining whether or not the access structure S accepts Γ is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S accepts Γ (ACCEPT in S703), the span program calculation part 361 advances the process to (S704). If the access structure S rejects Γ (REJECT in S703), the span program calculation part 361 ends the process.

(S704: Signature Verification Step)

With the processing device, the signature verification part 362 determines whether or not the result of calculating Formula 174 is 1. If the result is 1 (VALID in S704), the signature verification part 362 advances the process to (S705). If the result is 0 (INVALID in S704), the signature verification part 362 ends the process. Ver(verk,C,Sig) where C:=(

,

,{c _(i)}_(i=0, . . . ,L) ,{{tilde over (c)} _(j)}_(j=0, . . . ,{tilde over (L)},) c _(T) ,{tilde over (c)} _(T))  [Formula 174]

(S705: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 370 calculates I and a constant (complementary coefficients) {α_(i)}_(i∈I) which satisfy Formula 175.

$\begin{matrix} {{\overset{\rightarrow}{1} = {\sum\limits_{i \in I}{\alpha_{i}M_{i}}}}{{{where}\mspace{14mu} M_{i}\mspace{14mu}{is}\mspace{14mu}{the}\mspace{14mu} i\text{-}{th}\mspace{14mu}{row}\mspace{14mu}{of}\mspace{14mu} M},{{{and}\mspace{14mu} I} \subseteq \left\{ {i \in \left\{ {1,\ldots,L} \right\}} \middle| {\left\lbrack {{\rho(i)} = {{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right) ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack ⩔ \left\lbrack {{\rho(i)} = {{⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)} ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}} \right\rbrack} \right\}}}} & \left\lbrack {{Formula}\mspace{14mu} 175} \right\rbrack \end{matrix}$

(S706: Pairing Operation Step)

With the processing device, the pairing operation part 380 calculates Formula 176, to generate a session key K.

$\begin{matrix} {K\mspace{14mu}\text{:=}\mspace{14mu}{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}}{{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}}{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} & \left\lbrack {{Formula}\mspace{14mu} 176} \right\rbrack \end{matrix}$

(S707: Message Calculation Step)

With the processing device, the message calculation part 390 calculates m′=c_(T)/K, to generate a message m′ (=m).

In brief, from (S701) through (S707), the decryption device 300 executes the Dec2 algorithm indicated in Formula 177, to generate the message message m′ (=m). Dec ₂(pk,sk _(Γ):=(Γ,sk _(Γ) ^(CP-FE) ,k ₀ *,{k _(t)*}_((t,{right arrow over (x)}) _(t) _()∈Γ) ,{k _(u)*}_(u=1, . . . ,d)),

:=(C:=(

,

,{c _(i)}_(i=0, . . . ,L) ,{{tilde over (c)} _(j)}_(j=0/L) ,c _(T) ,{tilde over (c)} _(T)),verk,Sig)):  [Formula 177] If

accepts Γ:={(t,{right arrow over (x)}_(t))} and Ver(verk,C,Sig)=1, then compute I and {α_(i)}_(i∈I) such that

$\overset{\rightarrow}{1} = {\sum\limits_{i \in I}{\alpha_{i}M_{i}}}$ where M_(i) is the i-th row of M, and I⊂{i∈{1, . . . ,L}|[ρ(i)=(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(t) ·{right arrow over (x)} _(t)=0]

[ρ(i)=

(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)≠0]}

$\begin{matrix} {{K\mspace{14mu}\text{:=}\mspace{14mu}{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}}{{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}}{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}}{{m^{\prime} = {c_{T}\text{/}K}},{{return}\mspace{14mu}{m^{\prime}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 176} \right\rbrack \end{matrix}$

As described above, the cryptographic system according to Embodiment 1 is capable of implementing the CP-FCPRE scheme. Therefore, with a single re-encryption key, a ciphertext can be transferred to a group of various types of users. Furthermore, a condition for designating a ciphertext to be re-encrypted can be designated.

In the above explanation, the decryption device 300 also serves as a re-encryption key generation device, and the decryption device 300 executes not only the Dec2 algorithm but also the RKG algorithm. Alternatively, the decryption device 300 and the re-encryption key generation device may be separate devices. In this case, the decryption device 300 executes the Dec2 algorithm and the re-encryption key generation device executes the RKG algorithm. Accordingly, in this case, the decryption device 300 is provided with a functional configuration necessary for executing the Dec2 algorithm, and the re-encryption key generation device is provided with a functional configuration necessary for executing the RKG algorithm.

In the above explanation, n_(t)+w_(t)+z_(t)+1 is set to N_(t). Alternatively, n_(t)+w_(t)+z_(t)+β_(t) may be set to N_(t) where β_(t) is an integer of not less than 0.

In the above explanation, 9 is set to N₀. Alternatively, 1+1+2+w₀+z₀+β₀ may be set to N₀ where w₀, z₀, and β₀ are each an integer of not less than 0.

In the above explanation, π′(verk,1) in the ciphertext c^(˜renc) ₀ generated in S511 is additional information H, and σ(−1,verk) in the decryption key k^(*renc) ₀ generated in S512 is additional information Θ. The additional information H and Θ are related to each other, and are canceled by the pairing operation executed in S607.

Embodiment 2

In Embodiment 1, the CP-FCPRE scheme has been described. In Embodiment 2, a key-policy FCPRE (KP-FCPRE) scheme will be described.

First, the basic structure of the KP-FCPRE scheme will be described. Subsequently, the basic structure of a cryptographic processing system 10 that implements the KP-FCPRE scheme will be described. Also, components employed to implement the KP-FCPRE scheme will be described. Then, the KP-FCPRE scheme and the cryptographic processing system 10 according to this embodiment will be described in detail.

The structure of the KP-FCPRE scheme will be briefly described. KP (key policy) signifies that Policy is embedded in the key, namely, an access structure is embedded in the key.

<1-1. Basic Structure of KP-FCPRE Scheme>

The KP-FCPRE scheme consists of seven algorithms: Setup, KG, Enc, RKG,

REnc, Dec1, and Dec2.

(Setup)

The Setup algorithm is a randomized algorithm that takes as input a security parameter λ and attribute format n^(→):=(d; n₁, . . . , n_(d); w₁, . . . , w_(d); z₁, . . . , z_(d)), and outputs public parameters pk and a master key sk.

(KG)

The KG algorithm is a randomized algorithm that takes as input an access structure S=(M,ρ), the public parameters pk, and the master key sk, and outputs a decryption key sk_(S).

(Enc)

The Enc algorithm is a randomized algorithm that takes as input a message m, attribute sets Γ:={(t,x^(→) _(t))|x^(→) _(t)∈F_(q) ^(nt), 1≤t≤d} and Γ^(˜):={(u,y^(→) _(u))|y^(→) _(u)∈F_(q) ^(nu), 1≤t≤d}, and the public parameters pk, and outputs a ciphertext ct_(Γ).

(RKG)

The RKG algorithm is a randomized algorithm that takes as input the decryption key sk_(S), an attribute set Γ′:={(t,x′^(→) _(t))|x′_(t)∈F_(q) ^(nt), 1≤t≤d}, an access structure S^(˜)=(M^(˜),ρ^(˜)), and the public parameters pk, and outputs a re-encryption key rk_(S,Γ′).

(REnc)

The REnc algorithm is a randomized algorithm that takes as input the ciphertext ct_(Γ), the re-encryption key rk_(S,Γ′), and the public parameters pk, and outputs a re-ciphertext rct_(Γ′).

(Dec1)

The Dec1 algorithm is an algorithm that takes as input the re-ciphertext rct_(Γ′), a decryption key sk_(S′), and the public parameters pk, and outputs the message m or distinguished symbol ⊥.

(Dec2)

The Dec2 algorithm is an algorithm that takes as input the ciphertext ct_(Γ), the decryption key sk_(S), and the public parameters pk, and outputs the message m or distinguished symbol ⊥.

<1-2. Cryptographic Processing System 10>

The cryptographic processing system 10 that implements the algorithm of the KP-FCPRE scheme will be described.

FIG. 18 is a configuration diagram of the cryptographic processing system 10 that executes the KP-FCPRE scheme.

The cryptographic processing system 10 is provided with a key generation device 100, an encryption device 200, a decryption device 300 (re-encryption key generation device), a re-encryption device 400, and a re-ciphertext decryption device 500, as the cryptographic processing system 10 illustrated in FIG. 5 is.

The key generation device 100 executes the Setup algorithm by taking as input the security parameter λ and the attribute format n^(→):=(d; n₁, . . . , n_(d); w₁, . . . , w_(d); z₁, . . . , z_(d)), and generates the public parameters pk and the master key sk.

Then, the key generation device 100 publicizes the public parameters pk. The key generation device 100 also executes the KG algorithm by taking as input the access structure S, to generate the decryption key sk_(S), and transmits the decryption key sk_(S) to the decryption device 300 in secrecy. The key generation device 100 also executes the KG algorithm by taking as input an access structure S′, to generate the decryption key sk_(S′), and transmits the decryption key sk_(S′) to the re-ciphertext decryption device 500 in secrecy.

The encryption device 200 executes the Enc algorithm by taking as input the message m, the attribute sets Γ and Γ^(˜), and the public parameters pk, to generate the ciphertext ct_(S). The encryption device 200 transmits the ciphertext ct_(Γ) to the re-encryption device 400.

The decryption device 300 executes the RKG algorithm by taking as input the public parameters pk, the decryption key sk_(S), the attribute set Γ′, and the access structure S^(˜), to generate the re-encryption key rk_(S′,Γ′). The decryption device 300 transmits the re-encryption key rk_(S′,Γ′) to the re-encryption device 400 in secrecy.

The decryption device 300 also executes the Dec2 algorithm by taking as input the public parameters pk, the decryption key sk_(S), and the ciphertext ct_(Γ), and outputs the message m or distinguished symbol ⊥.

The re-encryption device 400 executes the REnc algorithm by taking as input the public parameters pk, the re-encryption key rk_(S,Γ′), and the ciphertext ct_(Γ), to generate the re-ciphertext rct_(Γ). The re-encryption device 400 transmits the re-ciphertext rct_(Γ′) to the re-ciphertext decryption device 500.

The re-ciphertext decryption device 500 executes the Dec1 algorithm by taking as input the public parameters pk, the decryption key sk_(S′), and the re-ciphertext rct_(Γ′), and outputs the message m or distinguished symbol ⊥.

<1-3. Components Employed to Implement KP-FCPRE Scheme>

Key-policy functional encryption (KP-FE) and one-time signature are employed to implement the KP-FCPRE scheme. Since KP-FE and the one-time signature are both known technique, a scheme employed in the following description will be briefly explained. Patent Literature 1 describes an example of the KP-FE scheme. The one-time signature has been described in Embodiment 1 and a decryption thereof will accordingly be omitted here.

The KP-FE scheme consists of four algorithms: Setup_(KP-FE), KG_(KP-FE), Enc_(KP-FE), and Dec_(KP-FE).

(Setup_(KP-FE))

The Setup_(KP-FE) algorithm is a randomized algorithm that takes as input a security parameter λ and attribute format n^(→):=(d; n₁, . . . , n_(d)), and outputs public parameters pk^(KP-FE) and a master key sk^(KP-FE).

(KG_(KP-FE))

The KG_(KP-FE) algorithm is a randomized algorithm that takes as input an access structure S=(M,ρ), the public parameters pk^(KP-FE), and the master key sk^(KP-FE), and outputs a decryption key sk_(S) ^(KP-FE).

(Enc_(KP-FE))

The Enc_(KP-FE) algorithm is a randomized algorithm that takes as input a message m, the attribute set Γ:={(t,x^(→) _(t))|x^(→) _(t)∈F_(q) ^(nt), 1≤t≤d}, and the public parameters pk_(CP-FE), and outputs a ciphertext ϕ.

(Dec_(KP-FE))

The Dec_(KP-FE) algorithm is an algorithm that takes as input the ciphertext ϕ, the decryption key sk_(S) ^(KP-PE), and the public parameters pk^(KP-FE), and outputs the message m or distinguished symbol ⊥.

<1-4. KP-FCPRE Scheme and Cryptographic Processing System 10 in Detail)

The KP-FCPRE scheme, and the function and operation of the cryptographic processing system 10 which executes the KP-FCPRE scheme will be described with reference to FIGS. 19 to 29.

FIG. 19 is a functional block diagram illustrating a function of the key generation device 100. FIG. 20 is a functional block diagram illustrating a function of the encryption device 200. FIG. 21 is a functional block diagram illustrating a function of the decryption device 300. FIG. 22 is a functional block diagram illustrating a function of the re-encryption device 400. FIG. 23 is a functional block diagram illustrating a function of the re-ciphertext decryption device 500.

FIG. 24 is a flowchart illustrating an operation of the key generation device 100 and the process of the KG algorithm. FIG. 25 is a flowchart illustrating an operation of the encryption device 200 and a process of the Enc algorithm. FIG. 26 is a flowchart illustrating an operation of the decryption device 300 and a process of the RKG algorithm. FIG. 27 is a flowchart illustrating an operation of the re-encryption device 400 and a process of the REnc algorithm. FIG. 28 is a flowchart illustrating an operation of the re-ciphertext decryption device 500 and a process of the Dec1 algorithm. FIG. 29 is a flowchart illustrating an operation of the decryption device 300 and a process of the Dec2 algorithm.

The function and operation of the key generation device 100 will be described.

The key generation device 100 is provided with a master key generation part 110, a master key storage part 120, an information input part 130, a decryption key generation part 140, and a key transmission part 150 (key output part), as illustrated in FIG. 19. The decryption key generation part 140 is provided with a random number generation part 142, a decryption key k* generation part 143, a KP-FE key generation part 144, an f vector generation part 145, and an s vector generation part 146.

A description of the process of the Setup algorithm will be omitted because the process is the same as the process of the Setup algorithm described in Embodiment 1, except that in S102 of Embodiment 1, the public parameters pk_(CP-FE) and the master key sk^(CP-FE) of CP-FE are generated, whereas in Embodiment 2, the public parameters pk^(CP-FE) and the master key sk^(KP-FE) of KP-FE are generated.

In brief, the key generation device 100 generates the public parameters pk and the master key sk by executing the Setup algorithm indicated in Formula 178-1 and Formula 178-2.

$\begin{matrix} {{{{Setup}\left( {1^{\lambda},{\overset{\rightarrow}{n} = \left( {{d;n_{1}},\ldots,{n_{d};w_{1}},\ldots,{w_{d};z_{1}},\ldots,z_{d}} \right)}} \right)}\text{:}}{{{{param}_{??}\mspace{14mu}\text{:=}\mspace{14mu}\left( {q,{??},{??}_{T},g,e} \right)}\overset{R}{\leftarrow}{{??}_{bpg}\left( 1^{\lambda} \right)}},{N_{0}\mspace{14mu}\text{:=}\mspace{14mu} 9},{{{N_{t}\mspace{14mu}\text{:=}\mspace{14mu} n_{t}} + w_{t} + z_{t} + {1\mspace{14mu}{for}\mspace{14mu} t}} = 1},\ldots,d,{\psi\overset{U}{\leftarrow}{??}_{q}^{\times}},{g_{T}\mspace{14mu}\text{:=}\mspace{14mu}{e\left( {g,g} \right)}^{\psi}},{{{for}\mspace{14mu} t} = 0},\ldots,d,{{{param}_{{??}_{t}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {q,{??}_{t},{??}_{T},{??}_{t},e} \right)}\overset{R}{\leftarrow}{{??}_{dpvs}\left( {1^{\lambda},N_{t}} \right)}},{{X_{t}\mspace{14mu}\text{:=}\mspace{14mu}\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1} \\ \vdots \\ {\overset{\rightarrow}{\chi}}_{t,N_{t}} \end{pmatrix}\mspace{14mu}\text{:=}\mspace{14mu}\left( \chi_{t,i,j} \right)_{i,j}}\overset{U}{\leftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}},{\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1} \\ \vdots \\ {\overset{\rightarrow}{v}}_{t,N_{t}} \end{pmatrix}\mspace{14mu}\text{:=}\mspace{14mu}\left( v_{t,i,j} \right)_{i,j}\mspace{14mu}\text{:=}\mspace{14mu}{\psi \cdot \left( X_{t}^{T} \right)^{- 1}}},{{param}_{\overset{\rightarrow}{n}\mspace{11mu}}\text{:=}\mspace{14mu}\left( \left\{ {param}_{t} \right\}_{{t = 0},\ldots,d,g_{T}} \right)},{b_{t.i}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{j = 1}^{N_{t}}{\chi_{t,i,j}a_{t,j}}}},{{??}_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{t,1},\ldots,b_{t,N_{t}}} \right)},{b_{t.i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{j = 1}^{N_{t}}{v_{t,i,j}a_{t,j}}}},{{??}_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{t,1}^{*},\ldots,b_{t,N_{t}}^{*}} \right)},{X_{t}^{\prime} = {{\begin{pmatrix} {\overset{\rightarrow}{\chi}}_{t,1}^{\prime} \\ \vdots \\ {\overset{\rightarrow}{\chi}}_{t,N_{t}}^{\prime} \end{pmatrix}\mspace{14mu}\text{:=}\mspace{14mu}\left( \chi_{t,i,j}^{\prime} \right)_{i,j}}\overset{U}{\leftarrow}{{GL}\left( {N_{t},{??}_{q}} \right)}}},{\begin{pmatrix} {\overset{\rightarrow}{v}}_{t,1}^{\prime} \\ \vdots \\ {\overset{\rightarrow}{v}}_{t,N_{t}}^{\prime} \end{pmatrix}\mspace{14mu}\text{:=}\mspace{14mu}\left( v_{t,i,j}^{\prime} \right)_{i,j}\mspace{14mu}\text{:=}\mspace{14mu}{\psi \cdot \left( X_{t}^{\prime\; T} \right)^{- 1}}},}} & \left\lbrack {{Formula}\mspace{14mu} 178\text{-}1} \right\rbrack \\ {{{h_{t,i}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{j = 1}^{N_{t}}{\chi_{t,i,j}^{\prime}a_{t,j}}}},{{\mathbb{H}}_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {h_{t,1},\ldots,h_{t,N_{t}}} \right)},{h_{t,i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{j = 1}^{N_{t}}{v_{t,i,j}^{\prime}a_{t,j}}}},{{\mathbb{H}}_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {h_{t,1}^{*},\ldots,h_{t,N_{t}}^{*}} \right)},{\left( {{pk}^{{KP}\text{-}{FE}},{sk}^{{KP}\text{-}{FE}}} \right)\overset{R}{\leftarrow}{{Setup}_{{KP}\text{-}{FE}}\left( {1^{\lambda},\overset{\rightarrow}{n}} \right)}}}{{{\hat{??}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{0,1},\ldots,b_{0,4},b_{0,9}} \right)},{{{\hat{??}}_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{t,1},\ldots,b_{t,n_{t}},b_{t,N_{t}}} \right)\mspace{14mu}{for}\mspace{14mu} t} = 1},\ldots,d,{{{\hat{\mathbb{H}}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( {h_{u,1},\ldots,h_{u,n_{u}},h_{u,N_{u}}} \right)\mspace{14mu}{for}\mspace{14mu} u} = 1},\ldots,d,{{\hat{??}}_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{0,2}^{*},b_{0,3}^{*},b_{0,4}^{*},b_{0,7}^{*},b_{0,8}^{*}} \right)},{{{\hat{??}}_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {b_{t,1}^{*},\ldots,b_{t,n_{t}}^{*},b_{t,{n_{t} + w_{t} + 1}}^{*},\ldots,b_{t,{n_{t} + w_{t} + z_{t}}}^{*}} \right)\mspace{14mu}{for}\mspace{14mu} t} = 1},\ldots,d,{{{\hat{\mathbb{H}}}_{u}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {h_{u,{n_{u} + w_{u} + 1}}^{*},\ldots,h_{u,{n_{u} + w_{u} + z_{u}}}^{*}} \right)\mspace{14mu}{for}\mspace{14mu} u} = 1},\ldots,d,{{{return}\mspace{14mu}{pk}} = \left( {1^{\lambda},{pk}^{{KP}\text{-}{FE}},{param}_{\overset{\rightarrow}{n}},\left\{ {{\hat{??}}_{t},{\hat{??}}_{t}^{*}} \right\}_{{t = 0},\ldots,d},\left\{ {{\hat{\mathbb{H}}}_{u},{\hat{\mathbb{H}}}_{u}^{*}} \right\}_{{u = 1},\ldots,d}} \right)},{{sk} = {\left( {{sk}^{{KP}\text{-}{FE}},b_{0,1}^{*},\left\{ {h_{u,1}^{*},\ldots,h_{u,n_{u}}^{*}} \right\}_{{u = 1},\ldots,d}} \right).}}}} & \left\lbrack {{Formula}\mspace{14mu} 178\text{-}2} \right\rbrack \end{matrix}$

The process of the KG algorithm will be described with reference to FIG. 24.

(S801: Information Input Step)

With the input device, the information input part 130 takes as input the access structure S:=(M,ρ). Note that a matrix M of the access structure S is set depending on the condition of a system to be implemented. The attribute information of the user of the decryption key sk_(S), for example, is set in p of the access structure S where ρ(i)=(t,v^(→) _(i):=(v_(i,1), . . . ,v_(i,nt)∈F_(q) ^(nt)\{0^(→)}) (v_(i,nt)≠0).

(S802: KP-FE Decryption Key Generation Step)

With the processing device, the KP-FE key generation part 144 calculates Formula 179, to generate a decryption key sk_(S) ^(KP-FE) of functional encryption.

$\begin{matrix} {{sk}_{S}^{{KP}\text{-}{FE}}\overset{R}{\leftarrow}{{KG}^{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},{sk}^{{KP}\text{-}{FE}},S} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 179} \right\rbrack \end{matrix}$

(S803: f Vector Generation Step)

With the processing device, the f vector generation part 145 generates a vector f^(→) randomly as indicated in Formula 180.

$\begin{matrix} {\overset{\sim}{f}\overset{U}{\leftarrow}{??}_{q}^{r}} & \left\lbrack {{Formula}\mspace{14mu} 180} \right\rbrack \end{matrix}$

(S804: s Vector Generation Step)

With the processing device, the s vector generation part 146 generates a vector s^(→T):=(s₁, . . . , s_(L))^(T), as indicated in Formula 181. {right arrow over (s)} ^(T):=(s ₁ , . . . ,s _(L))^(T) :=M·{right arrow over (f)} ^(T)  [Formula 181]

With the processing device, the s vector generation part 146 generates a value s₀ as indicated in Formula 182. s ₀:={right arrow over (1)}·{right arrow over (f)} ^(T)  [Formula 182]

(S805: Random Number Generation Step)

With the processing device, the random number generation part 142 generates random numbers, as indicated in Formula 183.

$\begin{matrix} {{{\overset{\rightarrow}{\eta}}_{0}\overset{U}{\leftarrow}{??}_{q}^{2}},{\theta_{i}\overset{U}{\leftarrow}{??}_{q}},{{\overset{\rightarrow}{\eta}}_{i}\overset{U}{\leftarrow}{??}_{q}^{z_{t}}}} & \left\lbrack {{Formula}\mspace{14mu} 183} \right\rbrack \end{matrix}$

(S806: Decryption Key k* Generation Step)

With the processing device, the decryption key k* generation part 143 generates a decryption key k*₀, as indicated in Formula 184. k ₀*:=(1,−s ₀,0²,0²,{right arrow over (η)}₀,0)

  [Formula 184]

Also, with the processing device, the decryption key k* generation part 143 generates a decryption key k*_(i) for each integer i of i=1, . . . , L, as indicated in Formula 185.

$\begin{matrix} {{{{for}\mspace{14mu} i} = 1},\ldots\mspace{14mu},L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{t}}}{{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}{\overset{\rightarrow}{v}}_{t}}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i},}\overset{\underset{︷}{1}}{0}} \right)_{{??}_{t}^{*}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\underset{︷}{n_{t}}}{{s_{i}{\overset{\rightarrow}{v}}_{t}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i},}},\overset{\underset{︷}{1}}{0}} \right)_{{??}_{t}^{*}}}} & \left\lbrack {{Formula}\mspace{14mu} 185} \right\rbrack \end{matrix}$

(S807: Key Transmission Step)

For example, with the communication device, the key transmission part 150 transmits the decryption key sk_(S) constituted as elements by the access structure S, the decryption key Sk_(S) ^(KP-FE), and the decryption keys k*₀ and k*_(i), to the decryption device 300 in secrecy via the network. As a matter of course, the decryption key sk_(S) may be transmitted to the decryption device 300 by another method.

In brief, from (S801) through (S806), the key generation device 100 generates the decryption key sk_(S) by executing the KG algorithm indicated in Formula 186. Then, in (S807), the key generation device 100 transmits the generated decryption key sk_(S) to the decryption device 300.

$\begin{matrix} {{{KG} = {\left( {{pk},{sk},{{??} = \left( {M,\rho} \right)}} \right)\text{:}}}{{{sk}_{??}^{{KP}\text{-}{FE}}\overset{R}{\leftarrow}{{KG}^{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},{sk}^{{KP}\text{-}{FE}},{??}} \right)}},{\overset{\rightarrow}{f}\overset{U}{\leftarrow}{??}_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1},\ldots,s_{L}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{T}}},{s_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},{{\overset{\rightarrow}{\eta}}_{0}\overset{U}{\leftarrow}{??}_{q}^{2}},{k_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {1,{- s_{0}},0^{2},0^{2},{\overset{\rightarrow}{\eta}}_{0},0} \right)_{{??}_{0}^{*}}},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = {\left( {t,{{{\overset{\rightarrow}{v}}_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( {v_{i,1},\ldots,v_{i,n_{t}}} \right)} \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}} \right)\left( {v_{i,n_{i}} \neq 0} \right)}},{\theta_{i}\overset{U}{\leftarrow}{??}_{q}},{{\overset{\rightarrow}{\eta}}_{i}\overset{U}{\leftarrow}{??}_{q}^{z_{t}}},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{t}}}{{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}{\overset{\rightarrow}{v}}_{t}}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i},}\overset{\underset{︷}{1}}{0}} \right)_{{??}_{t}^{*}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{{\overset{\rightarrow}{\eta}}_{i}\overset{U}{\leftarrow}{??}_{q}^{z_{t}}},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{t}}}{{s_{i}{\overset{\rightarrow}{v}}_{t}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i},}\overset{\underset{︷}{1}}{0}} \right)_{{??}_{t}^{*}}},{{return}\mspace{14mu}{sk}_{??}\mspace{14mu}\text{:=}\mspace{14mu}{\left( {\Gamma,{sk}_{??}^{{KP}\text{-}{FE}},k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{i = 1},\ldots,L}} \right).}}}} & \left\lbrack {{Formula}\mspace{14mu} 186} \right\rbrack \end{matrix}$

In (S801), the key generation device 100 executes the KG algorithm by taking as input the access structure S′:=(M′,ρ′) to which the attribute information of the user of the decryption key sk_(S′) has been set, to generate the decryption key sk_(S′). Then, the key generation device 100 transmits the decryption key sk_(S′):=(S′,sk_(S) ^(KP-FE),k′*₀,k′*_(i)) to the re-ciphertext decryption device 500. Note that ρ′(i)=(t,v^(→′) _(i):=(v′_(i,1), . . . ,v′_(i,nt)∈F_(q) ^(nt)\{0^(→)}) (v′_(i,nt)≠0).

The function and operation of the encryption device 200 will be described.

As illustrated in FIG. 20, the encryption device 200 is provided with a public parameter reception part 210, an information input part 220, a signature processing part 230, an encryption part 240, and a ciphertext transmission part 250 (ciphertext output part). The encryption part 240 is provided with a random number generation part 243 and a ciphertext c generation part 244.

The process of the Enc algorithm will be described with reference to FIG. 25.

(S901: Public Parameter Reception Step)

For example, with the communication device, the public parameter reception part 210 receives the public parameters pk generated by the key generation device 100, via the network.

(S902: Information Input Step)

With the input device, the information input part 220 takes as input the attribute sets Γ:={(t,x^(→) _(t)):=(x_(t,1), . . . , x_(t,nt)∈F_(q) ^(nt)))|1≤t≤d} and Γ^(˜):={(u,y^(→) _(u))|y^(→) _(u)ϵF_(q) ^(nu), 1≤y≤d}. Note that t need not be all integers t of 1≤t≤d but may be at least some of integers t of 1≤t≤d, and that u need not be all integers u of 1≤u≤d but may be at least some of integers u of 1≤u≤d. The attribute information of the user capable of decryption, for example, is set to the attribute set Γ. Information for setting a condition that enables re-encryption, for example, is set to the attribute set Γ^(˜).

With the input device, the information input part 220 takes as input the message m to be transmitted to the decryption device 300.

(S903: Signature Key Generation Step)

With the processing device, the signature processing part 230 calculates formula 187, to generate a signature key sigk for one-time signature and a verification key verk.

$\begin{matrix} {\left( {{sigk},{verk}} \right)\overset{R}{\leftarrow}{{SigKG}\left( 1^{\lambda} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 187} \right\rbrack \end{matrix}$

(S904: Random Number Generation Step)

With the processing device, the random number generation part 243 generates random numbers as indicated in Formula 188.

$\begin{matrix} {\zeta,\pi,\delta,\varphi_{0},\overset{\sim}{\zeta},\overset{\sim}{\pi},{{\overset{\sim}{\varphi}}_{0}\overset{U}{\leftarrow}{??}_{q}},{{\varphi_{t}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\sim}{\varphi}}_{u}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{14mu} 188} \right\rbrack \end{matrix}$

(S905: Ciphertext c Generation Step)

With the processing device, the ciphertext c generation part 244 generates a ciphertext c₀ as indicated in Formula 189. c ₀:=(ζ,δ,π(verk,1),0²,0²,ϕ₀)B₀  [Formula 189]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c_(t) for each integer i included in the attribute information F, as indicated in Formula 190.

$\begin{matrix} {{c_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{t}}}{{\delta{\overset{\rightarrow}{x}}_{t}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{0^{z_{t}},}\overset{\underset{︷}{1}}{\varphi_{t}}} \right)_{B_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma} & \left\lbrack {{Formula}\mspace{14mu} 190} \right\rbrack \end{matrix}$

With the processing device, the ciphertext c generation part 244 generates a ciphertext c_(T) as indicated in formula 191. C _(T) :=m·g _(T) ^(ζ)  [Formula 191]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) ₀ as indicated in Formula 192. {tilde over (c)} ₀:=({tilde over (ζ)},δ,{tilde over (π)}(verk,1),0²,0²,

)_(B) ₀   [Formula 192]

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) _(u) as indicated in Formula 193.

$\begin{matrix} {{{\overset{\sim}{c}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{u}}}{{\delta{\overset{\rightarrow}{y}}_{u}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{0^{z_{u}},}\overset{\underset{︷}{1}}{{\overset{\sim}{\varphi}}_{u}}} \right)_{H_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}} & \left\lbrack {{Formula}\mspace{14mu} 193} \right\rbrack \end{matrix}$

With the processing device, the ciphertext c generation part 244 generates a ciphertext c^(˜) _(T) as indicated in Formula 194. {tilde over (c)} _(T) :=m·g _(T) ^({tilde over (ζ)})  [Formula 194]

(S906: Signature Generation Step)

With the processing device, the signature processing part 230 calculates Formula 195, to generate a signature Sig for an element C of the ciphertext ct_(Γ).

$\begin{matrix} {{Sig}\overset{R}{\leftarrow}{{Sig}\left( {{sigk},{C\mspace{14mu}\text{:=}\mspace{14mu}\left( {\Gamma,\overset{\sim}{\Gamma},c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ {\overset{\sim}{c}}_{u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},c_{T}} \right)}} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 195} \right\rbrack \end{matrix}$

(S907: Ciphertext Transmission Step)

For example, with the communication device, the ciphertext transmission part 250 transmits the ciphertext ct_(Γ) constituted as elements by the attribute sets Γ and Γ^(˜), the ciphertexts c₀, c_(t), C_(T), and c^(˜) _(u), the verification key verk, and the signature Sig, to the decryption device 300 via the network. The ciphertext ct_(Γ) may be transmitted to the decryption device 300 by another method, as a matter of course.

In brief, from (S901) through (S906), the encryption device 200 executes the Enc algorithm indicated in Formula 196, to generate the ciphertext ct_(Γ). In (S907), the encryption device 200 transmits the generated ciphertext ct_(Γ) to the decryption device 300.

$\begin{matrix} {{{Enc} = {\left( {{pk},m,{\Gamma = \left( {\left. \left\{ {t,{\overset{\rightarrow}{x}}_{t}} \right) \middle| {{\overset{\rightarrow}{x}}_{t} \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}} \right.,{1 \leq t \leq d}} \right\}},{\overset{\sim}{\Gamma} = \left( {\left. \left\{ {u,{\overset{\rightarrow}{y}}_{u}} \right) \middle| {{\overset{\rightarrow}{y}}_{u} \in {{??}_{q}^{n_{u}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}} \right.,{1 \leq u \leq d}} \right\}}} \right)\text{:}}}{{\left( {{sigk},{verk}} \right)\overset{R}{\leftarrow}{{SigKG}\left( 1^{\lambda} \right)}},\zeta,\pi,\delta,\varphi_{0},\overset{\sim}{\zeta},\overset{\sim}{\pi},{{\overset{\sim}{\varphi}}_{0}\overset{U}{\leftarrow}{??}_{q}},{{\varphi_{t}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\sim}{\varphi}}_{u}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}}{{c_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\zeta,\delta,{\pi\left( {{verk},1} \right)},0^{2},0^{2},\varphi_{0}} \right)_{{??}_{0}}},{{\overset{\sim}{c}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\sim}{\zeta},\delta,{\overset{\sim}{\pi}\left( {{verk},1} \right)},0^{2},0^{2},{\overset{\sim}{\varphi}}_{0}} \right)_{{??}_{0}}},{{c_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{t}}}{{\delta{\overset{\rightarrow}{x}}_{t}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{0^{z_{t}},}\overset{\underset{︷}{1}}{\varphi_{t}}} \right)_{{??}_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{{{\overset{\sim}{c}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{u}}}{{\delta{\overset{\rightarrow}{y}}_{u}},},{\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{0^{z_{u}},}\overset{\underset{︷}{1}}{{\overset{\sim}{\varphi}}_{u}}}} \right)_{{\mathbb{H}}_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}}}{{c_{T}\mspace{14mu}\text{:=}\mspace{14mu}{m \cdot g_{T}^{\zeta}}},{{\overset{\sim}{c}}_{T}\mspace{14mu}\text{:=}\mspace{14mu}{m \cdot g_{T}^{\overset{\sim}{\zeta}}}},{{Sig}\overset{R}{\leftarrow}{{Sig}\left( {{sigk},{C\mspace{14mu}\text{:=}\mspace{14mu}\left( {\Gamma,\overset{\sim}{\Gamma},c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ {\overset{\sim}{c}}_{u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},c_{T}} \right)}} \right)}},{{ct}_{\Gamma}\mspace{14mu}\text{:=}\mspace{14mu}{\left( {\Gamma,\overset{\sim}{\Gamma},c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ {\overset{\sim}{c}}_{u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})},{\in \overset{\sim}{\Gamma}}},c_{T},{verk},{Sig}} \right).}}}} & \left\lbrack {{Formula}\mspace{14mu} 196} \right\rbrack \end{matrix}$

The function and operation of the decryption device 300 will be described.

As illustrated in FIG. 21, the decryption device 300 is provided with a decryption key reception part 310, an information input part 320, a re-encryption key generation part 330, a re-encryption key transmission part 340 (re-encryption key output part), a ciphertext reception part 350, a verification part 360, a complementary coefficient calculation part 370, a pairing operation part 380, and a message calculation part 390. The re-encryption key generation part 330 is provided with a random number generation part 331, a conversion information W₁ generation part 332, a conversion information W₁ encryption part 333, a decryption key k^(*rk) generation part 334, a conversion part 335, an f vector generation part 336, and an s vector generation part 337. The verification part 360 is provided with a span program calculation part 361 and a signature verification part 362.

The process of the RKG algorithm will be described with reference to FIG. 26. The Dec2 algorithm will be described later.

(S1001: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 310 receives the decryption key sk_(S) transmitted from the key generation device 100, via the network. The decryption key reception part 310 also receives the public parameters pk generated by the key generation device 100.

(S1002: Information Input Step)

With the input device, the information input part 320 takes as input the attribute set Γ′:={(t,x′^(→) _(t):=(x′_(t,1), . . . ,x′_(i,nt)∈F_(q) ^(nt)\{0^(→)}))|1≤t≤d}. Note that t need not be all integers t of 1≤t≤d but may be at least some of integers t of 1≤t≤d. The attribute information of the user who can decrypt the re-ciphertext ct_(Γ′), for example, is set to the attribute set Γ′.

With the input device, the information input part 320 takes as input the access structure S^(˜):=(M^(˜),ρ^(˜)). A matrix M^(˜) of the access structure S^(˜) is set depending on the condition of a system to be implemented. Attribute information indicating a condition that enables re-encryption, for example, is set to ρ^(˜) of the access structure S^(˜). Note that ρ(i)=(t,v^(→) _(i):=(v_(i,1), . . . , v_(i,nt))∈F_(q) ^(nt)\{0^(→)}) (v_(i,nt)≠0).

(S1003: Random Number Generation Step)

With the processing device, the random number generation part 331 generates random numbers as indicated in Formula 197.

$\begin{matrix} {{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{0}\overset{U}{\leftarrow}{??}_{q}^{2}},{{\overset{\sim}{\theta}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots,\overset{\sim}{L},{{\overset{\rightarrow}{\eta}\overset{U}{\leftarrow}{{??}_{q}^{z_{u}}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots,\overset{\sim}{L}} & \left\lbrack {{Formula}\mspace{14mu} 197} \right\rbrack \end{matrix}$

(S1004: f Vector Generation Step)

With the processing device, the f vector generation part 336 generates a vector f^(˜→) randomly as indicated in Formula 198.

$\begin{matrix} {\overset{\rightarrow}{\overset{\sim}{f}}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}} & \left\lbrack {{Formula}\mspace{14mu} 198} \right\rbrack \end{matrix}$

(S1005: s Vector Generation Step)

With the processing device, the s vector generation part 337 generates a vector s^(˜→T) as indicated in Formula 199. {tilde over ({right arrow over (s)})}^(T):=({tilde over (s)} ₁ , . . . ,{tilde over (s)} _({tilde over (L)}))^(T) :={tilde over (M)}·{tilde over ({right arrow over (f)})} ^(T)  [Formula 199]

With the processing device, the s vector generation part 337 generates a value Co as indicated in Formula 200. s ₀:={right arrow over (1)}·{tilde over ({right arrow over (f)})} ^(T)  [Formula 200]

(S1006: Conversion Information W₁ Generation Step)

With the processing device, the conversion information W₁ generation part 332 generates conversion information W_(1,0), W_(1,i) and W^(˜) _(1,j), as indicated in Formula 201.

$\begin{matrix} {{W_{1,0}\overset{U}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},{{W_{1,i}\overset{U}{\leftarrow}{{{GL}\left( {N_{i},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu} i}} = 1},\ldots,L,{{{\overset{\sim}{W}}_{1,j}\overset{U}{\leftarrow}{{{GL}\left( {N_{j},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots,\overset{\sim}{L}} & \left\lbrack {{Formula}\mspace{14mu} 201} \right\rbrack \end{matrix}$

(S1007: Conversion Information W₁ Encryption Step)

With the processing device, the conversion information W₁ encryption part 333 calculates Formula 202, to encrypt the conversion information W_(1,0), W_(1,i), and W^(˜) _(1,j) by functional encryption, thereby generating encrypted conversion information ct^(rk) _(Γ′)(ϕ^(rk)). As the conversion information W_(1,0), W_(1,i), and W^(˜) _(1,j) are encrypted by functional encryption that takes as input the attribute set Γ′, they are encrypted by setting the attribute information of the user capable of decrypting the re-ciphertext rct_(Γ′).

$\begin{matrix} {{ct}_{\Gamma^{\prime}}^{rk}\overset{R}{\leftarrow}{{Enc}_{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},\Gamma^{\prime},\left( {\left\{ W_{1,t} \right\}_{{t = 0},\ldots,L},\left\{ W_{1,u} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},{??},\overset{\sim}{??}} \right)} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 202} \right\rbrack \end{matrix}$

(S1008: Decryption Key k^(*rk) Generation Step)

With the processing device, the decryption key k^(*rk) generation part 334 generates a decryption key k^(*rk) ₀, as indicated in Formula 203. k ₀ ^(*rk):=(k ₀*+(0,−{tilde over (s)} ₀,0⁴,{tilde over ({right arrow over (η)})}₀,0)

)W _(1,0)  [Formula 203]

Also, with the processing device, the decryption key k^(*rk) generation part 334 generates a decryption key k^(*rk) _(i) for each integer i of i=1, . . . , L, as indicated in Formula 204. k _(i) ^(*rk) :=k _(i) *W _(1,i) for i=1, . . . ,L  [Formula 204]

Also, with the processing device, the decryption key k^(*rk) generation part 334 generates a decryption key k^(˜*rk) _(j) for each integer j of i=1, . . . , L, as indicated in Formula 205.

$\begin{matrix} {{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{u}}}{{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}{\overset{\rightarrow}{z}}_{j}}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\eta}}_{j},}\overset{\underset{︷}{1}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,j}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\sim}{z}}_{j}} \right)}},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{z}}_{j}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}}}},{\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\eta}}_{j},}\overset{\underset{︷}{1}}{0}}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,j}}} & \left\lbrack {{Formula}\mspace{14mu} 205} \right\rbrack \end{matrix}$

(S1009: Conversion Step)

With the processing device, the conversion part 335 calculates Formula 206, to generate bases D^(^*) ₀, D^(^*) _(i), and U^(^*) _(j).

:=(d _(0,i) *:=b _(0,i) *W _(1,0))_(i=3,4,7,8)

:=(d _(i,i) *:=b _(0,i) *W _(1,i))_(i)=_(n) _(t) _(+w) _(t) _(+1, . . . ,n) _(t) _(+w) _(t) _(+z) _(t) for i=1, . . . ,L,

:=(u _(j,i) *:=b _(0,i) *{tilde over (W)} _(1,j))_(i=n) _(u) _(+w) _(u) _(+1, . . . ,n) _(u) _(+w) _(u) _(+z) _(u) for j=1, . . . ,{tilde over (L)}  [Formula 206]

(S1010: Key Transmission Step)

For example, with the communication device, the re-encryption key transmission part 340 transmits the re-encryption key rk_(S,Γ′) constituted as elements by the access structures S and S^(˜), the attribute set the decryption keys k^(*rk) ₀, k^(*rk) _(i), and k^(˜*rk) _(j),the encrypted conversion information ct^(rk) _(Γ′), and the bases D^(^*) ₀, D^(^*) _(i), and U^(^*) _(j), to the re-encryption device 400 in secrecy via the network. As a matter of course, the re-encryption key rk_(S,Γ′) may be transmitted to the re-encryption device 400 by another method.

In brief, from (S1001) through (S1009), the decryption device 300 generates the re-encryption key rk_(Γ,S′) by executing the RKG algorithm indicated in Formula 207-1 and Formula 207-2. Then, in (S1010), the decryption device 300 transmits the generated re-encryption key rk_(S,Γ′) to the re-encryption device 400.

$\begin{matrix} {{\left. {{RKG} = \left( {{pk},{{sk}_{??}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\Gamma,{sk}_{??}^{{KP}\text{-}{FE}},k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{i = 1},\ldots,L}} \right)},{\Gamma^{\prime} = {{\left( {\left. \left\{ {t,{\overset{\rightarrow}{x}}_{t}^{\prime}} \right) \middle| {{\overset{\rightarrow}{x}}_{t}^{\prime} \in {{??}_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}} \right.,{1 \leq t \leq d}} \right\}\overset{\sim}{??}} = \left( {\overset{\sim}{M},\overset{\sim}{\rho}} \right)}}} \right)} \right)\text{:}}{{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{0}\overset{U}{\leftarrow}{??}_{q}^{2}},{\overset{\rightarrow}{\overset{\sim}{f}}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1},\ldots,{\overset{\sim}{s}}_{\overset{\sim}{L}}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},{s_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},{W_{1,0}\overset{U}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},{{W_{1,i}\overset{U}{\leftarrow}{{{GL}\left( {N_{i},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu} i}} = 1},\ldots,L,{{{\overset{\sim}{W}}_{1,j}\overset{U}{\leftarrow}{{{GL}\left( {N_{j},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu} j}} = 1},\ldots,\overset{\sim}{L},{{ct}_{\Gamma^{\prime}}^{rk}\overset{R}{\leftarrow}{{Enc}_{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},\Gamma^{\prime},\left( {\left\{ W_{1,t} \right\}_{{t = 0},\ldots,L},\left\{ W_{1,u} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},{??},\overset{\sim}{??}} \right)} \right)}},}} & \left\lbrack {{Formula}\mspace{14mu} 207\text{-}1} \right\rbrack \\ {{k_{0}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*} + \left( {0,{- {\overset{\sim}{s}}_{0}},0^{4},{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{0},0} \right)_{{??}^{*}}} \right)W_{1,0}},{{k_{i}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*}W_{1,i}\mspace{14mu}{for}\mspace{14mu} i} = 1},\ldots,L,{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {\left( {u,{{{\overset{\rightarrow}{z}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( {z_{j,1},\ldots,z_{j,n_{u}}} \right)} \in {{??}_{q}^{n_{u}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}} \right)\left( {z_{j,n_{u}} \neq 0} \right)}},{{\overset{\sim}{\theta}}_{j}{\overset{U}{\leftarrow}{??}_{q}}},{{\overset{\rightarrow}{\eta}}_{j}\overset{U}{\leftarrow}{??}_{q}^{z_{u}}},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{u}}}{{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}{\overset{\rightarrow}{z}}_{j}}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\eta}}_{j},}\overset{\underset{︷}{1}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,j}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\rightarrow}{\eta}}_{j}\overset{U}{\leftarrow}{??}_{q}^{z_{u}}},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{z}}_{j}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\eta}}_{j},}\overset{\underset{︷}{1}}{0}} \right)_{{\mathbb{H}}_{u}^{*}}{\overset{\sim}{W}}_{1,j}},{{\hat{??}}_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {d_{0,i}^{*}\mspace{14mu}\text{:=}\mspace{14mu} b_{0,i}^{*}W_{1,0}} \right)_{{i = 3},4,7,8}},{{{\hat{??}}_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {d_{l,i}^{*}\mspace{14mu}\text{:=}\mspace{14mu} b_{0,i}^{*}W_{1,l}} \right)_{{i = {n_{t} + w_{t} + 1}},\ldots,{n_{t} + w_{t} + z_{t}}}\mspace{14mu}{for}\mspace{14mu} l} = 1},\ldots,L,{{{\hat{??}}_{j}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {u_{j,i}^{*}\mspace{14mu}\text{:=}\mspace{14mu} b_{0,i}^{*}{\overset{\sim}{W}}_{1,j}} \right)_{{i = {n_{u} + w_{u} + 1}},\ldots,{n_{u} + w_{u} + z_{u}}}\mspace{14mu}{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{return}\mspace{14mu}{rk}_{\Gamma,{??}^{\prime}}\mspace{14mu}\text{:=}\mspace{14mu}{\left( {{??},\overset{\sim}{??},\Gamma^{\prime},\left\{ {k_{i}^{*{rk}},{\hat{??}}_{i}^{*}} \right\}_{{i = 0},\ldots,L},\left\{ {{\overset{\sim}{k}}_{j}^{*{rk}},{\hat{??}}_{j}^{*}} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},{ct}_{\Gamma^{\prime}}^{rk}} \right).}}} & \left\lbrack {{Formula}\mspace{14mu} 207\text{-}2} \right\rbrack \end{matrix}$

The function and operation of the re-encryption device 400 will be described.

As indicated in FIG. 22, the re-encryption device 400 is provided with a public parameter reception part 410, a ciphertext reception part 420, a re-encryption key reception part 430, a verification part 440, an encryption part 450, and a re-ciphertext transmission part 460 (re-ciphertext output part). The verification part 440 is provided with a span program calculation part 441 and a signature verification part 442. The encryption part 450 is provided with a random number generation part 451, an f vector generation part 452, an s vector generation part 453, a conversion information W₂ generation part 454, a conversion information W₂ encryption part 455, a ciphertext c^(renc) generation part 456, and a decryption key k^(*renc) generation part 457.

The process of the REnc algorithm will be described with reference to FIG. 27.

(S1101: Public Parameter Reception Step)

For example, with the communication device, the public parameter reception part 410 receives the public parameters pk generated by the key generation device 100, via the network.

(S1102: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 420 receives the ciphertext ct_(Γ) transmitted by the encryption device 200, via the network.

(S1103: Re-encryption Key Reception Step)

For example, with the communication device, the re-encryption key reception part 430 receives the re-encryption key rk_(S,Γ′) transmitted from the decryption device 300, via the network.

(S1104: Span Program Calculation Step)

With the processing device, the span program calculation part 441 determines whether or not the access structure S included in the re-encryption key rk_(S,Γ′) accepts Γ included in the ciphertext ct_(Γ), and determines whether or not the access structure S^(˜) included in the re-encryption key rk_(S,Γ′) accepts Γ^(˜) included in the ciphertext ct_(Γ). The method of determining whether or not the access structure S accepts Γ and whether or not the access structure S^(˜) accepts Γ^(˜) is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S accepts Γ and the access structure S^(˜) accepts Γ^(˜) (ACCEPT in S1104), the span program calculation part 441 advances the process to (S1105). If the access structure S rejects Γ or the access structure S^(˜) rejects Γ^(˜) (REJECT in S1104), the span program calculation part 441 ends the process.

(S1105: Signature Verification Step)

With the processing device, the signature verification part 442 determines whether or not the result of calculating Formula 208 is 1. If the result is 1 (VALID in S1105), the signature verification part 442 advances the process to (S506). If the result is 0 (INVALID in S1105), the signature verification part 442 ends the process. Ver(verk,C,Sig) where C:=(Γ,{tilde over (Γ)},c ₀ ,{c _(t)}_((t,{right arrow over (x)}) _(t) _(),∈Γ) {{tilde over (c)} _(u)}_((u,{right arrow over (y)}) _(u) _(),Σ{tilde over (Γ)}) ,c _(T))  [Formula 208]

(S1106: Random Number Generation Step)

With the processing device, the random number generation part 451 generates random numbers as indicated in Formula 209.

$\begin{matrix} {\pi^{\prime},\delta^{\prime},\zeta_{\prime},\varphi_{0}^{\prime},{\overset{U}{\leftarrow}{??}_{q}},{\overset{\rightarrow}{\overset{\sim}{\eta}}\overset{U}{\leftarrow}{??}_{q}^{2}},{{\varphi_{t}^{\prime}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\sim}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{{??}_{q}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{14mu} 209} \right\rbrack \end{matrix}$

(S1107: f Vector Generation Step)

With the processing device, the f vector generation part 452 generates vectors f^(→′) and f^(˜→′) randomly, as indicated in Formula 210.

$\begin{matrix} {{\overset{\rightarrow}{f^{\prime}}\overset{U}{\leftarrow}{??}_{q}^{r}},{\overset{\rightarrow}{\overset{\sim}{f^{\prime}}}\overset{U}{\leftarrow}{??}_{q}^{\overset{\sim}{r}}}} & \left\lbrack {{Formula}\mspace{14mu} 210} \right\rbrack \end{matrix}$

(S1108: s Vector Generation Step)

With the processing device, the s vector generation part 453 generates vectors s^(→T) and S^(˜→T), as indicated in Formula 211. {right arrow over (s)}′ ^(T):=(s ₁ ′, . . . ,s _(L)′)^(T) :=M·{right arrow over (f)}′ ^(T), {tilde over ({right arrow over (s)})}′^(T):=({tilde over (s)} ₁ ′, . . . ,{tilde over (s)} _({tilde over (L)})′)^(T) :={tilde over (M)}·{tilde over ({right arrow over (f)})}′ ^(T)  [Formula 211]

With the processing device, the s vector generation part 453 generates values s₀′, and s^(˜) ₀′, as indicated in Formula 212. s ₀′:={right arrow over (1)}·{right arrow over (f)}′ ^(T), {tilde over (s)} ₀′:={right arrow over (1)}·{tilde over ({right arrow over (f)})} ^(T)  [Formula 212]

(S1109: Conversion Information W₂ Generation Step)

With the processing device, the conversion information W₂ generation part 454 generates conversion information W_(2,0), W_(2,t), and W_(2,u), as indicated in Formula 213.

$\begin{matrix} {{W_{2,0}\overset{R}{\leftarrow}{{GL}\left( {9,{??}_{q}} \right)}},{{W_{2,t}\overset{R}{\leftarrow}{{{GL}\left( {N_{t},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{W_{2,u}\overset{R}{\leftarrow}{{{GL}\left( {N_{u},{??}_{q}} \right)}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}}} & \left\lbrack {{Formula}\mspace{14mu} 213} \right\rbrack \end{matrix}$

(S1110: Conversion Information W₂ Encryption Step)

With the processing device, the conversion information W₂ encryption part 455 calculates Formula 214, to encrypt the conversion information W_(2,0), W_(2,t), and W_(2,u) by functional encryption, thereby generating encrypted conversion information ct^(renc) _(S′). (ϕ^(renc)). As the conversion information W_(2,0), W_(2,t), and W_(2,u) are encrypted by functional encryption that takes as input the attribute set Γ′, they are encrypted by setting the attribute information of the user capable of decrypting the re-ciphertext rct_(Γ′).

$\begin{matrix} {{ct}_{\Gamma^{\prime}}^{renc}\overset{R}{\leftarrow}{{Enc}_{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},\Gamma^{\prime},W_{2,0},\left( {\left\{ W_{2,t} \right\}_{{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma})},\left\{ W_{2,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}} \right)} \right)}} & \left\lbrack {{Formula}\mspace{14mu} 214} \right\rbrack \end{matrix}$

(S1111: Ciphertext c^(renc) Generation Step)

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(renc) ₀, as indicated in Formula 215. c ₀ ^(renc):=(c ₀ +{tilde over (c)} ₀+(ζ′,δ′,π′(verk,1),0²,0²,ϕ₀′)

)W _(2,0)  [Formula 215]

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(renc) _(t) for each integer t included in the attribute information Γ, as indicated in Formula 216. c _(t) ^(renc):=(c _(t)+(δ′{right arrow over (x)} _(t),0^(w) ^(t) ,0^(w) ^(t) ,ϕ_(t)′)

)W _(2,t) for (t,{right arrow over (x)} _(t))∈Γ  [Formula 216]

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(renc) _(T), as indicated in Formula 217. c _(T) ^(renc) :=c _(T) ·{tilde over (c)} _(T) ·g _(T) ^(ζ′)  [Formula 217]

With the processing device, the ciphertext c^(renc) generation part 456 generates a ciphertext c^(renc) _(u) for each integer u included in the attribute information Γ^(˜), as indicated in Formula 218. {tilde over (c)} _(u) ^(renc):=({tilde over (c)} _(u)+(δ′{right arrow over (y)} _(u),0^(w) ^(u) ,0^(z) ^(u) ,{tilde over (ϕ)}_(t)′)

W _(2,u) for (u,{right arrow over (y)} _(u))ϵ{tilde over (Γ)}  [Formula 218]

(S1112: Decryption Key k^(*renc) Generation Step)

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(*renc) ₀, as indicated in Formula 219. k ₀ ^(*renc):=(k ₀ ^(*rk)+(0,—s ₀ ′−{tilde over (s)} ₀′,σ(−1,verk),0²,{tilde over ({right arrow over (η)})}₀,0)

)W _(1,0)   [Formula 219]

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(*renc) _(i) for each integer i of i=1, . . . , L, as indicated in Formula 220.

$\begin{matrix} {{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{t}}}{{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{{??}_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\sim}{v}}_{i}} \right)}},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( {{\overset{\underset{︷}{n_{t}}}{{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}}}},{\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i}^{\prime},}\overset{\underset{︷}{1}}{0}}} \right)_{{??}_{t}}}} & \left\lbrack {{Formula}\mspace{14mu} 220} \right\rbrack \end{matrix}$

With the processing device, the decryption key k^(*renc) generation part 457 generates a decryption key k^(˜*renc) _(j) for each integer j of j=1, . . . , as indicated in Formula 221.

$\begin{matrix} {{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{u}}}{{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{j}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{{??}_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\sim}{z}}_{j}} \right)}},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( {{\overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}}}},{\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{j}^{\prime},}\overset{\underset{︷}{1}}{0}}} \right)_{{??}_{u}}}} & \left\lbrack {{Formula}\mspace{14mu} 221} \right\rbrack \end{matrix}$

(S1113: Re-Ciphertext Transmission Step)

For example, with the communication device, the re-ciphertext transmission part 460 transmits the re-ciphertext rct_(Γ′) constituted as elements by the attribute sets Γ′, Γ, and Γ^(˜), the access structures S and S^(˜), the decryption keys k^(*renc) ₀, k^(*renc) _(i), and k^(˜*renc) _(j), the ciphertexts c^(renc) ₀, c^(renc) _(t), c^(renc) _(T), and c^(˜renc) _(u), and the encrypted conversion information ct^(rk) _(Γ′) and ct^(renc) _(Γ′), to the re-ciphertext decryption device 500 in secrecy via the network. The re-ciphertext rct_(Γ′) may be transmitted to the decryption device 500 by another method, as a matter of course.

In brief, from (S1101) through (S1112), the re-encryption device 400 executes the REnc algorithm indicated in Formula 222-1, Formula 222-2, and Formula 222-3, to generate the re-ciphertext rct_(Γ). In (S1113), the re-encryption device 400 transmits the generated re-ciphertext rct_(Γ) to the re-ciphertext decryption device 500. REnc=(pk,rk _(Γ,S′):=(S,{tilde over (S)},Γ′,{k _(i) ^(*rk),{tilde over (D)}_(i)}_(i=0, . . . ,L) ,{{tilde over (k)} _(j) ^(*rk),Û}_(j=1, . . . ,{tilde over (L)}) ,ct _(Γ) ^(rk)),ct _(Γ):=(Γ,{tilde over (Γ)},c ₀ ,{c _(t)}_((t,{right arrow over (x)}) _(t) _(),∈Γ) ,{{tilde over (c)} _(u)}_((u,{right arrow over (y)}) _(u) _(),∈{tilde over (Γ)}) ,c _(T),verk,Sig))  [Formula 222-1] If S accepts Γ, {tilde over (S)} accepts {tilde over (Γ)}, and Ver(verk,C,Sig)=1 then compute following

$\pi^{\prime},\delta^{\prime},\zeta^{\prime},{\varphi_{0}^{\prime}\overset{U}{\leftarrow}F_{q}},{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{0}\overset{U}{\leftarrow}F_{q}^{2}},{{\varphi_{t}^{\prime}\overset{U}{\leftarrow}{F_{q}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{\overset{\sim}{\varphi}}_{u}^{\prime}\overset{U}{\leftarrow}{F_{q}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}},{{\overset{\rightarrow}{f}}^{\prime}\overset{U}{\leftarrow}F_{q}^{r}},{{\overset{\rightarrow}{s}}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1}^{\prime},\ldots,s_{L}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{{\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime}\overset{U}{\leftarrow}F_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{\overset{\sim}{s}}\;}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1}^{\prime},\ldots,{\overset{\sim}{s}}_{\overset{\sim}{L}}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},{s_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{{\overset{\sim}{s}}_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},{W_{2,0}\overset{R}{\leftarrow}{{GL}\left( {9,F_{q}} \right)}},{{W_{2,t}\overset{R}{\leftarrow}{{{GL}\left( {N_{t},F_{q}} \right)}\mspace{11mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{W_{2,u}\overset{R}{\leftarrow}{{{GL}\left( {N_{u},F_{q}} \right)}\mspace{11mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}},\begin{matrix} {{{ct}_{\Gamma^{\prime}}^{renc}\overset{R}{\leftarrow}{{Enc}_{{KP}\text{-}{FE}}\left( {{pk}^{{KP}\text{-}{FE}},\Gamma^{\prime},W_{2,0},\left( {\left\{ W_{2,t} \right\}_{{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma})},\left\{ W_{2,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}} \right)} \right)}},{c_{0}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0} + {\overset{\sim}{c}}_{0} + {\left( {\zeta^{\prime},\delta^{\prime},{\pi^{\prime}\left( {{verk},1} \right)},0^{2},0^{2},\varphi_{0}^{\prime}} \right)B_{0}}} \right)W_{2,0}},{{c_{t}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{t} + {\left( {{\delta^{\prime}{\overset{\rightarrow}{x}}_{t}},0^{w_{t}},0^{z_{t}},\varphi_{t}^{\prime}} \right)B_{t}}} \right)W_{2,t}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{c_{T}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}{c_{T} \cdot {\overset{\sim}{c}}_{T} \cdot g_{T}^{\zeta^{\prime}}}},{{{\overset{\sim}{c}}_{u}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{u} + {\left( {{\delta^{\prime}{\overset{\rightarrow}{y}}_{u}},0^{w_{u}},0^{z_{u}},{\overset{\sim}{\varphi}}_{t}^{\prime}} \right)B_{u}}} \right)W_{2,u}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}},{k_{0}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*{rk}} + \left( {0,{{- s_{0}^{\prime}} - {\overset{\sim}{s}}_{0}^{\prime}},{\sigma\left( {{- 1},{verk}} \right)},0^{2},{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{0},0} \right)_{D_{0}^{*}}} \right)W_{1,0}},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = {\left( {t,{{{\overset{\rightarrow}{v}}_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( {v_{i{.1}},\ldots,v_{i.n_{t}}} \right)} \in {F_{q}^{n_{t}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}} \right)\left( {v_{i.n_{t}} \neq 0} \right)}},{\theta_{i}^{\prime}\overset{U}{\leftarrow}F_{q}},{{\overset{\sim}{\eta}}_{i}^{\prime}\overset{U}{\leftarrow}F_{q}^{z_{t}}},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{t}}}{{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{D_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{{\overset{\rightarrow}{\eta}}_{i}^{\prime}\overset{U}{\leftarrow}F_{q}^{z_{t}}},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{t}}}{{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}},}\overset{\underset{︷}{w_{t}}}{0^{w_{t}},}\overset{\underset{︷}{z_{t}}}{{\overset{\rightarrow}{\eta}}_{i}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{D_{t}}},} & \left\lbrack {{Formula}\mspace{14mu} 222\text{-}2} \right\rbrack \\ {{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {\left( {u,{{{\overset{\rightarrow}{z}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( {z_{j{.1}},\ldots,z_{j.n_{u}}} \right)} \in {F_{q}^{n_{u}}\backslash\left\{ \overset{\rightarrow}{0} \right\}}}} \right)\left( {z_{j,n_{u}} \neq 0} \right)}},{{\overset{\sim}{\theta}}_{j}^{\prime}\overset{U}{\leftarrow}F_{q}},{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{j}^{\prime}{\overset{U}{\partial}F_{q}^{z_{t}}}},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{u}}}{{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{j}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{U_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{\eta}}_{i}^{\prime}\overset{U}{\leftarrow}F_{q}},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( {\overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}},}\overset{\underset{︷}{w_{u}}}{0^{w_{u}},}\overset{\underset{︷}{z_{u}}}{{\overset{\rightarrow}{\overset{\sim}{\eta}}}_{j}^{\prime},}\overset{\underset{︷}{1}}{0}} \right)_{U_{u}}},{{return}\mspace{14mu}{rct}_{\Gamma^{\prime}}\mspace{14mu}\text{:=}\mspace{14mu}{\left( {\Gamma^{\prime},S,\overset{\sim}{S},\Gamma,{\overset{\sim}{\Gamma}\left\{ k_{i}^{*{renc}} \right\}_{{i = 1},\ldots,L}},\left\{ {\overset{\sim}{k}}_{j}^{*{renc}} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},\left\{ c_{t}^{renc} \right\}_{{t = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ {\overset{\sim}{c}}_{u}^{renc} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},c_{T}^{renc},{ct}_{\Gamma}^{rk},{ct}_{\Gamma^{\prime}}^{renc}} \right).}}} & \left\lbrack {{Formula}\mspace{14mu} 222\text{-}3} \right\rbrack \end{matrix}$

The function and operation of the re-ciphertext decryption device 500 will be described.

As illustrated in FIG. 23, the re-ciphertext decryption device 500 is provided with a decryption key reception part 510, a ciphertext reception part 520, a span program calculation part 530, a complementary coefficient calculation part 540, a conversion information generation part 550, a conversion part 560, a pairing operation part 570, and a message calculation part 580. The pairing operation part 570 and the message calculation part 580 will be collectively referred to as a decryption part.

The process of the Dec1 algorithm will be described with reference to FIG. 28.

(S1201: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 510 receives the decryption key sk_(S′) transmitted from the key generation device 100, via the network. The decryption key reception part 310 also receives the public parameters pk generated by the key generation device 100.

(S1202: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 520 receives the re-ciphertext rct_(Γ′) transmitted by the re-encryption device 400, via the network.

(S1203: Span Program Calculation Step)

With the processing device, the span program calculation part 530 determines whether or not the access structure S′ included in the decryption key sk_(S′) accepts Γ′ included in the re-ciphertext rct_(Γ′), and determines whether or not the access structure S^(˜) included in the re-ciphertext rct_(Γ′) accepts Γ^(˜) included in the re-ciphertext rct_(Γ′). The method of determining whether or not the access structure S′ accepts Γ′ and whether or not the access structure S^(˜) accepts Γ^(˜) is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S′ accepts Γ′ and the access structure S^(˜) accepts Γ^(˜) (ACCEPT in S1203), the span program calculation part 530 advances the process to (S1204). If the access structure S′ rejects Γ′ or the access structure S^(˜) rejects Γ^(˜) (REJECT in S1203), the span program calculation part 530 ends the process.

(S1204: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 540 calculates I and J and constants (complementary coefficients) {α_(i)}_(i∈I) and {α^(˜) _(j)}_(j∈J) which satisfy Formula 223. {right arrow over (1)}=Σ_(iγI)α_(i) M _(i),{right arrow over (1)}=Σ_(j∈J){tilde over (α)}_(j) {tilde over (M)} _(J)  [Formula 223] where M_(i) is the i-th row of M, {tilde over (M)}_(j) is the j-th row of {tilde over (M)} and I ⊂{i∈{1, . . . ,L}|[ρ(i)=(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)=0]

[ρ(i)=

(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i)

{right arrow over (x)} _(t)≠0]}, J ⊂{∈{1, . . . ,{tilde over (L)},|[{tilde over (ρ)}(j)=(u,{right arrow over (z)} _(j))

(u,{right arrow over (y)} _(u))∈{tilde over (Γ)}

{right arrow over (z)} _(j) ·{right arrow over (y)} _(u)=0]

[{tilde over (ρ)}(j)=

(u,{right arrow over (z)} _(j))

(u,{right arrow over (y)} _(u))∈{right arrow over (Γ)}

{right arrow over (z)} _(j) ·{right arrow over (y)} _(u)≠0]}

(S1205: Conversion Information Generation Step)

With the processing device, the conversion information generation part 550 generates conversion information W_(1,0), W_(1,t), W^(˜) _(1,u), W_(2,0), W_(2,t), and W^(˜) _(2,u), as indicated in Formula 224.

$\begin{matrix} {{\left( {\left\{ W_{1,t} \right\}_{{t = 0},\ldots,L},\left\{ W_{1,u} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},{??},\overset{\sim}{??}} \right)\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{rk}} \right)}},{\left( {W_{2,0},\left\{ W_{2,t} \right)_{{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma})},\left\{ W_{2,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}} \right)\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{renc}} \right)}}} & \left\lbrack {{Formula}\mspace{14mu} 224} \right\rbrack \end{matrix}$

(S1206: Conversion Step)

With the processing device, the conversion part 560 generates the decryption keys k*₀, k*_(i), and k^(˜*) _(j), and generates the ciphertexts c₀, c_(t), c^(˜) _(u), as indicated in Formula 225. k ₀ *:=K ₀ ^(*renc) W _(1,0) ⁻¹, k _(i) *:=k _(i) ^(*renc) W _(1,i) ⁻¹ for i=1, . . . ,L, {tilde over (k)} _(j) :=k _(j) ^(*renc) {tilde over (W)} _(1,j) ⁻¹ for j=1, . . . ,{tilde over (L)}, c ₀ :=c ₀ ^(renc) W _(2,0) ⁻¹, c _(t) :=c _(t) ^(renc) W _(2,t) ⁻¹ for (t,{right arrow over (x)} _(t))∈Γ, {tilde over (c)} _(u) :={tilde over (c)} _(u) ^(renc) W _(2,u) ⁻¹ for (u,{right arrow over (y)} _(u))∈{tilde over (Γ)}  [Formula 225]

(S1207: Pairing Operation Step)

With the processing device, the pairing operation part 570 calculates Formula 226, to generate a session key K^(˜).

$\begin{matrix} \begin{matrix} {\overset{\sim}{K}\mspace{14mu}\text{:=}\mspace{14mu}{e\left( {c_{0},k_{0}^{*}} \right)}\underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}{e\left( {c_{t}^{renc},k_{i}^{*}} \right)}^{\alpha_{i}}} \\ {\underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}{e\left( {c_{t}^{renc},k_{i}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {({u,{\overset{\rightarrow}{z}}_{j}})}}{\Pi}{e\left( {{\overset{\sim}{c}}_{u}^{renc},{\overset{\sim}{k}}_{j}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {⫬ {({u,{\overset{\rightarrow}{z}}_{j}})}}}{\Pi}{e\left( {{\overset{\sim}{c}}_{u}^{renc},{\overset{\sim}{k}}_{j}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}\text{/}{({{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}})}}} \end{matrix} & \left\lbrack {{Formula}\mspace{14mu} 226} \right\rbrack \end{matrix}$

(S1208: Message Calculation Step)

With the processing device, the message calculation part 580 calculates m′=c^(˜renc) _(T)/K^(˜), to generate a message m′ (=m).

In brief, from (S1201) through (S1208), the re-ciphertext decryption device 500 executes the Dec1 algorithm indicated in Formula 227-1 and Formula 227-2, to generate the message message m′ (=m).

$\begin{matrix} {{Dec}_{1}\left( {{{rct}_{\Gamma^{\prime}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\Gamma^{\prime},{??},\overset{\sim}{??},\Gamma,\overset{\sim}{\Gamma},\left\{ k_{i}^{*{renc}} \right\}_{{i = 1},\ldots,L},\left\{ {\overset{\sim}{k}}_{j}^{*{renc}} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},\left\{ c_{t}^{renc} \right\}_{{i = 0},{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}},\left\{ {\overset{\sim}{c}}_{u}^{renc} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}},c_{T}^{renc},{ct}_{\Gamma^{\prime}}^{rk},{ct}_{\Gamma^{\prime}}^{renc}} \right)},{{sk}_{??}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\Gamma,{sk}_{`??}^{{KP}\text{-}{FE}},k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{i = 1},\ldots,L}} \right)}} \right)} & \left\lbrack {{Formula}\mspace{14mu} 227\text{-}1} \right\rbrack \end{matrix}$ If

accepts Γ′ and

accepts {tilde over (Γ)}, then compute I, J and {α_(i)}_(i∈I), {{tilde over (α)}_(j)}_(j∈J) such that {right arrow over (1)}=Σ_(i∈I)α_(i) M _(i),{right arrow over (1)}=Σ_(j∈J){tilde over (α)}_(j) {tilde over (M)} _(j) where M_(i) is the i-th row of M, {tilde over (M)}_(j) is the j-th row of {tilde over (M)} and

${I \subseteq \left\{ {i \in \left\{ {1,\ldots,L} \right\}} \middle| {\left\lbrack {{\rho(i)} = {{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right) ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack ⩔ \left\lbrack {{\rho(i)} = {{⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)} ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}} \right\rbrack} \right\}},{J \subseteq \left\{ {j \in \left\{ {1,\ldots,\overset{\sim}{L}} \right\}} \middle| {\left\lbrack {{\overset{\sim}{\rho}(j)} = {{\left( {u,{\overset{\rightarrow}{z}}_{j}} \right) ⩓ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right) \in \overset{\sim}{\Gamma}} ⩓ {{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}}} = 0}} \right\rbrack ⩔ \left\lbrack {{\overset{\sim}{\rho}(j)} = {{⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)} ⩓ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right) \in \overset{\sim}{\Gamma}} ⩓ {{{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}} \neq 0}}} \right\rbrack} \right\}},{\left( {\left\{ W_{1,t} \right\}_{{t = 0},\ldots,L},\left\{ W_{1,u} \right\}_{{j = 1},\ldots,\overset{\sim}{L}},{??},{??}} \right)\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}{\quad{\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{rk}} \right),\left( {\left\{ W_{2,t} \right\}_{{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma})},{\left\{ W_{2,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}\overset{R}{\leftarrow}{{Dec}_{{CP}\text{-}{FE}}{\quad{\left( {{pk}^{{CP}\text{-}{FE}},{sk}_{\Gamma^{\prime}}^{{CP}\text{-}{FE}},{ct}_{{??}^{\prime}}^{renc}} \right),\begin{matrix} {{{k_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{0}^{*{renc}}W_{0,1}^{- 1}},{{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{renc}}W_{1,i}^{- 1}\mspace{14mu}{for}\mspace{14mu} i} = 1},\ldots,L,{{{\overset{\sim}{k}}_{j}^{*}\mspace{14mu}\text{:=}\mspace{14mu} k_{j}^{*{renc}}{\overset{\sim}{W}}_{1,j}^{- 1}\mspace{14mu}{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{c_{0}\mspace{14mu}\text{:=}\mspace{14mu} c_{0}^{renc}W_{2,0}^{- 1}},{{c_{t}\mspace{14mu}\text{:=}\mspace{14mu} c_{t}^{renc}W_{2,u}^{- 1}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{{{\overset{\sim}{c}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{u}^{renc}W_{2,u}^{- 1}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}},\begin{matrix} {\overset{\sim}{K}\mspace{14mu}\text{:=}\mspace{14mu}{e\left( {c_{0},k_{0}^{*}} \right)}\underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}{e\left( {c_{t}^{renc},k_{i}^{*}} \right)}^{\alpha_{i}}} \\ {\underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}{e\left( {c_{t}^{renc},k_{i}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {({u,{\overset{\rightarrow}{z}}_{j}})}}{\Pi}{e\left( {{\overset{\sim}{c}}_{u}^{renc},{\overset{\sim}{k}}_{j}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}}} \\ {\underset{{{j \in \overset{\sim}{I}} ⩓ {\rho{(j)}}} = {⫬ {({u,{\overset{\rightarrow}{z}}_{j}})}}}{\Pi}{e\left( {{\overset{\sim}{c}}_{u}^{renc},{\overset{\sim}{k}}_{j}^{*}} \right)}^{{\overset{\sim}{\alpha}}_{j}\text{/}{({{\overset{\rightarrow}{z}}_{j} \cdot {\overset{\rightarrow}{y}}_{u}})}}} \end{matrix}}{{m^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{T}\text{/}\overset{\sim}{K}},{{return}\mspace{14mu}{m^{\prime}.}}}} & \left\lbrack {{Formula}\mspace{14mu} 227\text{-}2} \right\rbrack \end{matrix}}}}}} \right.}}}}$

The process of the Dec2 algorithm will be described with reference to FIG. 29.

(S1301: Decryption Key Reception Step)

For example, with the communication device, the decryption key reception part 310 receives the decryption key sk_(S) transmitted from the key generation device 100, via the network. The decryption key reception part 310 also receives the public parameters pk generated by the key generation device 100.

(S1302: Ciphertext Reception Step)

For example, with the communication device, the ciphertext reception part 350 receives the ciphertext ct_(Γ) transmitted by the re-encryption device 400, via the network.

(S1303: Span Program Calculation Step)

With the processing device, the span program calculation part 361 determines whether or not the access structure S included in the decryption key sk_(S) accepts Γ included in the ciphertext ct_(Γ). The method of determining whether or not the access structure S accepts Γ is as described in “3. Concept for Implementing FCPRE” of Embodiment 1.

If the access structure S accepts Γ (ACCEPT in S1303), the span program calculation part 361 advances the process to (S1304). If the access structure S rejects Γ (REJECT in S1303), the span program calculation part 361 ends the process.

(S1304: Signature Verification Step)

With the processing device, the signature verification part 362 determines whether or not the result of calculating Formula 228 is 1. If the result is 1 (VALID in S1304), the signature verification part 362 advances the process to (S1305). If the result is 0 (INVALID in S1304), the signature verification part 362 ends the process. Ver(verk,C,Sig) where C:=(Γ,{tilde over (Γ)},c ₀ ,{c _(t)}_((t,{right arrow over (x)}) _(t) _(),∈Γ) ,{{tilde over (c)} _(u)}_((u,{right arrow over (y)}) _(u) _(),∈{tilde over (Γ)}) ,c _(T))  [Formula 228]

(S1305: Complementary Coefficient Calculation Step)

With the processing device, the complementary coefficient calculation part 370 calculates I and a constant (complementary coefficient) {α_(i)}_(i∈I) which satisfy Formula 229.

$\begin{matrix} {\overset{\rightarrow}{1} = {\sum\limits_{i \in I}{\alpha_{i}M_{i}}}} & \left\lbrack {{Formula}\mspace{14mu} 229} \right\rbrack \end{matrix}$ where M_(i) is the i-th row of M, and I⊂{i∈{1, . . . ,L}|[ρ(i)=(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)=0]

[ρ(i)=

(t,{right arrow over (v)} _(i))

(t,{right arrow over (x)} _(t))∈Γ

{right arrow over (v)} _(i) ·{right arrow over (x)} _(t)≠0]}

(S1306: Pairing Operation Step)

With the processing device, the pairing operation part 380 calculates Formula 230, to generate a session key K.

$\begin{matrix} {K\mspace{14mu}\text{:=}\mspace{14mu}{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}}{{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}}{e\left( {c_{i},k_{t}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}} & \left\lbrack {{Formula}\mspace{14mu} 230} \right\rbrack \end{matrix}$

(S1307: Message Calculation Step)

With the processing device, the message calculation part 390 calculates m′=c^(enc) _(d+1)/K, to generate a message m′ (=m).

In brief, from (S1301) through (S1307), the decryption device 300 executes the Dec2 algorithm indicated in Formula 231, to generate the message message m′ (=m). Dec ₂(pk,sk _(Γ):=(Γ,s

:=(Γ,s

,k ₀ *,{k _(t)*}_(i=1, . . . ,L)),ct _(Γ):=(Γ,{tilde over (Γ)},c ₀ ,{c _(t)}_((t,{right arrow over (x)}) _(t) _(),∈Γ) ,{{tilde over (c)} _(u)}_((u,{right arrow over (y)}) _(u) _(),∈{tilde over (Γ)}) ,c _(T),verk,Sig))  [Formula 231] If

accepts Γ:={(t,{right arrow over (x)}_(t))} and Ver(verk,C,Sig)=1, then compute I and {α_(i)}_(i∈I) such that

$\overset{\rightarrow}{1} = {\sum\limits_{i \in I}{\alpha_{i}M_{i}}}$ where M_(i) is the i-th row of M, and

$I \subseteq \left\{ {{\left. {i \in \left\{ {1,\ldots,L} \right\}} \middle| {\left\lbrack {{\rho(i)} = {{\left( {t,{\overset{\rightarrow}{v}}_{i}} \right) ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}}} = 0}} \right\rbrack ⩔ {\left. \quad\left\lbrack {{\rho(i)} = {{⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)} ⩓ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma} ⩓ {{{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}} \neq 0}}} \right\rbrack \right\} K\mspace{14mu}\text{:=}\mspace{14mu}{{e\left( {c_{0},k_{0}^{*}} \right)} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {({t,{\overset{\rightarrow}{v}}_{i}})}}{\Pi}}{{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}} \cdot \underset{{{i \in I} ⩓ {\rho{(i)}}} = {⫬ {({t,{\overset{\rightarrow}{v}}_{i}})}}}{\Pi}}{e\left( {c_{t},k_{i}^{*}} \right)}^{\alpha_{i}\text{/}{({{\overset{\rightarrow}{v}}_{i} \cdot {\overset{\rightarrow}{x}}_{t}})}}m^{\prime}}} \right. = {c_{T}\text{/}K}},{{return}\mspace{14mu}{m^{\prime}.}}} \right.$

As has been described above, the cryptographic system according to Embodiment 2 is capable of implementing the KP-FCPRE scheme. Therefore, with a single re-encryption key, a ciphertext can be transferred to a group of various types of users. Furthermore, a condition for designating a ciphertext to be re-encrypted can be specified.

In the above explanation, the decryption device 300 also serves as a re-encryption key generation device, and the decryption device 300 executes not only the Dec2 algorithm but also the RKG algorithm. Alternatively, the decryption device 300 and the re-encryption key generation device may be separate devices. In this case, the decryption device 300 executes the Dec2 algorithm and the re-encryption key generation device executes the RKG algorithm. Accordingly, in this case, the decryption device 300 is provided with a functional configuration necessary for executing the Dec2 algorithm, and the re-encryption key generation device is provided with a functional configuration necessary for executing the RKG algorithm.

In the above explanation, n_(t)+w_(t)+z_(t)+1 is set to N_(t). Alternatively, n_(t)+w_(t)+z_(t)+β_(t) may be set to N_(t) where β_(t) is an integer of not less than 0.

In the above explanation, 9 is set to N₀. Alternatively, 1+1+2+w₀+z₀+β₀ may be set to N₀ where w₀, z₀, and β₀ are each an integer of not less than 0.

In the above explanation, π′(verk,1) in the ciphertext c^(˜renc) ₀ generated in S1111 is additional information H, and σ(−1,verk) in the decryption key k^(*renc) ₀ generated in S1112 is additional information Θ. The additional information H and the additional information Θ are related to each other and are canceled by the pairing operation executed in S1207. Although the security may be somewhat degraded, in place of verk, a value such as a random value may be included in the additional information.

In the above embodiments, assuming a case where a message is encrypted by FE and transmitted to the destination, explanation has been made on how the re-encryption device 400 re-encrypts a ciphertext and changes the destination of the ciphertext.

FE can implement not only the function of encrypting a message and transmitting the message to the destination, but can also implement searchable encryption that renders a ciphertext searchable without decrypting the ciphertext. When searchable encryption is implemented by FE, a preset search keyword can be changed by the algorithms described in the above embodiments.

In the above embodiments, the attribute information set in the ciphertext designates a user who can decrypt. The destination of the ciphertext is changed by changing the attribute information. When searchable encryption is to be implemented by FE, some portion of the attribute information set in the ciphertext designates the user who can search. Part of the remaining portion of the attribute information designates a search keyword. Hence, when that part of the attribute information which designates the search keyword is changed by utilizing the algorithms described in the above embodiments, the preset keyword can be changed.

In the above embodiments, the decryption key is generated by the single key generation device 100. However, it is also possible to combine the algorithms of the above embodiments with the decentralized multi-authority scheme described in Non-Patent Literature 5, so that one decryption key is generated by a plurality of key generation devices 100.

In the above embodiments, when an attribute category is to be added (when the value of d in the attribute format n^(→) is to be increased), public parameters need be issued again. However, it is also possible to combine the algorithms of the above embodiments with the Unbounded scheme described in Non-Patent Literature 6, so that the attribute category can be added without issuing the public parameters again.

In the above embodiments, assuming that the length of a vector used for inner-product cryptography is N, the sizes of the public parameters and of the master secret key are each proportional to N², and a time proportional to N² is needed for generating the decryption key to be given to the user and for the encryption process. However, it is also possible to combine the algorithms of the above embodiments with the scheme described in Non-Patent Literature 7, so that the sizes of the public parameters and of the master secret keys are reduced, and the time needed for generating the decryption key to be given to the user and for the encryption process is shortened.

In the above embodiments, the keys and ciphertexts are transmitted to the transmission destination device. Alternatively, the keys and ciphertexts may be outputted to a storage medium such as a CD or DVD, and the transmission destination device may read the storage medium.

Embodiment 3

In the above embodiments, a method of implementing the cryptographic process in the dual vector spaces has been described. In Embodiment 3, a method of implementing a cryptographic process in dual additive groups will be described.

More specifically, in the above embodiments, the cryptographic process is implemented in the cyclic group of the prime order q. If a ring R is expressed as indicated in Formula 232 using a composite number M, the cryptographic process described in the above embodiments can also be applied to a module having the ring R as a coefficient.

$\begin{matrix} {{\mathbb{R}}\mspace{14mu}\text{:=}\mspace{14mu}{\mathbb{Z}}\text{/}M\;{\mathbb{Z}}} & \left\lbrack {{Formula}\mspace{14mu} 232} \right\rbrack \end{matrix}$ where

: an integer; and M: a composite number

If F_(R) in the algorithms described in the above embodiments is changed to R, the cryptographic process in dual additive groups can be implemented.

From the viewpoint of security proof, in the above embodiments, ρ(i) for each integer i of i=1, . . . , L may be limited to a positive tuple (t,v^(→)) or negative tuple

(t,v^(→)) for different identification information t.

In other words, when ρ(i)=(t,v^(→)) or ρ(i)=

(t,v^(→)), let a function ρ^(˜) be map of {1, . . . , L}→{1, . . . , d} with which ρ^(˜)(i)=t is established. In this case, ρ^(˜) may be limited to injection. Note that ρ(i) is ρ(i) in the access structure S:=(M,ρ(i)) described above.

The hardware configuration of the cryptographic system 10 (the key generation device 100, the encryption device 200, the decryption device 300, the re-encryption device 400, and the re-ciphertext decryption device 500) in the above embodiments will be described.

FIG. 30 is a diagram illustrating an example of the hardware configuration of the key generation device 100, encryption device 200, decryption device 300, re-encryption device 400, and re-ciphertext decryption device 500.

As illustrated in FIG. 30, each of the key generation device 100, encryption device 200, decryption device 300, re-encryption device 400, and re-ciphertext decryption device 500 includes the CPU 911 (also referred to as a Central Processing Unit, central processing device, processing device, computation device, microprocessor, microcomputer, or processor) which executes programs. The CPU 911 is connected to the ROM 913, the RAM 914, an LCD 901 (Liquid Crystal Display), a keyboard 902 (K/B), the communication board 915, and the magnetic disk device 920 via a bus 912, and controls these hardware devices. In place of the magnetic disk device 920 (fixed disk device), a storage device such as an optical disk device or memory card read/write device may be employed. The magnetic disk device 920 is connected via a predetermined fixed disk interface.

The ROM 913 and the magnetic disk device 920 are examples of a nonvolatile memory. The RAM 914 is an example of a volatile memory. The ROM 913, the RAM 914, and the magnetic disk device 920 are examples of the storage device (memory). The keyboard 902 and the communication board 915 are examples of the input device. The communication board 915 is an example of the communication device. Furthermore, the LCD 901 is an example of a display device.

The magnetic disk device 920, ROM 913, or the like stores an operating system 921 (OS), a window system 922, programs 923, and files 924. The CPU 911, the operating system 921, and the window system 922 execute each program of the programs 923.

The programs 923 store software and programs that execute the functions described as the “master key generation part 110”, “master key storage part 120”, “information input part 130”, “decryption key generation part 140”, “key transmission part 150”, “public parameter reception part 210”, “information input part 220”, “signature processing part 230”, “encryption part 240”, “ciphertext transmission part 250”, “decryption key reception part 310”, “information input part 320”, “re-encryption key generation part 330”, “re-encryption key transmission part 340”, “ciphertext reception part 350”, “verification part 360”, “complementary coefficient calculation part 370”, “pairing operation part 380”, “message calculation part 390”, “public parameter reception part 410”, “ciphertext reception part 420”, “re-encryption key reception part 430”, “verification part 440”, “encryption part 450”, “re-ciphertext transmission part 460”, “decryption key reception part 510”, “ciphertext reception part 520”, “span program calculation part 530”, “complementary coefficient calculation part 540”, “conversion information generation part 550”, “conversion part 560”, “pairing operation part 570”, “message calculation part 580”, and the like in the above description. The programs 923 store other programs as well. The programs are read and executed by the CPU 911.

The files 924 store information, data, signal values, variable values, and parameters such as the “public parameters pk”, “master secret key sk”, “decryption keys sk_(S) and sk_(Γ)”, “ciphertexts ct_(Γ) and ct_(S)”, “re-encryption keys rk_(Γ,S′) and rk_(S,Γ′)”, “re-ciphertexts rct_(S′) and rct_(Γ′)”, “access structures S, S′, and S^(˜)”, “attribute sets Γ, Γ′, and Γ^(˜)”, “message m”, and the like of the above explanation, as the items of a “file” and “database”. The “file” and “database” are stored in a recording medium such as a disk or memory. The information, data, signal values, variable values, and parameters stored in the recording medium such as the disk or memory are read out to the main memory or cache memory by the CPU 911 through a read/write circuit, and are used for the operations of the CPU 911 such as extraction, search, look-up, comparison, computation, calculation, process, output, print, and display. The information, data, signal values, variable values, and parameters are temporarily stored in the main memory, cache memory, or buffer memory during the operations of the CPU 1911 including extraction, search, look-up, comparison, computation, calculation, process, output, print, and display.

The arrows of the flowcharts in the above explanation mainly indicate input/output of data and signals. The data and signal values are stored in the memory of the RAM 914, in the recording medium such as an optical disk, or in an IC chip. The data and signals are transmitted online via a transmission medium such as the bus 912, signal lines, or cables; or via electric waves.

The “part” in the above explanation may be a “circuit”, “device”, “equipment”, “means” or “function”; or a “step”, “procedure”, or “process”. The “device” may be a “circuit”, “equipment”, “means”, or “function”; or a “step”, “procedure”, or “process”. The “process” may be a “step”. Namely, the “part” may be implemented as firmware stored in the ROM 913. Alternatively, the “part” may be practiced as only software; as only hardware such as an element, a device, a substrate, or a wiring line; as a combination of software and hardware; or furthermore as a combination of software, hardware, and firmware. The firmware and software are stored, as programs, in the recording medium such as the ROM 913. The program is read by the CPU 911 and executed by the CPU 911. Namely, the program causes the computer to function as the “part” described above. Alternatively, the program causes the computer or the like to execute the procedure and method of the “part” described above.

REFERENCE SIGNS LIST

-   -   100: key generation device; 110: master key generation part;         120: master key storage part; 130: information input part; 140:         decryption key generation part; 141: CP-FE key generation part;         142: random number generation part; 143: decryption key k*         generation part; 144: KP-FE key generation part; 145: f vector         generation part; 146: s vector generation part; 150: key         transmission part; 200: encryption device; 210: public parameter         reception part; 220: information input part; 230: signature         processing part; 240: encryption part; 241: f vector generation         part; 242: s vector generation part; 243: random number         generation part; 244: ciphertext c generation part; 250:         ciphertext transmission part; 300: decryption device; 310:         decryption key reception part; 320: information input part; 330:         re-encryption key generation part; 331: random number generation         part; 332: conversion information W₁ generation part; 333:         conversion information W₁ encryption part; 334: decryption key         k^(*rk) generation part; 335: conversion part; 336: f vector         generation part; 337: s vector generation part; 340:         re-encryption key transmission part; 350: ciphertext reception         part; 360: verification part; 361: span program calculation         part; 362: signature verification part; 370: complementary         coefficient calculation part; 380: pairing operation part; 390:         message calculation part; 400: re-encryption device; 410: public         parameter reception part; 420: ciphertext reception part; 430:         re-encryption key reception part; 440: verification part; 441:         span program calculation part; 442: signature verification part;         450: encryption part; 451: random number generation part; 452: f         vector generation part; 453: s vector generation part; 454:         conversion information W₂ generation part; 455: conversion         information W₂ encryption part; 456: ciphertext c^(renc)         generation part; 457: decryption key k^(*renc) generation part;         460: re-ciphertext transmission part; 500: re-ciphertext         decryption device; 510: decryption key reception part; 520:         ciphertext reception part; 530: span program calculation part;         540: complementary coefficient calculation part; 550: conversion         information generation part; 560: conversion part; 570: pairing         operation part; 580: message calculation part 

The invention claimed is:
 1. A cryptographic system that implements a proxy re-encryption function in a cryptographic scheme for decrypting a ciphertext with a decryption key, the ciphertext being set with one of two pieces of information related to each other, the decryption key being set with the other one of the two pieces of information, the cryptographic system comprising: an encryption computer device to output a ciphertext ct including a ciphertext c and a ciphertext c^(˜), the ciphertext c being set with one of attribute information x and attribute information v related to each other, the ciphertext c^(˜) being set with one of attribute information y and attribute information z related to each other; a re-encryption key generator to acquire a decryption key k* which is set with the other one of the attribute information x and the attribute information v, and to output a re-encryption key rk including a decryption key k^(*rk) a decryption key k^(˜*rk) and encrypted conversion information ϕ^(rk), the decryption key k^(*rk) being obtained by converting the acquired decryption key k* with conversion information W₁, the decryption key k^(˜*rk) being set with the other one of the attribute information y and the attribute information z, the encrypted conversion information ϕ^(rk) being obtained by encrypting the conversion information W₁ by setting one of attribute information x′ and attribute information v′ related to each other; and a re-encryption computer device to output a re-ciphertext rct including a ciphertext c^(renc) and a decryption key k^(*renc), the ciphertext c^(renc) being obtained by setting one of additional information H and additional information Θ related to each other to the ciphertext ct, the decryption key k^(*renc) being obtained by setting the other one of the additional information H and the additional information Θ to the re-encryption key rk; the system thereby establishing an encryption key, decryption key, and re-encryption key with improved flexibility of usage to enhance cybertext security.
 2. The cryptographic system according to claim 1, wherein the decryption key k^(˜*rk) is generated by converting a decryption key k^(˜*) with conversion information W^(˜) ₁, the decryption key k^(˜*) being set with the other one of the attribute information y and the attribute z, and wherein the encrypted conversion information ϕ^(rk) is generated by encrypting the conversion information W₁ and the conversion information W^(˜) ₁, the conversion information W₁ being encrypted by setting said one of the attribute information x′ and the attribute information v′.
 3. The cryptographic system according to claim 2, wherein the ciphertext c is a vector on a basis B, wherein the decryption key k* is a vector on a basis B* related to the basis B, wherein the ciphertext c^(˜) is a vector on a basis H obtained by converting the basis B with conversion information H^(^), and wherein the decryption key ^(˜*rk) is a vector on a basis H* obtained by converting the basis B* with the conversion information H^(^).
 4. The cryptographic system according to claim 3, wherein the encryption device outputs the ciphertext ct including the ciphertext c indicated in Formula 1 and the ciphertext c^(˜) indicated in Formula 2, wherein the re-encryption key generator acquires the decryption key k* indicated in Formula 3, and outputs the re-encryption key rk including the decryption key k^(*rk) indicated in Formula 4, the decryption key k^(˜*rk) indicated in Formula 5, and the encrypted conversion information ϕ^(rk), and wherein the re-encryption computer device outputs the re-ciphertext rct including the ciphertext c^(renc) indicated in Formula 6 and the decryption key k^(*renc) indicated in Formula 7 $\begin{matrix} {{c_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\zeta,{- s_{0}}} \right)_{B_{0}}},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i} = \left( {t,{{\overset{\rightarrow}{v}}_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( {v_{i{.1}},\ldots,v_{i.n_{t}}} \right)}} \right)},{c_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}{\overset{\rightarrow}{v}}_{t}}} \right)_{B_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{c_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{s_{i}{\overset{\rightarrow}{v}}_{t}} \right)_{B_{t}}},{{c\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0},\left\{ c_{i} \right\}_{{i = 1},\ldots,L}} \right){where}\overset{\rightarrow}{f}}\overset{U}{\leftarrow}F_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1},\ldots,s_{L}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{T}}},{s_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},\zeta,{\theta_{i}\overset{U}{\leftarrow}F_{q}},} \right.}} & \left\lbrack {{Formula}\mspace{14mu} 1} \right\rbrack \end{matrix}$ M is an (L rows×r columns) matrix n_(t) is an integer of not less than 1 $\begin{matrix} {{{\overset{\sim}{c}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\sim}{\zeta},{- {\overset{\sim}{s}}_{0}}} \right)_{B_{0}}}{{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{{\overset{\rightarrow}{z}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( {z_{j,1},\ldots,z_{j,n_{u}}} \right)}} \right)},{{\overset{\sim}{c}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}{\overset{\rightarrow}{z}}_{j}}} \right)_{H_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(i)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{c}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{u}}}{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{z}}_{j}} \right)_{H_{u}}}}{c^{\sim}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{c}}_{0},\left\{ {\overset{\sim}{c}}_{j} \right\}_{{j = 1},\ldots,\overset{\sim}{L}}} \right)}{where}{{\overset{\rightarrow}{\overset{\sim}{f}}\overset{U}{\leftarrow}F_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1},\ldots,{\overset{\sim}{s}}_{L}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},{{\overset{\sim}{s}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},\overset{\sim}{\zeta},{{\overset{\sim}{\theta}}_{i}\overset{U}{\leftarrow}F_{q}}}} & \left\lbrack {{Formula}\mspace{14mu} 2} \right\rbrack \end{matrix}$ {tilde over (M)} is an ({tilde over (L)} rows×{tilde over (r)} columns) matrix n_(u) is an integer of not less than 1 $\begin{matrix} {{{k_{0}^{*}\mspace{20mu}\text{:=}\mspace{14mu}\left( {1,\delta} \right)_{B_{0}^{*}}},{k_{t}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{\delta{\overset{\rightarrow}{x}}_{t}} \right)_{B_{t}^{*}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)},{\in \Gamma},{{{\overset{\sim}{k}}_{u,i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}{\delta h}_{u,i}^{*}\mspace{14mu}{for}\mspace{14mu} u} = 1},\ldots,{d;{i = 1}},\ldots,n_{u},{k^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*},\left\{ k_{t}^{*} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})},{\in \Gamma}},\left\{ k_{u,i}^{*} \right\}_{{u = 1},\ldots,{d;{i = 1}},\ldots,n_{u}}} \right)}}{where}{{\delta\overset{U}{\leftarrow}F_{q}},{\Gamma = \left( {\left\{ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right),{1 \leq t \leq d}} \right\},{{\overset{\rightarrow}{x}}_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {x_{t,1},\ldots,x_{t,n_{t}}} \right)},{H_{u}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {h_{u,1}^{*},,h_{u,n_{u}}^{*}} \right)}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 3} \right\rbrack \end{matrix}$ d is an integer of not less than 1 $\begin{matrix} {{{k^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu} k_{t}^{*}W_{q,t}\mspace{14mu}{for}\mspace{14mu} 0},{\left( {t,{\overset{\rightarrow}{x}}_{t}} \right) \in \Gamma}}{where}{W_{1}\mspace{14mu}\text{:=}\mspace{14mu}\left\{ W_{1,t} \right\}_{0,{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}}}} & \left\lbrack {{Formula}\mspace{14mu} 4} \right\rbrack \\ {{{{{{\overset{\sim}{k}}_{u,i}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{y}}_{u,i}{\overset{\sim}{k}}_{u,i}^{*}{\overset{\sim}{W}}_{1,u}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}};{i = 1}},\ldots,n_{u},{{k_{u}^{\sim {*{rk}}}\mspace{14mu}\text{:=}\mspace{14mu}{\sum_{i = 1}^{n_{u}}{{\overset{\sim}{k}}_{u,i}^{*{rk}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}}} \in \overset{\sim}{\Gamma}},{k^{\sim {*{rk}}}\mspace{14mu}\text{:=}\mspace{14mu}\left\{ k_{u}^{\sim {*{rk}}} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}}}{where}{{\overset{\sim}{\Gamma} = \left( \left\{ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right),{1 \leq u \leq d}} \right) \right\}},{{\overset{\rightarrow}{y}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( {y_{u,1},\ldots,y_{u,n_{u}}} \right)},{W_{1}^{\sim}\mspace{14mu}\text{:=}\mspace{14mu}\left\{ {\overset{\sim}{W}}_{1,u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}}}} & \left\lbrack {{Formula}\mspace{14mu} 5} \right\rbrack \\ {{{{\overset{\sim}{c}}_{0}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0} + {\overset{\sim}{c}}_{0} + {\left( {\zeta^{\prime},{{- s_{0}^{\prime}} - {\overset{\sim}{s}}_{0}^{\prime}},{\pi^{\prime}\left( {{vk},1} \right)}} \right)B_{0}}} \right)},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{{c_{i}^{renc}\mspace{14mu}\text{:=}\mspace{14mu} c_{i}} + \left( \overset{\underset{︷}{n_{t}}}{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}} \right)_{B_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{{c_{i}^{renc}\mspace{14mu}\text{:=}\mspace{14mu} c_{i}} + \left( \overset{\underset{︷}{n_{t}}}{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}} \right)_{B_{t}}},{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{{\overset{\sim}{c}}_{j}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{j}} + \left( \overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}}} \right)_{H_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{{\overset{\sim}{c}}_{j}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{c}}_{j}} + \left( \overset{\underset{︷}{n_{u}}}{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}} \right)_{H_{u}}},{c^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{c}}_{0}^{renc},\left\{ c_{i}^{renc} \right\}_{{i = 1},\ldots,L},\left\{ {\overset{\sim}{c}}_{j}^{renc} \right\}_{{j = 1},\ldots,\overset{\sim}{L}}} \right)}}{where}{{{\overset{\rightarrow}{f}}^{\prime}\overset{U}{\leftarrow}F_{q}^{r}},{{\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime}\overset{U}{\leftarrow}F_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{s}}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1}^{\prime},\ldots,s_{L}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{s_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1}^{\prime},\ldots,{\overset{\sim}{s}}_{\overset{\sim}{L}}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},{{\overset{\sim}{s}}_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},\pi^{\prime},\zeta^{\prime},\theta_{i}^{\prime},{{\overset{\sim}{\theta}}_{j}^{\prime}\overset{U}{\leftarrow}F_{q}},}} & \left\lbrack {{Formula}\mspace{14mu} 6} \right\rbrack \end{matrix}$ vk is a value $\begin{matrix} {{{{k_{0}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{0}^{*{rk}}} + \left( {0^{2},{\sigma\left( {{- 1},{vk}} \right)}} \right)_{D_{0}^{*}}},{{{k_{t}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{t}^{*{rk}}} + {r\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)}} \in \Gamma},{{{{\overset{\sim}{k}}_{u}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{u}^{*{rk}}} + {r^{\prime}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)}} \in \overset{\sim}{\Gamma}},{k^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*{renc}},\left\{ k_{t}^{*{renc}} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma},\left\{ {\overset{\sim}{k}}_{u}^{*{renc}} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}} \right)}}{where}\sigma,r,{r^{\prime}\overset{U}{\leftarrow}{F_{q}.}}} & \left\lbrack {{Formula}\mspace{14mu} 7} \right\rbrack \end{matrix}$
 5. The cryptographic system according to claim 3, wherein the encryption computer device outputs the ciphertext ct including the ciphertext c indicated in Formula 8 and the ciphertext c^(˜) indicated in Formula 9, wherein the re-encryption key generator acquires the decryption key k* indicated in Formula 10, and outputs the re-encryption key rk including the decryption key k^(*rk) indicated in Formula 11, the decryption key k^(˜*rk) indicated in Formula 12, and the encrypted conversion information ϕ^(rk), and wherein the re-encryption computer device outputs the re-ciphertext rct including the ciphertext c^(renc) indicated in Formula 13 and the decryption key k^(*renc) indicated in Formula 14 $\begin{matrix} {{{c_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\zeta,\delta} \right)_{B_{0}}},{{c_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{\delta{\overset{\rightarrow}{x}}_{t}} \right)_{B_{t}}\mspace{14mu}{for}\mspace{14mu}\left( {t,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma},{c\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0},\left\{ c_{t} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}} \right)}}{where}{\zeta,{\delta\overset{U}{\leftarrow}F_{q}},{\Gamma = \left( {\left\{ {\left( {t,{\overset{\rightarrow}{x}}_{t}} \right),{1 \leq t \leq d}} \right\},{{\overset{\rightarrow}{x}}_{t}\mspace{14mu}\text{:=}\mspace{14mu}\left( {x_{t,1},\ldots,x_{t,n_{t}}} \right)},} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 8} \right\rbrack \end{matrix}$ n_(t) is an integer of not less than 1 $\begin{matrix} {{{{\overset{\sim}{c}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}\left( {\overset{\sim}{\zeta},\delta} \right)_{B_{0}}},{{{\overset{\sim}{c}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{u}}}{\delta{\overset{\rightarrow}{y}}_{u}} \right)_{H_{u}}\mspace{14mu}{for}\mspace{14mu}\left( {u,{\overset{\rightarrow}{y}}_{u}} \right)} \in \overset{\sim}{\Gamma}},{c^{\sim}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{c}}_{0},\left\{ {\overset{\sim}{c}}_{u} \right\}_{{({u,{\overset{\rightarrow}{y}}_{u}})} \in \overset{\sim}{\Gamma}}} \right)}}{where}{{\overset{\sim}{\zeta}\overset{U}{\leftarrow}F_{q}},{\overset{\sim}{\Gamma} = \left( {\left\{ {\left( {u,{\overset{\rightarrow}{y}}_{u}} \right),{1 \leq u \leq d}} \right\},{{\overset{\rightarrow}{y}}_{u}\mspace{14mu}\text{:=}\mspace{14mu}\left( {y_{u,1},\ldots,y_{u,n_{u}}} \right)}} \right.}}} & \left\lbrack {{Formula}\mspace{14mu} 9} \right\rbrack \end{matrix}$ n_(u) is an integer of not less than 1 $\begin{matrix} {{{k_{0}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {1,{- s_{0}}} \right)_{B_{0}^{*}}},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{{\overset{\rightarrow}{v}}_{i}\mspace{14mu}\text{:=}\mspace{14mu}\left( {v_{i,1},\ldots,v_{i,n_{i}}} \right)}} \right)},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{{s_{i}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}{\overset{\rightarrow}{v}}_{t}}} \right)_{B_{t}^{*}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{k_{i}^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{t}}}{s_{i}{\overset{\rightarrow}{v}}_{i}} \right)_{B_{t}^{*}}},{k^{*}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*},\left\{ k_{i}^{*} \right\}_{{i = 1},\ldots,L}} \right)}}{where}{{\overset{\rightarrow}{f}\overset{U}{\leftarrow}F_{q}^{r}},{{\overset{\rightarrow}{s}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1},\ldots,s_{L}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{T}}},{s_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{T}}},{\theta_{i}\overset{U}{\leftarrow}F_{q}},}} & \left\lbrack {{Formula}\mspace{14mu} 10} \right\rbrack \end{matrix}$ M is an (L rows×r columns) matrix $\begin{matrix} {{{k_{0}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*} + \left( {0,{- {\overset{\sim}{s}}_{0}}} \right)_{B^{*}}} \right)W_{1,0}},{{k_{i}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*}W_{1,i}\mspace{14mu}{for}\mspace{14mu} i} = 1},\ldots,L,{k^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*{rk}},\left\{ k_{i}^{*{rk}} \right\}_{{i = 1},\ldots,L}} \right)}}{where}{{\overset{\rightarrow}{\overset{\sim}{f}}\overset{U}{\leftarrow}F_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1},\ldots,{\overset{\sim}{s}}_{L}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},{{\overset{\sim}{s}}_{0}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{T}}},{W_{1}\mspace{14mu}\text{:=}\mspace{14mu}\left\{ W_{1,i} \right\}_{{i = 0},\ldots,L}}}} & \left\lbrack {{Formula}\mspace{14mu} 11} \right\rbrack \end{matrix}$ {tilde over (M)} is an ({tilde over (L)} columns×{tilde over (r)} columns) matrix $\begin{matrix} {{{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{{\overset{\rightarrow}{z}}_{j}\mspace{14mu}\text{:=}\mspace{14mu}\left( {z_{j,1},\ldots,z_{j,n_{u}}} \right)}} \right)},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}{\overset{\rightarrow}{z}}_{j}}} \right)_{H_{u}^{*}}{\overset{\sim}{W}}_{1,j}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{\overset{\sim}{k}}_{j}^{*{rk}}\mspace{14mu}\text{:=}\mspace{14mu}\left( \overset{\underset{︷}{n_{u}}}{{\overset{\sim}{s}}_{j}{\overset{\rightarrow}{z}}_{j}} \right)_{H_{u}^{*}}{\overset{\sim}{W}}_{1,j}}}{where}{W_{1}^{\sim}\mspace{14mu}\text{:=}\mspace{14mu}\left\{ {\overset{\sim}{W}}_{1,j} \right\}_{{j = 1},\ldots,\overset{\sim}{L}}}} & \left\lbrack {{Formula}\mspace{14mu} 12} \right\rbrack \\ {{{c_{0}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0} + {\overset{\sim}{c}}_{0} + {\left( {\zeta^{\prime},\delta^{\prime},{\pi^{\prime}\left( {{vk},1} \right)}} \right)B_{0}}} \right)},{{c_{t}^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{t} + {\left( {\delta^{\prime}{\overset{\rightarrow}{x}}_{t}} \right)B_{t}}} \right)\mspace{14mu}{for}\mspace{14mu}\left( {x,{\overset{\rightarrow}{x}}_{t}} \right)} \in \Gamma}}{c^{renc}\mspace{14mu}\text{:=}\mspace{14mu}\left( {c_{0}^{renc},\left\{ c_{t}^{renc} \right\}_{{({t,{\overset{\rightarrow}{x}}_{t}})} \in \Gamma}} \right)}{where}{\zeta^{\prime},\delta^{\prime},{\pi^{\prime}\overset{U}{\leftarrow}F_{q}},}} & \left\lbrack {{Formula}\mspace{14mu} 13} \right\rbrack \end{matrix}$ vk is a value $\begin{matrix} {{{k_{0}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*{rk}} + \left( {0,0,{\sigma\left( {{- 1},{vk}} \right)}} \right)_{D_{0}^{*}}} \right)W_{1,0}},{{{for}\mspace{14mu} i} = 1},\ldots,L,{{{if}\mspace{14mu}{\rho(i)}} = \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( \overset{\underset{︷}{n_{t}}}{{s_{i}^{\prime}{\overset{\rightarrow}{e}}_{t,1}} + {\theta_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}}} \right)_{D_{t}}},{{{if}\mspace{14mu}{\rho(i)}} = {⫬ \left( {t,{\overset{\rightarrow}{v}}_{i}} \right)}},{{k_{i}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu} k_{i}^{*{rk}}} + \left( \overset{\underset{︷}{n_{t}}}{s_{i}^{\prime}{\overset{\rightarrow}{v}}_{i}} \right)_{D_{t}}},{{{for}\mspace{14mu} j} = 1},\ldots,\overset{\sim}{L},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( \overset{\underset{︷}{n_{u}}}{{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{e}}_{u,1}} + {{\overset{\sim}{\theta}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}}} \right)_{U_{u}}},{{{if}\mspace{14mu}{\overset{\sim}{\rho}(j)}} = {⫬ \left( {u,{\overset{\rightarrow}{z}}_{j}} \right)}},{{{\overset{\sim}{k}}_{j}^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{k}}_{j}^{*{rk}}} + \left( \overset{\underset{︷}{n_{u}}}{{\overset{\sim}{s}}_{j}^{\prime}{\overset{\rightarrow}{z}}_{j}} \right)_{U_{u}}},{k^{*{renc}}\mspace{14mu}\text{:=}\mspace{14mu}\left( {k_{0}^{*{renc}},\left\{ k_{i}^{*{renc}} \right\}_{{i = 1},\ldots,L},\left\{ {\overset{\sim}{k}}_{j}^{*{renc}} \right\}_{{j = 1},\ldots,\overset{\sim}{L}}} \right)}}{where}{{\overset{\rightarrow}{f}}^{\prime}\overset{U}{\leftarrow}F_{q}^{r}},{{\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime}\overset{U}{\leftarrow}F_{q}^{\overset{\sim}{r}}},{{\overset{\rightarrow}{s}}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {s_{1}^{\prime},\ldots,s_{L}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{M \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{s_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{f}}^{\prime\; T}}},{{\overset{\rightarrow}{\overset{\sim}{s}}}^{\prime\; T}\mspace{14mu}\text{:=}\mspace{14mu}\left( {{\overset{\sim}{s}}_{1}^{\prime},,{\overset{\sim}{s}}_{L}^{\prime}} \right)^{T}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\sim}{M} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},{{\overset{\sim}{s}}_{0}^{\prime}\mspace{14mu}\text{:=}\mspace{14mu}{\overset{\rightarrow}{1} \cdot {\overset{\rightarrow}{\overset{\sim}{f}}}^{\prime\; T}}},\sigma,\theta_{i}^{\prime},{{\overset{\sim}{\theta}}_{j}^{\prime}\overset{U}{\leftarrow}{F_{q}.}}} & \left\lbrack {{Formula}\mspace{14mu} 14} \right\rbrack \end{matrix}$
 6. The cryptographic system according to claim 3, further comprising a re-ciphertext decryption computer device to acquire a decryption key k*′ which is set with the other one of the attribute information x′ and the attribute information v′, and to decrypt the re-ciphertext rct using the acquired decryption key k*′.
 7. The cryptographic system according to claim 2, further comprising a re-ciphertext decryption computer device to acquire a decryption key k*′ which is set with the other one of the attribute information x′ and the attribute information v′, and to decrypt the re-ciphertext rct using the acquired decryption key k*′.
 8. The cryptographic system according to claim 1, further comprising: a re-ciphertext decryption computer device to acquire a decryption key k*′ which is set with the other one of the attribute information x′ and the attribute information v′, and to decrypt the re-ciphertext rct using the acquired decryption key k*′.
 9. A cryptographic program stored on a non-transitory computer storage medium and when executed by a computer processor forming a computer device that implements a proxy re-encryption function in a cryptographic scheme for decrypting a ciphertext with a decryption key, the ciphertext being set with one of two pieces of information related to each other, the decryption key being set with the other one of the two pieces of information, the cryptographic program comprising causing the computer processor to execute: an encryption process to output a ciphertext ct including a ciphertext c and a ciphertext c^(˜), the ciphertext c being set with one of attribute information x and attribute information v related to each other, the ciphertext c^(˜) being set with one of attribute information y and attribute information z related to each other; a re-encryption key generation process to acquire a decryption key k* which is set with the other one of the attribute information x and the attribute information v, and to output a re-encryption key rk including a decryption key k^(*rk), a decryption key k^(˜*rk), and encrypted conversion information ϕ^(rk), the decryption key k^(*rk) being obtained by converting the acquired decryption key k* with conversion information W₁, the decryption key k^(˜*rk) being set with the other one of the attribute information y and the attribute information z, the encrypted conversion information ϕ^(rk) being obtained by encrypting the conversion information W₁ by setting one of attribute information x′ and attribute information v′ related to each other; and a re-encryption process to output a re-ciphertext rct including a ciphertext c^(renc) and a decryption key k^(*renc), the ciphertext c^(renc) being obtained by setting one of additional information H and additional information Θ related to each other, to the ciphertext ct, the decryption key k^(*renc) being obtained by setting the other one of the additional information H and the additional information Θ to the re-encryption key rk; the cryptographic program when implemented by the computer processor thereby establishing an encryption key, decryption key, and re-encryption key with improved flexibility of usage to enhance cybertext security. 