ATE361605T1 - Eine technik zur erstellung privat authentifizierbarer kryptografischer unterschriften und zur verwendung einer solchen unterschrift in verbindung mit der kopie eines produktes - Google Patents

Eine technik zur erstellung privat authentifizierbarer kryptografischer unterschriften und zur verwendung einer solchen unterschrift in verbindung mit der kopie eines produktes

Info

Publication number
ATE361605T1
ATE361605T1 AT99940794T AT99940794T ATE361605T1 AT E361605 T1 ATE361605 T1 AT E361605T1 AT 99940794 T AT99940794 T AT 99940794T AT 99940794 T AT99940794 T AT 99940794T AT E361605 T1 ATE361605 T1 AT E361605T1
Authority
AT
Austria
Prior art keywords
signature
key
copy
message
technique
Prior art date
Application number
AT99940794T
Other languages
English (en)
Inventor
Ramarathnam R Venkatesan
Peter L Montgomery
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/102,948 external-priority patent/US6209093B1/en
Priority claimed from US09/102,851 external-priority patent/US6163841A/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Application granted granted Critical
Publication of ATE361605T1 publication Critical patent/ATE361605T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Health & Medical Sciences (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)
  • Facsimile Transmission Control (AREA)
AT99940794T 1998-06-23 1999-06-23 Eine technik zur erstellung privat authentifizierbarer kryptografischer unterschriften und zur verwendung einer solchen unterschrift in verbindung mit der kopie eines produktes ATE361605T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/102,948 US6209093B1 (en) 1998-06-23 1998-06-23 Technique for producing a privately authenticatable product copy indicia and for authenticating such an indicia
US09/102,851 US6163841A (en) 1998-06-23 1998-06-23 Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures

Publications (1)

Publication Number Publication Date
ATE361605T1 true ATE361605T1 (de) 2007-05-15

Family

ID=26799803

Family Applications (1)

Application Number Title Priority Date Filing Date
AT99940794T ATE361605T1 (de) 1998-06-23 1999-06-23 Eine technik zur erstellung privat authentifizierbarer kryptografischer unterschriften und zur verwendung einer solchen unterschrift in verbindung mit der kopie eines produktes

Country Status (7)

Country Link
EP (1) EP1088420B1 (de)
JP (1) JP4644368B2 (de)
CN (2) CN100334831C (de)
AT (1) ATE361605T1 (de)
AU (1) AU5457699A (de)
DE (1) DE69935980T2 (de)
WO (1) WO1999067920A1 (de)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011120125A1 (en) * 2010-03-31 2011-10-06 Irdeto Canada Corporation System and method for protecting cryptographic assets from a white-box attack
WO2021040701A1 (en) * 2019-08-28 2021-03-04 Hewlett-Packard Development Company, L.P. Encrypting table signatures

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5271061A (en) * 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
JP2868104B2 (ja) * 1992-07-27 1999-03-10 日本電信電話株式会社 楕円曲線に基づくデイジタル署名方法とその署名者装置及び検証者装置
US5299262A (en) * 1992-08-13 1994-03-29 The United States Of America As Represented By The United States Department Of Energy Method for exponentiating in cryptographic systems
JP3540477B2 (ja) * 1995-12-13 2004-07-07 松下電器産業株式会社 署名方式
US5638447A (en) * 1996-05-15 1997-06-10 Micali; Silvio Compact digital signatures
US5737424A (en) * 1996-06-04 1998-04-07 Software Security, Inc. Method and system for secure distribution of protected data using elliptic curve systems
US6279110B1 (en) * 1997-11-10 2001-08-21 Certicom Corporation Masked digital signatures

Also Published As

Publication number Publication date
DE69935980T2 (de) 2008-01-10
CN100334831C (zh) 2007-08-29
JP4644368B2 (ja) 2011-03-02
EP1088420A1 (de) 2001-04-04
JP2002519723A (ja) 2002-07-02
DE69935980D1 (de) 2007-06-14
WO1999067920A1 (en) 1999-12-29
AU5457699A (en) 2000-01-10
EP1088420B1 (de) 2007-05-02
CN1264305C (zh) 2006-07-12
CN1306714A (zh) 2001-08-01
CN1534922A (zh) 2004-10-06

Similar Documents

Publication Publication Date Title
US7657037B2 (en) Apparatus and method for identity-based encryption within a conventional public-key infrastructure
ATE211870T1 (de) Geheimschlüsselzertifikate
WO2007027241A3 (en) Multi-key cryptographically generated address
MX9602773A (es) Sistema criptografico y metodo con aspecto de deposito de plica de clave.
JPH07191602A (ja) 電子署名方法および装置
AU2002212345A1 (en) Method and system for web-based cross-domain single-sign-on authentication
ATE393993T1 (de) Robuste und effiziente verteilte erzeugung eines rsa-schlüssels
HUP0002700A3 (en) Auto-recoverable auto-certifiable cryptosystems
Peyravian et al. Secure remote user access over insecure networks
EP0661845A3 (de) System und Verfahren zur Nachrichtenauthentisierung in einem nicht-schmiedbaren Kryptosystem mit öffentlichen Schlüssel
ATE270800T1 (de) Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften
GB9929748D0 (en) Cryptographic key management
TW200737889A (en) Asymmetric cryptography with discretionary private key
KR100396740B1 (ko) 계산적 디피-헬만 가정에 기반하는 안전성 증명 가능한공개키 암호화 방법
ATE361605T1 (de) Eine technik zur erstellung privat authentifizierbarer kryptografischer unterschriften und zur verwendung einer solchen unterschrift in verbindung mit der kopie eines produktes
Wei A new digital signature scheme based on factoring and discrete logarithms
CN112733176A (zh) 基于全域哈希的标识密码加密方法
KR20020087896A (ko) 결정적 디피-헬만군에서id에 기반한 디지털 서명 및 그인증 방법
Murthy et al. Elliptic curve based signature method to control fake paper based certificates
TWI405450B (zh) Password authentication method
ATE301893T1 (de) Verfahren zur generierung asymmetrischer kryptoschlüssel beim anwender
Blaze et al. DSA and RSA key and signature encoding for the KeyNote trust management system
Wang et al. Transformation-free proxy cryptosystems and their applications to electronic commerce
Xue et al. A nonrepudiable multi-proxy multi-signature scheme
ATE264579T1 (de) Schlüsselverwaltungssystem

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties