AU2001255183A1 - Delayed commitment scheme to prevent attacks based on compromised certificates - Google Patents

Delayed commitment scheme to prevent attacks based on compromised certificates

Info

Publication number
AU2001255183A1
AU2001255183A1 AU2001255183A AU5518301A AU2001255183A1 AU 2001255183 A1 AU2001255183 A1 AU 2001255183A1 AU 2001255183 A AU2001255183 A AU 2001255183A AU 5518301 A AU5518301 A AU 5518301A AU 2001255183 A1 AU2001255183 A1 AU 2001255183A1
Authority
AU
Australia
Prior art keywords
commitment scheme
attacks based
prevent attacks
delayed
compromised certificates
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001255183A
Inventor
Wu Wen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of AU2001255183A1 publication Critical patent/AU2001255183A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
AU2001255183A 2000-04-14 2001-04-13 Delayed commitment scheme to prevent attacks based on compromised certificates Abandoned AU2001255183A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US19739800P 2000-04-14 2000-04-14
US60197398 2000-04-14
US58821500A 2000-06-06 2000-06-06
US09588215 2000-06-06
PCT/US2001/008654 WO2001080479A1 (en) 2000-04-14 2001-04-13 Delayed commitment scheme to prevent attacks based on compromised certificates

Publications (1)

Publication Number Publication Date
AU2001255183A1 true AU2001255183A1 (en) 2001-10-30

Family

ID=26892814

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001255183A Abandoned AU2001255183A1 (en) 2000-04-14 2001-04-13 Delayed commitment scheme to prevent attacks based on compromised certificates

Country Status (2)

Country Link
AU (1) AU2001255183A1 (en)
WO (1) WO2001080479A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7395424B2 (en) 2003-07-17 2008-07-01 International Business Machines Corporation Method and system for stepping up to certificate-based authentication without breaking an existing SSL session
DE102009051201B4 (en) 2009-10-29 2012-12-20 Siemens Aktiengesellschaft Authentication and data integrity protection of a token
GB2546340A (en) * 2016-01-18 2017-07-19 Isis Innovation Improving security protocols
CN111768304A (en) 2018-08-06 2020-10-13 阿里巴巴集团控股有限公司 Block chain transaction method and device and electronic equipment
KR102150814B1 (en) 2018-11-27 2020-09-02 알리바바 그룹 홀딩 리미티드 Systems and methods for information protection
WO2019072278A2 (en) 2018-11-27 2019-04-18 Alibaba Group Holding Limited System and method for information protection
ES2863552T3 (en) 2018-11-27 2021-10-11 Alibaba Group Holding Ltd Information protection system and method
PL3748901T3 (en) 2018-11-27 2021-12-06 Advanced New Technologies Co., Ltd. System and method for information protection
US10700850B2 (en) 2018-11-27 2020-06-30 Alibaba Group Holding Limited System and method for information protection
US11277389B2 (en) 2018-11-27 2022-03-15 Advanced New Technologies Co., Ltd. System and method for information protection

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412723A (en) * 1994-03-01 1995-05-02 International Business Machines Corporation Mechanism for keeping a key secret from mobile eavesdroppers
US5758257A (en) * 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5953424A (en) * 1997-03-18 1999-09-14 Hitachi Data Systems Corporation Cryptographic system and protocol for establishing secure authenticated remote access

Also Published As

Publication number Publication date
WO2001080479A1 (en) 2001-10-25

Similar Documents

Publication Publication Date Title
AU2002346737A1 (en) Improved internal breaker
AU2002234854A1 (en) An improved patch panel
AU2002246210A1 (en) Cryptographic authentication with ephemeral modules
AU2002220832A1 (en) Improvements to disconnect devices
AU2001247049A1 (en) Autostereoscopic display
AU2001291783A1 (en) Encryption
AU2002326634A1 (en) Digital certificate proxy
AU2001264212A1 (en) Thermostable cellulase
AU2016701A (en) Secure communications method
AU2002252769A1 (en) Advanced vision intervention algorithm
AU2001255183A1 (en) Delayed commitment scheme to prevent attacks based on compromised certificates
AU2002213902A1 (en) Flat loudspeaker
AU2003288520A1 (en) Digital certificates
AU2001237546A1 (en) Methods for characterizing polymorphisms
AU2002366496A1 (en) Polarization recycler
AU2000272656A1 (en) Otoplastic
AU2001277939A1 (en) Autostereoscopic display
AU2001277990A1 (en) Enhancing secure communications
AU4430101A (en) Loudspeakers
AU2001280292A1 (en) Formation stabilization
AU2000272657A1 (en) Otoplastic
AU2002350747A1 (en) Improved electrical convector
AU4087401A (en) Communications
AU2002214124A1 (en) Adaptive equaliser
AU2002210587A1 (en) Insulation arrangement