ATE403297T1 - Abfrage-antwort-signaturen und sichere diffie- hellman-protokolle - Google Patents
Abfrage-antwort-signaturen und sichere diffie- hellman-protokolleInfo
- Publication number
- ATE403297T1 ATE403297T1 AT06708184T AT06708184T ATE403297T1 AT E403297 T1 ATE403297 T1 AT E403297T1 AT 06708184 T AT06708184 T AT 06708184T AT 06708184 T AT06708184 T AT 06708184T AT E403297 T1 ATE403297 T1 AT E403297T1
- Authority
- AT
- Austria
- Prior art keywords
- value
- arguments
- argument
- signer
- predetermined function
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Strategic Management (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- General Business, Economics & Management (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US65179805P | 2005-02-10 | 2005-02-10 | |
| US11/348,304 US7747865B2 (en) | 2005-02-10 | 2006-02-07 | Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE403297T1 true ATE403297T1 (de) | 2008-08-15 |
Family
ID=36781288
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT06708184T ATE403297T1 (de) | 2005-02-10 | 2006-02-10 | Abfrage-antwort-signaturen und sichere diffie- hellman-protokolle |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US7747865B2 (de) |
| EP (1) | EP1847062B1 (de) |
| JP (1) | JP2009526411A (de) |
| AT (1) | ATE403297T1 (de) |
| CA (1) | CA2596500C (de) |
| DE (1) | DE602006002025D1 (de) |
| ES (1) | ES2308725T3 (de) |
| WO (1) | WO2006084896A1 (de) |
Families Citing this family (59)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9054861B2 (en) * | 2005-06-14 | 2015-06-09 | Certicom Corp. | Enhanced key agreement and transport protocol |
| DE102007001070B3 (de) * | 2006-09-29 | 2008-04-30 | Siemens Ag | Verfahren zum verschlüsselten Datenausgleich eines Systems mit mindestens einem Datenträger und einem Lesegerät |
| KR100753843B1 (ko) | 2006-09-29 | 2007-08-31 | 한국전자통신연구원 | 양 방향 채널 환경에서의 키 교환 프로토콜을 단 방향 채널환경에서의 키 교환 프로토콜로 변환하는 방법 |
| KR101356736B1 (ko) * | 2007-01-19 | 2014-02-06 | 삼성전자주식회사 | 콘텐츠의 무결성을 확인하기 위한 콘텐츠 제공 장치 및방법 및 콘텐츠 사용 장치 및 방법, 및 콘텐츠 사용 장치를폐지하는 콘텐츠 제공 장치 및 방법 |
| US8190884B2 (en) * | 2007-02-26 | 2012-05-29 | Picup, Llc | Network identity management system and method |
| CN101175076B (zh) * | 2007-10-23 | 2012-01-11 | 赵运磊 | 在线计算高效、可抵赖、不可锻造安全的密钥交换方法 |
| JP4922139B2 (ja) * | 2007-11-28 | 2012-04-25 | 日本電信電話株式会社 | 鍵共有方法、第1装置、第2装置、及び、それらのプログラム |
| US8533474B2 (en) * | 2008-02-27 | 2013-09-10 | Red Hat, Inc. | Generating session keys |
| EP2124382A1 (de) * | 2008-05-20 | 2009-11-25 | Siemens Aktiengesellschaft | Verfahren zum verschlüsselten Datenaustausch und Kommunikationssystem |
| CA2746830C (en) | 2008-12-16 | 2016-06-07 | Daniel R. L. Brown | Acceleration of key agreement protocols |
| US10068282B2 (en) * | 2009-06-24 | 2018-09-04 | Uniloc 2017 Llc | System and method for preventing multiple online purchases |
| JP5295048B2 (ja) * | 2009-09-07 | 2013-09-18 | 日本電信電話株式会社 | 情報共有システム、方法及びプログラム |
| EP2334008A1 (de) * | 2009-12-10 | 2011-06-15 | Tata Consultancy Services Limited | System und Verfahren zum Entwurf von sicheren Client-Server-Kommunikationsprotokollen auf Grundlage einer zertifikatslosen Infrastruktur mit öffentlichen Schlüsseln |
| JP5449214B2 (ja) * | 2011-01-19 | 2014-03-19 | 日本電信電話株式会社 | 情報共有方法、情報共有システム、情報共有装置、及びプログラム |
| US9439067B2 (en) | 2011-09-12 | 2016-09-06 | George Cherian | Systems and methods of performing link setup and authentication |
| US8837741B2 (en) | 2011-09-12 | 2014-09-16 | Qualcomm Incorporated | Systems and methods for encoding exchanges with a set of shared ephemeral key data |
| US9143937B2 (en) | 2011-09-12 | 2015-09-22 | Qualcomm Incorporated | Wireless communication using concurrent re-authentication and connection setup |
| EP2813029B1 (de) * | 2012-02-09 | 2020-12-02 | Irdeto B.V. | System und verfahren zum erstellen und schützen kryptografischer schlüssel |
| EP2677681A1 (de) * | 2012-06-19 | 2013-12-25 | Bundesrepublik Deutschland, vertreten durch das Bundesministerium des Innern, vertreten durch das Bundesamt für Sicherheit | Verfahren zur zumindest einseitig authentisierten, sicheren Kommunikation zwischen zwei Kommunikationspartnern |
| JP5863605B2 (ja) * | 2012-09-04 | 2016-02-16 | 日本電信電話株式会社 | 鍵交換システム、要求装置、応答装置、鍵交換方法、およびプログラム |
| EP2974129B1 (de) * | 2013-03-15 | 2020-03-11 | Assa Abloy AB | Nicht-abstreitbarkeit von elektronischen transaktionen |
| US9294503B2 (en) | 2013-08-26 | 2016-03-22 | A10 Networks, Inc. | Health monitor based distributed denial of service attack mitigation |
| CN104767613B (zh) * | 2014-01-02 | 2018-02-13 | 腾讯科技(深圳)有限公司 | 签名验证方法、装置及系统 |
| EP3860041B1 (de) * | 2014-06-18 | 2023-03-15 | Visa International Service Association | Effiziente verfahren für authentifizierte kommunikation |
| US9756071B1 (en) | 2014-09-16 | 2017-09-05 | A10 Networks, Inc. | DNS denial of service attack protection |
| US9537886B1 (en) | 2014-10-23 | 2017-01-03 | A10 Networks, Inc. | Flagging security threats in web service requests |
| US9584318B1 (en) | 2014-12-30 | 2017-02-28 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack defense |
| US9900343B1 (en) | 2015-01-05 | 2018-02-20 | A10 Networks, Inc. | Distributed denial of service cellular signaling |
| US9848013B1 (en) * | 2015-02-05 | 2017-12-19 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack detection |
| US10063591B1 (en) | 2015-02-14 | 2018-08-28 | A10 Networks, Inc. | Implementing and optimizing secure socket layer intercept |
| JP2018507646A (ja) | 2015-02-27 | 2018-03-15 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | 通信デバイスとネットワークデバイスとの間の通信におけるセキュリティ構成 |
| US20170063853A1 (en) * | 2015-07-10 | 2017-03-02 | Infineon Technologies Ag | Data cipher and decipher based on device and data authentication |
| US10469594B2 (en) | 2015-12-08 | 2019-11-05 | A10 Networks, Inc. | Implementation of secure socket layer intercept |
| US10505984B2 (en) | 2015-12-08 | 2019-12-10 | A10 Networks, Inc. | Exchange of control information between secure socket layer gateways |
| US11184168B2 (en) * | 2016-02-19 | 2021-11-23 | Nec Corporation | Method for storing data on a storage entity |
| BR112018016815A2 (pt) | 2016-02-23 | 2018-12-26 | Nchain Holdings Ltd | método para gestão e registro automático para contratos inteligentes aplicados através de blockchain |
| JP6995762B2 (ja) | 2016-02-23 | 2022-01-17 | エヌチェーン ホールディングス リミテッド | ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム |
| EP3748903A1 (de) | 2016-02-23 | 2020-12-09 | Nchain Holdings Limited | Universelles tokenisierungssystem für blockchain-basierte kryptowährungen |
| JP6925346B2 (ja) | 2016-02-23 | 2021-08-25 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンベースのトークナイゼーションを用いた交換 |
| JP6799061B2 (ja) | 2016-02-23 | 2020-12-09 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送 |
| SG10202011641RA (en) | 2016-02-23 | 2021-01-28 | Nchain Holdings Ltd | Tokenisation method and system for implementing exchanges on a blockchain |
| JP6942136B2 (ja) | 2016-02-23 | 2021-09-29 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | デジタルコンテンツの制御及び配信のためのブロックチェーンにより実施される方法 |
| CN109155035B (zh) | 2016-02-23 | 2023-07-04 | 区块链控股有限公司 | 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统 |
| JP6528008B2 (ja) | 2016-02-23 | 2019-06-12 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 秘密共有のための楕円曲線暗号化を利用したパーソナルデバイスセキュリティ |
| CN116934328A (zh) | 2016-02-23 | 2023-10-24 | 区块链控股有限公司 | 用于经由区块链控制资产有关的动作的系统及方法 |
| MX2018010056A (es) | 2016-02-23 | 2019-01-21 | Nchain Holdings Ltd | Un metodo y sistema para asegurar software de computadora usando un cuadro hash distribuido y una cadena de bloques. |
| JP6515246B2 (ja) | 2016-02-23 | 2019-05-15 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 情報及び階層的で決定性の暗号化鍵のセキュアな交換のための共通秘密の決定 |
| GB2562656A (en) | 2016-02-23 | 2018-11-21 | Nchain Holdings Ltd | Agent-based turing complete transactions integrating feedback within a blockchain system |
| WO2017145021A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to An Automated payroll method and system based on smart contracts |
| GB2558484A (en) | 2016-02-23 | 2018-07-11 | Nchain Holdings Ltd | A method and system for the secure transfer of entities on a blockchain |
| US10116634B2 (en) | 2016-06-28 | 2018-10-30 | A10 Networks, Inc. | Intercepting secure session upon receipt of untrusted certificate |
| SG10201606164TA (en) * | 2016-07-26 | 2018-02-27 | Huawei Int Pte Ltd | System and method for obtaining a common session key between devices |
| US10158666B2 (en) | 2016-07-26 | 2018-12-18 | A10 Networks, Inc. | Mitigating TCP SYN DDoS attacks using TCP reset |
| US11122033B2 (en) * | 2017-12-19 | 2021-09-14 | International Business Machines Corporation | Multi factor authentication |
| US11012435B2 (en) | 2017-12-19 | 2021-05-18 | International Business Machines Corporation | Multi factor authentication |
| CN109995509B (zh) * | 2019-05-08 | 2021-07-06 | 西安电子科技大学 | 基于消息恢复签名的认证密钥交换方法 |
| US20240340164A1 (en) * | 2021-08-03 | 2024-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Establishment of forward secrecy during digest authentication |
| CN114154200B (zh) * | 2021-12-09 | 2024-05-24 | 山东大学 | 基于可交换弱伪随机函数的隐私集合求并方法及系统 |
| US11973861B2 (en) * | 2022-02-09 | 2024-04-30 | Northrop Grumman Systems Corporation | Secure key generation |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
| US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
| US6487661B2 (en) * | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
| US5761305A (en) * | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US6226383B1 (en) * | 1996-04-17 | 2001-05-01 | Integrity Sciences, Inc. | Cryptographic methods for remote authentication |
| GB9621274D0 (en) * | 1996-10-11 | 1996-11-27 | Certicom Corp | Signature protocol for mail delivery |
| CA2369540C (en) * | 2001-12-31 | 2013-10-01 | Certicom Corp. | Method and apparatus for computing a shared secret key |
| US7073068B2 (en) * | 2002-05-24 | 2006-07-04 | Lucent Technologies Inc. | Method and apparatus for distributing shares of a password for use in multi-server password authentication |
-
2006
- 2006-02-07 US US11/348,304 patent/US7747865B2/en not_active Expired - Fee Related
- 2006-02-10 CA CA2596500A patent/CA2596500C/en active Active
- 2006-02-10 AT AT06708184T patent/ATE403297T1/de not_active IP Right Cessation
- 2006-02-10 EP EP06708184A patent/EP1847062B1/de active Active
- 2006-02-10 WO PCT/EP2006/050841 patent/WO2006084896A1/en not_active Ceased
- 2006-02-10 DE DE602006002025T patent/DE602006002025D1/de active Active
- 2006-02-10 ES ES06708184T patent/ES2308725T3/es active Active
- 2006-02-10 JP JP2007554563A patent/JP2009526411A/ja not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| EP1847062A1 (de) | 2007-10-24 |
| EP1847062B1 (de) | 2008-07-30 |
| DE602006002025D1 (de) | 2008-09-11 |
| CA2596500A1 (en) | 2006-08-17 |
| JP2009526411A (ja) | 2009-07-16 |
| WO2006084896A1 (en) | 2006-08-17 |
| CA2596500C (en) | 2014-03-25 |
| US7747865B2 (en) | 2010-06-29 |
| US20060179319A1 (en) | 2006-08-10 |
| ES2308725T3 (es) | 2008-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE403297T1 (de) | Abfrage-antwort-signaturen und sichere diffie- hellman-protokolle | |
| Au et al. | Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction | |
| JP2009526411A5 (de) | ||
| Laguillaumie et al. | Designated verifier signatures: Anonymity and efficient construction from any bilinear map | |
| Chow et al. | Two improved partially blind signature schemes from bilinear pairings | |
| Dent | Hybrid signcryption schemes with insider security | |
| Kancharla et al. | Identity based strong designated verifier signature scheme | |
| Naresh et al. | Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks | |
| Li et al. | On delegatability of four designated verifier signatures | |
| Savu | Signcryption scheme based on schnorr digital signature | |
| He et al. | On the Security of a RSA-based Certificateless Signature Scheme. | |
| Shen et al. | IBUOV, a provably secure identity-based UOV signature scheme | |
| Li et al. | An improved schnorr-based multi-signature scheme with application to blockchain | |
| Tiwari et al. | Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps. | |
| Wang et al. | Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem | |
| Zheng et al. | GDH group-based signature scheme with linkability | |
| Wu et al. | Provably secure identity-based undeniable signatures with selective and universal convertibility | |
| Chen et al. | Convertible identity-based anonymous designated ring signatures | |
| Liu et al. | Nominative signature: Application, security model and construction | |
| Zhang et al. | A novel authenticated encryption scheme and its extension | |
| Sharma et al. | Adaptively secure strong designated signature | |
| Tuan et al. | A new multi-proxy multi-signature scheme based on elliptic curve cryptography | |
| Zhang et al. | Public Key Replacement and Universal Forgery of a SCLS Scheme. | |
| CN101741564A (zh) | 组密钥初始分配中的隐私保护方法 | |
| Wei | Design of hyperelliptic curve system digital signature in identity authentication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |