AU2001255183A1 - Delayed commitment scheme to prevent attacks based on compromised certificates - Google Patents
Delayed commitment scheme to prevent attacks based on compromised certificatesInfo
- Publication number
- AU2001255183A1 AU2001255183A1 AU2001255183A AU5518301A AU2001255183A1 AU 2001255183 A1 AU2001255183 A1 AU 2001255183A1 AU 2001255183 A AU2001255183 A AU 2001255183A AU 5518301 A AU5518301 A AU 5518301A AU 2001255183 A1 AU2001255183 A1 AU 2001255183A1
- Authority
- AU
- Australia
- Prior art keywords
- commitment scheme
- attacks based
- prevent attacks
- delayed
- compromised certificates
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19739800P | 2000-04-14 | 2000-04-14 | |
US60197398 | 2000-04-14 | ||
US58821500A | 2000-06-06 | 2000-06-06 | |
US09588215 | 2000-06-06 | ||
PCT/US2001/008654 WO2001080479A1 (en) | 2000-04-14 | 2001-04-13 | Delayed commitment scheme to prevent attacks based on compromised certificates |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001255183A1 true AU2001255183A1 (en) | 2001-10-30 |
Family
ID=26892814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001255183A Abandoned AU2001255183A1 (en) | 2000-04-14 | 2001-04-13 | Delayed commitment scheme to prevent attacks based on compromised certificates |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001255183A1 (en) |
WO (1) | WO2001080479A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7395424B2 (en) | 2003-07-17 | 2008-07-01 | International Business Machines Corporation | Method and system for stepping up to certificate-based authentication without breaking an existing SSL session |
DE102009051201B4 (en) | 2009-10-29 | 2012-12-20 | Siemens Aktiengesellschaft | Authentication and data integrity protection of a token |
GB2546340A (en) * | 2016-01-18 | 2017-07-19 | Isis Innovation | Improving security protocols |
CN111768304A (en) | 2018-08-06 | 2020-10-13 | 阿里巴巴集团控股有限公司 | Block chain transaction method and device and electronic equipment |
KR102150814B1 (en) | 2018-11-27 | 2020-09-02 | 알리바바 그룹 홀딩 리미티드 | Systems and methods for information protection |
WO2019072278A2 (en) | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | System and method for information protection |
ES2863552T3 (en) | 2018-11-27 | 2021-10-11 | Alibaba Group Holding Ltd | Information protection system and method |
PL3748901T3 (en) | 2018-11-27 | 2021-12-06 | Advanced New Technologies Co., Ltd. | System and method for information protection |
US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
US11277389B2 (en) | 2018-11-27 | 2022-03-15 | Advanced New Technologies Co., Ltd. | System and method for information protection |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412723A (en) * | 1994-03-01 | 1995-05-02 | International Business Machines Corporation | Mechanism for keeping a key secret from mobile eavesdroppers |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5953424A (en) * | 1997-03-18 | 1999-09-14 | Hitachi Data Systems Corporation | Cryptographic system and protocol for establishing secure authenticated remote access |
-
2001
- 2001-04-13 AU AU2001255183A patent/AU2001255183A1/en not_active Abandoned
- 2001-04-13 WO PCT/US2001/008654 patent/WO2001080479A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2001080479A1 (en) | 2001-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2002346737A1 (en) | Improved internal breaker | |
AU2002234854A1 (en) | An improved patch panel | |
AU2002246210A1 (en) | Cryptographic authentication with ephemeral modules | |
AU2002220832A1 (en) | Improvements to disconnect devices | |
AU2001247049A1 (en) | Autostereoscopic display | |
AU2001291783A1 (en) | Encryption | |
AU2002326634A1 (en) | Digital certificate proxy | |
AU2001264212A1 (en) | Thermostable cellulase | |
AU2016701A (en) | Secure communications method | |
AU2002252769A1 (en) | Advanced vision intervention algorithm | |
AU2001255183A1 (en) | Delayed commitment scheme to prevent attacks based on compromised certificates | |
AU2002213902A1 (en) | Flat loudspeaker | |
AU2003288520A1 (en) | Digital certificates | |
AU2001237546A1 (en) | Methods for characterizing polymorphisms | |
AU2002366496A1 (en) | Polarization recycler | |
AU2000272656A1 (en) | Otoplastic | |
AU2001277939A1 (en) | Autostereoscopic display | |
AU2001277990A1 (en) | Enhancing secure communications | |
AU4430101A (en) | Loudspeakers | |
AU2001280292A1 (en) | Formation stabilization | |
AU2000272657A1 (en) | Otoplastic | |
AU2002350747A1 (en) | Improved electrical convector | |
AU4087401A (en) | Communications | |
AU2002214124A1 (en) | Adaptive equaliser | |
AU2002210587A1 (en) | Insulation arrangement |