a data encryption step; and a data decryption step, wherein the encryption step comprises the steps of: preparing n pairs of secret keys and public keys in a public-key cryptographic scheme, where n is a positive integer, generating a new key using at least one of the public keys, encrypting data in a common-key cryptographic scheme by use of the new key, preparing a (k,n) threshold logic (k is an