ATE362249T1 - Verfahren und vorrichtungen zur erstellung fairer blindunterschriften - Google Patents

Verfahren und vorrichtungen zur erstellung fairer blindunterschriften

Info

Publication number
ATE362249T1
ATE362249T1 AT04290558T AT04290558T ATE362249T1 AT E362249 T1 ATE362249 T1 AT E362249T1 AT 04290558 T AT04290558 T AT 04290558T AT 04290558 T AT04290558 T AT 04290558T AT E362249 T1 ATE362249 T1 AT E362249T1
Authority
AT
Austria
Prior art keywords
signer
data element
signature
axu
trusted authority
Prior art date
Application number
AT04290558T
Other languages
German (de)
English (en)
Inventor
Sebastien Canard
Matthieu Gaud
Jacques Traore
Original Assignee
France Telecom
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom filed Critical France Telecom
Application granted granted Critical
Publication of ATE362249T1 publication Critical patent/ATE362249T1/de

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26BHAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
    • B26B11/00Hand knives combined with other implements, e.g. with corkscrew, with scissors, with writing implement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26BHAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
    • B26B5/00Hand knives with one or more detachable blades
    • B26B5/001Hand knives with one or more detachable blades with blades being slid out of handle immediately prior to use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3257Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26BHAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
    • B26B1/00Hand knives with adjustable blade; Pocket knives
    • B26B1/08Hand knives with adjustable blade; Pocket knives with sliding blade
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Forests & Forestry (AREA)
  • Mechanical Engineering (AREA)
  • Storage Device Security (AREA)
  • Toys (AREA)
  • Paper (AREA)
  • Basic Packing Technique (AREA)
AT04290558T 2004-03-02 2004-03-02 Verfahren und vorrichtungen zur erstellung fairer blindunterschriften ATE362249T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP04290558A EP1571778B1 (en) 2004-03-02 2004-03-02 Method and apparatuses for generating fair blind signatures

Publications (1)

Publication Number Publication Date
ATE362249T1 true ATE362249T1 (de) 2007-06-15

Family

ID=34746157

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04290558T ATE362249T1 (de) 2004-03-02 2004-03-02 Verfahren und vorrichtungen zur erstellung fairer blindunterschriften

Country Status (6)

Country Link
US (1) US7584363B2 (enExample)
EP (1) EP1571778B1 (enExample)
JP (1) JP4932168B2 (enExample)
KR (1) KR100718489B1 (enExample)
AT (1) ATE362249T1 (enExample)
DE (1) DE602004006373T2 (enExample)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4367938B2 (ja) * 2002-07-29 2009-11-18 インターナショナル・ビジネス・マシーンズ・コーポレーション 細粒度フォワード・セキュア署名の方法、コンピュータ・プログラム要素、コンピュータ・プログラムおよびネットワーク・デバイス
WO2006024042A2 (en) * 2004-08-27 2006-03-02 Ntt Docomo, Inc. Provisional signature schemes
JP2007004461A (ja) * 2005-06-23 2007-01-11 Nec Corp サービス提供システム、アウトソーシング業者装置、サービス提供方法およびプログラム
JP4218760B2 (ja) * 2005-07-01 2009-02-04 インターナショナル・ビジネス・マシーンズ・コーポレーション トレーサビリティ検証システム、方法、プログラム
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US7860244B2 (en) * 2006-12-18 2010-12-28 Sap Ag Secure computation of private values
EP2116000B1 (fr) * 2007-02-28 2017-05-17 Orange Procéée d'authentification unique d'un utilisateur auprès de fournisseurs de service
RU2452111C1 (ru) * 2010-11-17 2012-05-27 ЗАО Институт инфокоммуникационных технологий Способ пороговой генерации ключей для системы защиты информации на основе идентификационных данных
US10841080B2 (en) * 2018-03-20 2020-11-17 International Business Machines Corporation Oblivious pseudorandom function in a key management system
US10887088B2 (en) * 2018-03-20 2021-01-05 International Business Machines Corporation Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF)
US10887293B2 (en) 2018-03-20 2021-01-05 International Business Machines Corporation Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS)
US11115206B2 (en) 2018-08-23 2021-09-07 International Business Machines Corporation Assymetric structured key recovering using oblivious pseudorandom function
US10924267B2 (en) 2018-08-24 2021-02-16 International Business Machines Corporation Validating keys derived from an oblivious pseudorandom function
FR3091107A1 (fr) * 2018-12-24 2020-06-26 Orange Procédé et système de génération de clés pour un schéma de signatures anonymes
US12375478B2 (en) * 2022-07-01 2025-07-29 Thales Dis Cpl Usa, Inc. Quorum-based authorization to secure sensitive cloud assets

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4926480A (en) * 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4759063A (en) 1983-08-22 1988-07-19 Chaum David L Blind signature systems
US4914698A (en) * 1988-03-16 1990-04-03 David Chaum One-show blind signature systems
US4949380A (en) * 1988-10-20 1990-08-14 David Chaum Returned-value blind signature systems
NL9301348A (nl) * 1993-08-02 1995-03-01 Stefanus Alfonsus Brands Elektronisch betalingssysteem.
US5832089A (en) * 1995-06-07 1998-11-03 Sandia Corporation Off-line compatible electronic cash method and system
KR19990053065A (ko) * 1997-12-23 1999-07-15 정선종 이산대수 문제에 근거한 디지탈 다중서명 방법
KR100309560B1 (ko) * 1998-11-23 2001-12-17 오길록 네트워크시스템에서의내용은닉서명방법
JP2000235341A (ja) 1999-02-16 2000-08-29 Nippon Telegr & Teleph Corp <Ntt> 公開検証可能依頼復元ブラインド署名方法、その装置およびプログラム記録媒体
JP3331329B2 (ja) 1999-02-23 2002-10-07 日本電信電話株式会社 公開検証可依頼復元ブラインド署名方法、その装置及びプログラム記録媒体
KR100349418B1 (ko) * 1999-08-10 2002-08-19 학교법인 한국정보통신학원 은닉서명의 남용 방지방법
KR100377352B1 (ko) * 2000-06-01 2003-03-26 이임영 은닉성의 제어가 가능한 전자 서명 방법
KR20020003059A (ko) * 2000-07-01 2002-01-10 배민관 정수 또는 다항식 행열을 이용한 공개키 암호시스템
KR100466827B1 (ko) * 2002-06-14 2005-01-17 이임영 키 복구를 지원하는 신원 위탁 방법

Also Published As

Publication number Publication date
US7584363B2 (en) 2009-09-01
EP1571778A1 (en) 2005-09-07
US20050278536A1 (en) 2005-12-15
DE602004006373D1 (de) 2007-06-21
KR100718489B1 (ko) 2007-05-16
JP2005253083A (ja) 2005-09-15
JP4932168B2 (ja) 2012-05-16
DE602004006373T2 (de) 2008-01-17
KR20060043347A (ko) 2006-05-15
EP1571778B1 (en) 2007-05-09

Similar Documents

Publication Publication Date Title
ATE362249T1 (de) Verfahren und vorrichtungen zur erstellung fairer blindunterschriften
NO20044028L (no) Bruk av isogenier for utvikling av kryptosystemer
US7047404B1 (en) Method and apparatus for self-authenticating digital records
US5689567A (en) Electronic signature method and apparatus
Paterson et al. A comparison between traditional public key infrastructures and identity-based cryptography
WO2006066143A3 (en) Multi-certificate revocation using encrypted proof data for proving certificate&#39;s validity or invalidity
AU2003214189A1 (en) Hierarchical identity-based encryption and signature schemes
ATE455409T1 (de) Verfahren und vorrichtung zur gewährleistung der softwareintegrität
CN101969440B (zh) 软件证书生成方法
ATE374478T1 (de) System und verfahren für das erneuern von schlüsseln, welche in public-key kryptographie genutzt werden
DE60236094D1 (de) Systeme und Verfahren zur Verschlüsselung auf Identitätsbasis und damit zusammenhängende kryptografische Techniken
MX9602773A (es) Sistema criptografico y metodo con aspecto de deposito de plica de clave.
ATE270800T1 (de) Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften
WO2007030213A3 (en) Method for securely exchanging public key certificates in an electronic device
WO2008053072A1 (en) Association of a cryptographic public key with data and verification thereof
CN104135368A (zh) 一种电子海图的数据保护方法
CN101252432B (zh) 一种基于域的数字权限管理方法、域管理服务器及系统
WO2004114197A8 (en) Method and system for controlling the disclosure time of information
CN108683506B (zh) 一种数字证书申请方法、系统、雾节点和证书授权中心
CN110278081A (zh) 一种群组数字签名的控制方法和设备
DE602004012019D1 (de) Verfahren und Vorrichtung zur gesicherten Übertragung von Daten zwischen Teilnehmern
TW200737889A (en) Asymmetric cryptography with discretionary private key
JP2001209313A (ja) 証明書発行装置、情報処理装置、情報通信システム、属性証明方法、及び記憶媒体
CA2468585A1 (en) Auditable privacy policies in a distributed hierarchical identity management system
KR100412540B1 (ko) 인증서 폐지 기능을 갖는 보안 시스템

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties