SG10201903265PA - Parameter based key derivation - Google Patents

Parameter based key derivation

Info

Publication number
SG10201903265PA
SG10201903265PA SG10201903265PA SG10201903265PA SG10201903265PA SG 10201903265P A SG10201903265P A SG 10201903265PA SG 10201903265P A SG10201903265P A SG 10201903265PA SG 10201903265P A SG10201903265P A SG 10201903265PA SG 10201903265P A SG10201903265P A SG 10201903265PA
Authority
SG
Singapore
Prior art keywords
keys
key
function
parameter based
message
Prior art date
Application number
SG10201903265PA
Inventor
Gregory Roth
Bradley Behm
Eric Crahen
Cristian Ilac
Nathan Fitch
Eric Brandwine
Kevin O'neill
Original Assignee
Amazon Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/248,973 external-priority patent/US9197409B2/en
Priority claimed from US13/248,962 external-priority patent/US9178701B2/en
Priority claimed from US13/248,953 external-priority patent/US9203613B2/en
Application filed by Amazon Tech Inc filed Critical Amazon Tech Inc
Publication of SG10201903265PA publication Critical patent/SG10201903265PA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Abstract

PARAMETER BASED KEY DERIVATION Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, the key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the key’ s use. Figure 1
SG10201903265PA 2011-09-29 2012-09-28 Parameter based key derivation SG10201903265PA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/248,973 US9197409B2 (en) 2011-09-29 2011-09-29 Key derivation techniques
US13/248,962 US9178701B2 (en) 2011-09-29 2011-09-29 Parameter based key derivation
US13/248,953 US9203613B2 (en) 2011-09-29 2011-09-29 Techniques for client constructed sessions

Publications (1)

Publication Number Publication Date
SG10201903265PA true SG10201903265PA (en) 2019-05-30

Family

ID=47996473

Family Applications (3)

Application Number Title Priority Date Filing Date
SG10201608067QA SG10201608067QA (en) 2011-09-29 2012-09-28 Parameter based key derivation
SG10201903265PA SG10201903265PA (en) 2011-09-29 2012-09-28 Parameter based key derivation
SG2014012264A SG2014012264A (en) 2011-09-29 2012-09-28 Parameter based key derivation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
SG10201608067QA SG10201608067QA (en) 2011-09-29 2012-09-28 Parameter based key derivation

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG2014012264A SG2014012264A (en) 2011-09-29 2012-09-28 Parameter based key derivation

Country Status (10)

Country Link
EP (3) EP3742300A1 (en)
JP (3) JP6082015B2 (en)
CN (2) CN107017984B (en)
AU (3) AU2012315674B9 (en)
BR (2) BR122015024906B1 (en)
CA (1) CA2847713C (en)
IN (1) IN2014DN03111A (en)
RU (6) RU2582540C2 (en)
SG (3) SG10201608067QA (en)
WO (1) WO2013049689A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101837150B1 (en) * 2016-06-30 2018-03-09 (주)넷비젼텔레콤 Proxy authentication system and method for providing proxy service
US20180019986A1 (en) * 2016-07-12 2018-01-18 Qualcomm Incorporated User privacy protected location-based authentication on mobile devices
DE102017201891A1 (en) * 2017-02-07 2018-08-09 Siemens Aktiengesellschaft Programmable hardware security module and method on a programmable hardware security module
CA3065767C (en) * 2017-11-16 2021-12-21 Intuit Inc. Cryptographic key generation for logically sharded data stores
US10586057B2 (en) 2017-11-16 2020-03-10 Intuit Inc. Processing data queries in a logically sharded data store
US10873450B2 (en) 2017-11-16 2020-12-22 Intuit Inc. Cryptographic key generation for logically sharded data stores
EP3599737A1 (en) * 2018-07-24 2020-01-29 Gemalto Sa Method to create a primary cryptographic key with owner-defined transformation rules
CN109377215B (en) 2018-08-06 2020-04-21 阿里巴巴集团控股有限公司 Block chain transaction method and device and electronic equipment
WO2019072276A2 (en) 2018-11-27 2019-04-18 Alibaba Group Holding Limited System and method for information protection
ES2881674T3 (en) 2018-11-27 2021-11-30 Advanced New Technologies Co Ltd System and method for the protection of information
PL3523919T3 (en) 2018-11-27 2021-05-04 Alibaba Group Holding Limited System and method for information protection
US10700850B2 (en) 2018-11-27 2020-06-30 Alibaba Group Holding Limited System and method for information protection
CN110730963B (en) * 2018-11-27 2023-12-01 创新先进技术有限公司 System and method for information protection
ES2859569T3 (en) 2018-11-27 2021-10-04 Advanced New Technologies Co Ltd System and method for the protection of information
WO2020239179A1 (en) * 2019-05-28 2020-12-03 Kamstrup A/S Distributed access control
CN114531302A (en) * 2021-12-28 2022-05-24 中国电信股份有限公司 Data encryption method, device and storage medium

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956404A (en) * 1996-09-30 1999-09-21 Schneier; Bruce Digital signature with auditing bits
US5917911A (en) * 1997-01-23 1999-06-29 Motorola, Inc. Method and system for hierarchical key access and recovery
US6097817A (en) * 1997-12-10 2000-08-01 Omnipoint Corporation Encryption and decryption in communication system with wireless trunk
US6601172B1 (en) * 1997-12-31 2003-07-29 Philips Electronics North America Corp. Transmitting revisions with digital signatures
GB2342195A (en) * 1998-09-30 2000-04-05 Xerox Corp Secure token-based document server
US6711679B1 (en) * 1999-03-31 2004-03-23 International Business Machines Corporation Public key infrastructure delegation
US6643774B1 (en) * 1999-04-08 2003-11-04 International Business Machines Corporation Authentication method to enable servers using public key authentication to obtain user-delegated tickets
US20020194483A1 (en) * 2001-02-25 2002-12-19 Storymail, Inc. System and method for authorization of access to a resource
US20030041110A1 (en) * 2000-07-28 2003-02-27 Storymail, Inc. System, Method and Structure for generating and using a compressed digital certificate
US7308431B2 (en) * 2000-09-11 2007-12-11 Nokia Corporation System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure
JP4301482B2 (en) * 2001-06-26 2009-07-22 インターナショナル・ビジネス・マシーンズ・コーポレーション Server, information processing apparatus, access control system and method thereof
JP2003058657A (en) * 2001-08-09 2003-02-28 Matsushita Electric Ind Co Ltd Server and method for license management
JP2005500740A (en) * 2001-08-13 2005-01-06 ザ ボード オブ トラスティーズ オブ ザ リーランド スタンフォード ジュニア ユニバーシティ ID-based encryption and related cryptosystem systems and methods
US7617542B2 (en) * 2001-12-21 2009-11-10 Nokia Corporation Location-based content protection
EP1472816A4 (en) * 2002-01-30 2010-01-27 Tecsec Inc Access system utilizing multiple factor identification and authentication
NO318842B1 (en) * 2002-03-18 2005-05-09 Telenor Asa Authentication and access control
US6971017B2 (en) * 2002-04-16 2005-11-29 Xerox Corporation Ad hoc secure access to documents and services
US7502933B2 (en) * 2002-11-27 2009-03-10 Rsa Security Inc. Identity authentication system and method
EP1515507A1 (en) * 2003-09-09 2005-03-16 Axalto S.A. Authentication in data communication
JP2006120089A (en) * 2004-10-25 2006-05-11 Ntt Docomo Inc Data management system and data management method
JP4701733B2 (en) * 2005-02-04 2011-06-15 パナソニック株式会社 Management server, device, and license management system
US20090199009A1 (en) * 2005-06-07 2009-08-06 Pei Yen Chia Systems, methods and computer program products for authorising ad-hoc access
JP4792944B2 (en) * 2005-11-30 2011-10-12 日本電気株式会社 Permission management system, token verification method, token verification program
JP4823704B2 (en) * 2006-02-01 2011-11-24 Kddi株式会社 Authentication system, authentication information delegation method and security device in the same system
JP4766249B2 (en) * 2006-03-01 2011-09-07 日本電気株式会社 Token transfer method, token transfer system, and authority authentication permission server
US8312523B2 (en) 2006-03-31 2012-11-13 Amazon Technologies, Inc. Enhanced security for electronic communications
US8112794B2 (en) * 2006-07-17 2012-02-07 Research In Motion Limited Management of multiple connections to a security token access device
JP2008172728A (en) * 2007-01-15 2008-07-24 Megachips System Solutions Inc Security system
WO2008094452A2 (en) * 2007-01-26 2008-08-07 Interdigital Technology Corporation Method and apparatus for securing location information and access control using the location information
JP4982215B2 (en) * 2007-03-14 2012-07-25 株式会社トヨタIt開発センター Encryption communication system, encryption communication method, encryption communication program, in-vehicle terminal, and server
US9106426B2 (en) * 2008-11-26 2015-08-11 Red Hat, Inc. Username based authentication and key generation
JP5446650B2 (en) * 2009-09-17 2014-03-19 沖電気工業株式会社 Communication data novelty confirmation system, transmitting terminal and receiving terminal

Also Published As

Publication number Publication date
WO2013049689A1 (en) 2013-04-04
JP2017069989A (en) 2017-04-06
RU2019137439A (en) 2021-05-21
SG10201608067QA (en) 2016-11-29
JP6527179B2 (en) 2019-06-05
CN107017984A (en) 2017-08-04
EP3742300A1 (en) 2020-11-25
RU2670778C1 (en) 2018-10-25
JP6895478B2 (en) 2021-06-30
JP2019149833A (en) 2019-09-05
RU2636105C1 (en) 2017-11-20
RU2019137439A3 (en) 2021-11-16
RU2582540C2 (en) 2016-04-27
CA2847713A1 (en) 2013-04-04
BR112014007665B1 (en) 2021-07-13
JP2014531855A (en) 2014-11-27
CA2847713C (en) 2021-02-09
BR122015024906B1 (en) 2021-10-19
AU2020200584A1 (en) 2020-02-13
CN103842984B (en) 2017-05-17
EP2761487A4 (en) 2015-06-24
AU2020200584B2 (en) 2021-05-06
AU2018202251A1 (en) 2018-04-26
AU2012315674B2 (en) 2018-04-19
EP3493070A1 (en) 2019-06-05
RU2014117153A (en) 2015-11-10
CN103842984A (en) 2014-06-04
CN107017984B (en) 2020-09-01
AU2012315674A1 (en) 2014-03-20
EP3493070B1 (en) 2020-07-29
IN2014DN03111A (en) 2015-05-15
AU2018202251B2 (en) 2019-10-31
EP2761487A1 (en) 2014-08-06
SG2014012264A (en) 2014-08-28
JP6082015B2 (en) 2017-02-15
RU2709162C1 (en) 2019-12-16
AU2012315674B9 (en) 2018-08-30
EP2761487B1 (en) 2018-11-07
RU2671052C1 (en) 2018-10-29
BR122015024906A2 (en) 2019-08-27
BR112014007665A2 (en) 2017-04-18
RU2670778C9 (en) 2018-11-23

Similar Documents

Publication Publication Date Title
SG10201903265PA (en) Parameter based key derivation
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
CN107483191B (en) SM2 algorithm key segmentation signature system and method
WO2012172832A3 (en) Authenticator, authenticatee and authentication method
SG10201406849RA (en) Strong authentication token usable with a plurality of independent application providers
WO2013068843A3 (en) Multi-key cryptography for encrypting file system acceleration
GB201314465D0 (en) System and method for computerized negotiations based on coded integrity
GB2512249A (en) Secure peer discovery and authentication using a shared secret
Shim Security models for certificateless signature schemes revisited
CN102594824A (en) Security electronic document distribution method based on multiple security protection mechanisms
Yoon et al. New ID-based proxy signature scheme with message recovery
RU2014126582A (en) SIMPLIFIED MANAGEMENT OF GROUP SECRET KEYS
US10587416B1 (en) System and method of audit log protection
JP2015521003A5 (en)
KR101382626B1 (en) System and method for id-based strong designated verifier signature
US10681038B1 (en) Systems and methods for efficient password based public key authentication
CN106713349A (en) Inter-group proxy re-encryption method capable of resisting selected ciphertext attack
CN106100818A (en) A kind of data ciphering method of the full homomorphic cryptography multinomial based on integer
TW200518552A (en) Challenge-based authentication without requiring knowledge of secret authentication data
MX2021008680A (en) Techniques for call authentication.
Chen et al. NIST post-quantum cryptography standardization
Tiwari On the security of pairing-free certificateless digital signature schemes using ECC
Bertoni et al. Keccak and the SHA-3 Standardization
CN105703903A (en) Multi-factor anti-fake method based on public key cipher and system