BR112013001733A2 - dispositivo e método de autenticação, e, programa - Google Patents
dispositivo e método de autenticação, e, programaInfo
- Publication number
- BR112013001733A2 BR112013001733A2 BR112013001733A BR112013001733A BR112013001733A2 BR 112013001733 A2 BR112013001733 A2 BR 112013001733A2 BR 112013001733 A BR112013001733 A BR 112013001733A BR 112013001733 A BR112013001733 A BR 112013001733A BR 112013001733 A2 BR112013001733 A2 BR 112013001733A2
- Authority
- BR
- Brazil
- Prior art keywords
- interaction protocol
- verifier
- authentication
- program
- satisfying
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
- H04L9/3221—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2010171940 | 2010-07-30 | ||
| JP2010224752A JP5594034B2 (ja) | 2010-07-30 | 2010-10-04 | 認証装置、認証方法、及びプログラム |
| PCT/JP2011/065872 WO2012014669A1 (ja) | 2010-07-30 | 2011-07-12 | 認証装置、認証方法、及びプログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BR112013001733A2 true BR112013001733A2 (pt) | 2016-05-31 |
Family
ID=45529885
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR112013001733A BR112013001733A2 (pt) | 2010-07-30 | 2011-07-12 | dispositivo e método de autenticação, e, programa |
Country Status (13)
| Country | Link |
|---|---|
| US (2) | US9076000B2 (enExample) |
| EP (1) | EP2600563A4 (enExample) |
| JP (1) | JP5594034B2 (enExample) |
| KR (1) | KR101808363B1 (enExample) |
| CN (1) | CN103155480B (enExample) |
| AU (1) | AU2011283888B2 (enExample) |
| BR (1) | BR112013001733A2 (enExample) |
| CA (2) | CA2804394C (enExample) |
| MY (1) | MY181936A (enExample) |
| RU (1) | RU2573772C2 (enExample) |
| SG (1) | SG187039A1 (enExample) |
| TW (1) | TWI455555B (enExample) |
| WO (1) | WO2012014669A1 (enExample) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5790289B2 (ja) | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、及び記録媒体 |
| JP5790287B2 (ja) * | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、及び記録媒体 |
| TW201351195A (zh) * | 2012-03-02 | 2013-12-16 | Sony Corp | 演算裝置、控制方法、及程式 |
| US9516007B2 (en) * | 2012-12-05 | 2016-12-06 | Sony Corporation | Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier |
| US10447475B1 (en) * | 2018-11-08 | 2019-10-15 | Bar Ilan University | System and method for managing backup of cryptographic keys |
| CN110650160B (zh) * | 2019-10-29 | 2022-01-04 | 北京天威诚信电子商务服务有限公司 | 一种身份认证方法及系统 |
| JP7273742B2 (ja) * | 2020-02-07 | 2023-05-15 | 株式会社東芝 | 暗号化装置、復号装置、暗号方法、復号方法、暗号化プログラム及び復号プログラム |
| JP7768872B2 (ja) * | 2022-12-06 | 2025-11-12 | 株式会社東芝 | 暗号化装置、復号装置、鍵生成装置、暗号方法、復号方法、鍵生成方法、暗号化プログラム、復号プログラム及び鍵生成プログラム |
Family Cites Families (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5375170A (en) * | 1992-11-13 | 1994-12-20 | Yeda Research & Development Co., Ltd. | Efficient signature scheme based on birational permutations |
| FR2737370B1 (fr) | 1995-07-27 | 1997-08-22 | Bull Cp8 | Procede de communication cryptographique |
| US5710814A (en) * | 1996-07-23 | 1998-01-20 | Cheyenne Property Trust | Cryptographic unit touch point logic |
| JPH1165439A (ja) * | 1996-08-09 | 1999-03-05 | Nippon Telegr & Teleph Corp <Ntt> | N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体 |
| US6307936B1 (en) * | 1997-09-16 | 2001-10-23 | Safenet, Inc. | Cryptographic key management scheme |
| US6076163A (en) * | 1997-10-20 | 2000-06-13 | Rsa Security Inc. | Secure user identification based on constrained polynomials |
| US6411715B1 (en) * | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
| US6959085B1 (en) * | 1999-05-03 | 2005-10-25 | Ntru Cryptosystems, Inc. | Secure user identification based on ring homomorphisms |
| US7243236B1 (en) * | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
| AU766102B2 (en) * | 1999-10-01 | 2003-10-09 | France Telecom | Method, system, device for proving authenticity of an entity or integrity of a message |
| US20020136401A1 (en) * | 2000-07-25 | 2002-09-26 | Jeffrey Hoffstein | Digital signature and authentication method and apparatus |
| US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US7114178B2 (en) * | 2001-05-22 | 2006-09-26 | Ericsson Inc. | Security system |
| CA2469198C (en) * | 2001-12-07 | 2013-02-12 | Ntru Cryptosystems, Inc. | Digital signature and authentication method and apparatus |
| ATE314763T1 (de) * | 2002-03-13 | 2006-01-15 | Koninkl Philips Electronics Nv | Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system |
| US8046832B2 (en) * | 2002-06-26 | 2011-10-25 | Microsoft Corporation | Spam detector with challenges |
| JP4457651B2 (ja) * | 2003-11-27 | 2010-04-28 | 日本電気株式会社 | 証明装置及び証明方法並びにプログラム |
| FR2865590A1 (fr) | 2004-01-23 | 2005-07-29 | France Telecom | Procede pour etablir, a partir d'un jeu de grands nombres premiers, un jeu de cles destine a prouver l'authenticite d'une entite ou l'integrite d'un message |
| JP4282546B2 (ja) * | 2004-05-19 | 2009-06-24 | 株式会社東芝 | 暗号装置、復号装置、鍵生成装置、プログラム及び方法 |
| US20060083370A1 (en) * | 2004-07-02 | 2006-04-20 | Jing-Jang Hwang | RSA with personalized secret |
| US8645694B2 (en) | 2004-09-30 | 2014-02-04 | Koninklijke Philips N.V. | Method of authentication based on polyomials |
| US20060245587A1 (en) * | 2005-04-28 | 2006-11-02 | Binyamin Pinkas | System and method for private information matching |
| US7958362B2 (en) * | 2005-10-11 | 2011-06-07 | Chang Gung University | User authentication based on asymmetric cryptography utilizing RSA with personalized secret |
| US20080013721A1 (en) * | 2005-11-30 | 2008-01-17 | Jing-Jang Hwang | Asymmetric cryptography with discretionary private key |
| JP5035810B2 (ja) | 2006-06-30 | 2012-09-26 | インターナショナル・ビジネス・マシーンズ・コーポレーション | モバイル・デバイスにおけるメッセージ処理 |
| JP4197710B2 (ja) * | 2006-07-19 | 2008-12-17 | 株式会社東芝 | 暗号装置、復号装置、プログラム及び方法 |
| US8006300B2 (en) * | 2006-10-24 | 2011-08-23 | Authernative, Inc. | Two-channel challenge-response authentication method in random partial shared secret recognition system |
| US8411854B2 (en) * | 2008-01-02 | 2013-04-02 | National University Of Ireland, Galway | Method and apparatus for authenticating a user |
| US8713655B2 (en) * | 2008-04-21 | 2014-04-29 | Indian Institute Of Technology | Method and system for using personal devices for authentication and service access at service outlets |
| JP2010049215A (ja) * | 2008-08-25 | 2010-03-04 | Toshiba Corp | パラメータ生成装置、暗号処理システム、方法およびプログラム |
| JP4756067B2 (ja) | 2008-11-27 | 2011-08-24 | 株式会社サンセイアールアンドディ | 遊技機 |
-
2010
- 2010-10-04 JP JP2010224752A patent/JP5594034B2/ja not_active Expired - Fee Related
-
2011
- 2011-07-12 SG SG2013002357A patent/SG187039A1/en unknown
- 2011-07-12 KR KR1020137001413A patent/KR101808363B1/ko not_active Expired - Fee Related
- 2011-07-12 BR BR112013001733A patent/BR112013001733A2/pt not_active Application Discontinuation
- 2011-07-12 CA CA2804394A patent/CA2804394C/en not_active Expired - Fee Related
- 2011-07-12 US US13/704,658 patent/US9076000B2/en active Active
- 2011-07-12 RU RU2013103035/08A patent/RU2573772C2/ru not_active IP Right Cessation
- 2011-07-12 MY MYPI2013700148A patent/MY181936A/en unknown
- 2011-07-12 AU AU2011283888A patent/AU2011283888B2/en not_active Ceased
- 2011-07-12 WO PCT/JP2011/065872 patent/WO2012014669A1/ja not_active Ceased
- 2011-07-12 EP EP11812261.3A patent/EP2600563A4/en not_active Ceased
- 2011-07-12 CA CA3000137A patent/CA3000137A1/en not_active Abandoned
- 2011-07-12 CN CN201180035779.5A patent/CN103155480B/zh not_active Expired - Fee Related
- 2011-07-14 TW TW100124969A patent/TWI455555B/zh not_active IP Right Cessation
-
2015
- 2015-05-22 US US14/719,495 patent/US9602285B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| TWI455555B (zh) | 2014-10-01 |
| US9076000B2 (en) | 2015-07-07 |
| SG187039A1 (en) | 2013-02-28 |
| CA2804394C (en) | 2018-05-22 |
| RU2013103035A (ru) | 2014-07-27 |
| AU2011283888B2 (en) | 2015-10-29 |
| KR101808363B1 (ko) | 2017-12-12 |
| US20150256342A1 (en) | 2015-09-10 |
| AU2011283888A1 (en) | 2012-12-13 |
| EP2600563A4 (en) | 2016-10-19 |
| TW201215069A (en) | 2012-04-01 |
| JP2012050053A (ja) | 2012-03-08 |
| US9602285B2 (en) | 2017-03-21 |
| CN103155480B (zh) | 2015-11-25 |
| MY181936A (en) | 2021-01-14 |
| JP5594034B2 (ja) | 2014-09-24 |
| KR20130100959A (ko) | 2013-09-12 |
| WO2012014669A1 (ja) | 2012-02-02 |
| EP2600563A1 (en) | 2013-06-05 |
| CN103155480A (zh) | 2013-06-12 |
| RU2573772C2 (ru) | 2016-01-27 |
| CA2804394A1 (en) | 2012-02-02 |
| CA3000137A1 (en) | 2012-02-02 |
| US20130089201A1 (en) | 2013-04-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BR112013001733A2 (pt) | dispositivo e método de autenticação, e, programa | |
| BR112019023412A2 (pt) | Primeiro nó de rede eletrônica configurado para um protocolo de negociação de chaves, dispositivo de seleção de parâmetros, método de seleção de parâmetros para uso em um nó de rede, método de troca de chaves eletrônicas para um primeiro nó de rede eletrônico e mídia legível por computador | |
| BR112017011967A2 (pt) | dispositivo de geração de chave, dispositivo de criptografia de chave pública, dispositivo de descriptografia de chave privada, método de geração de chave configurado para gerar uma chave pública, método de criptografia de chave pública, método de descriptografia de chave privada, e, programa de computador | |
| WO2012099657A3 (en) | Reliable puf value generation by pattern matching | |
| EA201591160A1 (ru) | Способ и устройство для маркирования промышленных изделий с помощью физического свойства | |
| BR112016021120A2 (pt) | Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura | |
| BR112015007854A2 (pt) | sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual | |
| BR112015030544A2 (pt) | sistemas de autenticação eletrônica | |
| GB2492618B (en) | Trusted computing source code escrow and optimization | |
| MX375166B (es) | Criptografia nado utilizando funciones unidireccionales. | |
| BR112012004791A2 (pt) | dispositivo de acesso multifuncional personalizado com forma individualizada de autenticar e controlar a troca de dados. | |
| EP2562957A3 (en) | Key sharing device, key sharing method, and computer program product | |
| BR112014028752A2 (pt) | método de configuração de um dispositivo de rede para o compartilhamento de chave, método para um primeiro dispositivo de rede para a determinação de uma chave compartilhada, sistema de configuração de um dispositivo de rede para o compartilhamento de chave, primeiro dispositivo de rede configurado para a determinação de uma chave compartilhada, sendo a chave uma chave criptográfica e programa de computador | |
| NZ720190A (en) | System and methods for encrypting data | |
| AR077291A1 (es) | Sistemas, procedimientos y aparatos para la deteccion y recuperacion de errores de cifrado | |
| BR112013019245A2 (pt) | método e aparelho para bloquear e desbloquear múltiplos ambientes de sistema operacional com uma única entrada de gesto | |
| BR112013001728A2 (pt) | métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador. | |
| AR096832A1 (es) | Verificación remota de atributos en una red de comunicaciones | |
| BR112014028757A2 (pt) | método de operação de uma primeira unidade de comunicação, método de operação para um sistema de comunicação, unidade de comunicação, sistema de comunicação e programa de computador | |
| MX342209B (es) | Metodos y aparatos para reducir los requisitos de memoria para aplicaciones de software de sistemas de control de procesos. | |
| NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
| BR112018007164A2 (pt) | dispositivo e método para geração de senha em um dispositivo de usuário | |
| WO2013130561A3 (en) | Method of operating a computing device, computing device and computer program | |
| BR112013021704A2 (pt) | gerenciamento e personalização segura de chaves de assinatura de código únicas | |
| BR112015014469A2 (pt) | método de configuração de um dispositivo de rede para compartilhamento de chave, método para um primeiro dispositivo de rede para determinar uma chave compartilhada, dispositivo de rede configurado para determinar uma chave compartilhada, sistema para configurar um dispositivo de rede para compartilhamento de chave e programa de computador |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B15K | Others concerning applications: alteration of classification |
Ipc: H04L 9/32 (2006.01), H04L 9/08 (2006.01), H04L 9/3 |
|
| B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
| B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
| B11B | Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements |