BR9809312A - Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade - Google Patents

Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade

Info

Publication number
BR9809312A
BR9809312A BR9809312-6A BR9809312A BR9809312A BR 9809312 A BR9809312 A BR 9809312A BR 9809312 A BR9809312 A BR 9809312A BR 9809312 A BR9809312 A BR 9809312A
Authority
BR
Brazil
Prior art keywords
proactive
systems
public key
opponent
time
Prior art date
Application number
BR9809312-6A
Other languages
English (en)
Inventor
Yair Frankel
Marcel M Yung
Original Assignee
Certco Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Certco Llc filed Critical Certco Llc
Publication of BR9809312A publication Critical patent/BR9809312A/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

"SISTEMA E MéTODO CRIPTOGRáFICO DE CHAVE PúBLICA, PRó-ATIVO, DE óTIMA ELASTICIDADE" Esquemas limiares robustos pró-ativos são apresentados para sistemas gerais de chave pública do "tipo homomórfico", bem como sistemas otimizados para a função RSA. A segurança pró-ativa emprega renovação de memória dinâmica e nos possibilita tolerar um "adversário móvel" que dinamicamente corrompe os componentes dos sistemas (talvez todos eles) já que o número de corrupções (falhas) está limitado dentro de um período de tempo. Os sistemas são de ótima elasticidade. A saber, eles suportam qualquer corrupção da minoria de servidores em qualquer período de tempo por um adversário ativo (malicioso) (i.e., qualquer subconjunto menor do que a metade). Também descritos estão sistemas gerais de chave pública com ótima elasticidade que são esquemas "limiares robustos" (contra adversário estacionário), e são estendidos a sistemas "pró-ativos" (contra o móvel). A vantagem adicional da pró-ativação em situações práticas é o fato de que, em um sistema limiar de longa duração, um adversário tem um longo tempo (e.g., anos) para irromper em quaisquer servidores t fora de 1. Ao contrário, o adversário em um sistema pró-ativo tem somente um curto período de tempo (e.g., uma semana) para irromper em quaisquer t servidores. O modelo do adversário móvel parece ser crucial para tais sistemas de "longa duração" que devem transpor a rede segura e a infra-estrutura do comércio eletrónico.
BR9809312-6A 1997-04-28 1998-04-24 Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade BR9809312A (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/842,080 US6035041A (en) 1997-04-28 1997-04-28 Optimal-resilience, proactive, public-key cryptographic system and method
PCT/US1998/008299 WO1998049804A1 (en) 1997-04-28 1998-04-24 Optimal-resilience, proactive, public-key cryptographic system and method

Publications (1)

Publication Number Publication Date
BR9809312A true BR9809312A (pt) 2000-07-04

Family

ID=25286477

Family Applications (1)

Application Number Title Priority Date Filing Date
BR9809312-6A BR9809312A (pt) 1997-04-28 1998-04-24 Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade

Country Status (7)

Country Link
US (1) US6035041A (pt)
EP (1) EP0981874A4 (pt)
JP (1) JP4312835B2 (pt)
AU (1) AU739042B2 (pt)
BR (1) BR9809312A (pt)
CA (1) CA2286732A1 (pt)
WO (1) WO1998049804A1 (pt)

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
US6363481B1 (en) * 1998-08-03 2002-03-26 Nortel Networks Limited Method and apparatus for secure data storage using distributed databases
CA2347007A1 (en) * 1998-10-30 2000-05-11 Yair Frankel Incorporating shared randomness into distributed cryptography
US6535607B1 (en) * 1998-11-02 2003-03-18 International Business Machines Corporation Method and apparatus for providing interoperability between key recovery and non-key recovery systems
US7006633B1 (en) 1999-07-16 2006-02-28 Global Encryption Standard Corporation Global encryption system
US7003677B1 (en) * 1999-11-01 2006-02-21 International Business Machines Corporation Method for operating proactively secured applications on an insecure system
US6757822B1 (en) 2000-05-31 2004-06-29 Networks Associates Technology, Inc. System, method and computer program product for secure communications using a security service provider manager
WO2002023795A1 (en) * 2000-09-11 2002-03-21 Zhang Jinglong F A method and apparatus employing one-way transforms
US8554607B2 (en) * 2001-03-13 2013-10-08 Science Applications International Corporation Method and system for securing network-based electronic voting
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US20020141586A1 (en) * 2001-03-29 2002-10-03 Aladdin Knowledge Systems Ltd. Authentication employing the bluetooth communication protocol
PT1386215E (pt) * 2001-04-27 2007-01-31 Betrusted Ireland Limtited Sistema e método para processamento de um código secreto repartido
CN1207867C (zh) * 2001-09-28 2005-06-22 中国科学院研究生院 一种安全的数字签名系统及其数字签名方法
JP4034585B2 (ja) * 2002-01-28 2008-01-16 松下電器産業株式会社 楕円曲線演算装置及び楕円曲線演算方法
CA2369304A1 (en) * 2002-01-30 2003-07-30 Cloakware Corporation A protocol to hide cryptographic private keys
CN101483523A (zh) * 2002-04-15 2009-07-15 株式会社Ntt都科摩 利用双线性映射的签名方案
US7356516B2 (en) 2002-06-13 2008-04-08 Visa U.S.A. Inc. Method and system for facilitating electronic dispute resolution
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
EP1676396A4 (en) * 2003-10-03 2010-03-10 Agency Science Tech & Res METHOD FOR CRYPTOGRAPHIC PROCESSING OF A MESSAGE, METHOD FOR CREATING A CRYPTOGRAPHIC MESSAGE, METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATION ON A MESSAGE, COMPUTER SYSTEM, CLIENT COMPUTER, SERVER COMPUTER AND COMPUTER PROGRAM ELEMENTS
US7698557B2 (en) * 2003-12-22 2010-04-13 Guardtime As System and method for generating a digital certificate
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
JP5537032B2 (ja) * 2005-12-13 2014-07-02 コーニンクレッカ フィリップス エヌ ヴェ 安全な閾値復号プロトコル計算
EP2122900A4 (en) * 2007-01-22 2014-07-23 Spyrus Inc PORTABLE DATA ENCRYPTION DEVICE WITH CONFIGURABLE SAFETY FUNCTIONS AND METHOD FOR FILING ENCRYPTION
US8068606B2 (en) * 2007-08-29 2011-11-29 Red Hat, Inc. Embedding a secret in a bit string for safeguarding the secret
US8243933B2 (en) * 2007-08-29 2012-08-14 Red Hat, Inc. Method for sharing secret information among cooperating parties
US8767964B2 (en) * 2008-03-26 2014-07-01 International Business Machines Corporation Secure communications in computer cluster systems
US8615084B2 (en) * 2008-05-29 2013-12-24 Red Hat, Inc. Extending a secret bit string to safeguard the secret
US20100054481A1 (en) * 2008-08-27 2010-03-04 Sushil Jajodia Scalable Distributed Data Structure with Recoverable Encryption
US8200616B2 (en) * 2008-12-31 2012-06-12 Nokia Corporation Method, apparatus, and computer program product for polynomial-based data transformation and utilization
US11418580B2 (en) * 2011-04-01 2022-08-16 Pure Storage, Inc. Selective generation of secure signatures in a distributed storage network
US10148285B1 (en) 2012-07-25 2018-12-04 Erich Schmitt Abstraction and de-abstraction of a digital data stream
US8745415B2 (en) * 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key
US10623386B1 (en) * 2012-09-26 2020-04-14 Pure Storage, Inc. Secret sharing data protection in a storage system
US11032259B1 (en) * 2012-09-26 2021-06-08 Pure Storage, Inc. Data protection in a storage system
US8817988B1 (en) 2012-12-31 2014-08-26 Emc Corporation Variable epoch scheduler for proactive cryptography systems
US9467451B1 (en) 2013-03-13 2016-10-11 Hrl Laboratories, Llc Generic proactively-secure secret-sharing protocol from any suitable honest-majority secret-sharing protocol
US9536114B1 (en) 2013-03-13 2017-01-03 Hrl Laboratories, Llc Secure mobile proactive multiparty computation protocol
US9450938B1 (en) * 2013-03-13 2016-09-20 Hrl Laboratories, Llc Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity
US10083310B1 (en) 2013-03-13 2018-09-25 Hrl Laboratories, Llc System and method for mobile proactive secure multi-party computation (MPMPC) using commitments
US9558359B1 (en) 2013-03-13 2017-01-31 Hrl Laboratories, Llc Information theoretically secure protocol for mobile proactive secret sharing with near-optimal resilience
US9614676B1 (en) 2013-03-13 2017-04-04 Hrl Laboratories, Llc Cryptographically-secure packed proactive secret sharing (PPSS) protocol
EP2860905A1 (en) * 2013-10-09 2015-04-15 Thomson Licensing Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product
US11128448B1 (en) 2013-11-06 2021-09-21 Pure Storage, Inc. Quorum-aware secret sharing
US10263770B2 (en) 2013-11-06 2019-04-16 Pure Storage, Inc. Data protection in a storage system using external secrets
US9516016B2 (en) 2013-11-11 2016-12-06 Pure Storage, Inc. Storage array password management
WO2015107952A1 (ja) * 2014-01-17 2015-07-23 日本電信電話株式会社 秘密計算方法、秘密計算システム、ランダム置換装置及びプログラム
US10795858B1 (en) 2014-02-18 2020-10-06 Erich Schmitt Universal abstraction and de-abstraction of a digital data stream
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
GB2540220A (en) * 2015-07-06 2017-01-11 Barclays Bank Plc Distributed encryption system and method
CN107404723B (zh) * 2016-05-20 2020-08-21 北京小米移动软件有限公司 一种接入基站的方法和装置
GB201720753D0 (en) * 2017-12-13 2018-01-24 Nchain Holdings Ltd Computer-implemented system and method
US11070374B2 (en) * 2018-02-28 2021-07-20 Vmware, Inc. Methods and systems that efficiently and securely store encryption keys
EP3902196B1 (en) * 2020-04-22 2022-12-07 SEPIOR ApS Restoration of a distributed key from a backup storage
US11991400B2 (en) 2022-07-15 2024-05-21 Bank Of America Corporation Device for executing audio cryptology in real-time for audio misappropriation prevention

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5005200A (en) * 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US4888801A (en) * 1988-05-02 1989-12-19 Motorola, Inc. Hierarchical key management system
US5224163A (en) * 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5412723A (en) * 1994-03-01 1995-05-02 International Business Machines Corporation Mechanism for keeping a key secret from mobile eavesdroppers
US5469507A (en) * 1994-03-01 1995-11-21 International Business Machines Corporation Secure communication and computation in an insecure environment
US5481613A (en) * 1994-04-15 1996-01-02 Northern Telecom Limited Computer network cryptographic key distribution system
US5588061A (en) * 1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
EP0695056B1 (en) * 1994-07-29 2005-05-11 Canon Kabushiki Kaisha A method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information processing apparatuses and a communication system that employs such a method
US5495532A (en) * 1994-08-19 1996-02-27 Nec Research Institute, Inc. Secure electronic voting using partially compatible homomorphisms
US5625692A (en) * 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
NZ500372A (en) * 1995-06-05 2001-04-27 Certco Inc Delegated use of electronic signature
US5764767A (en) * 1996-08-21 1998-06-09 Technion Research And Development Foundation Ltd. System for reconstruction of a secret shared by a plurality of participants

Also Published As

Publication number Publication date
AU739042B2 (en) 2001-10-04
WO1998049804A1 (en) 1998-11-05
JP2001524285A (ja) 2001-11-27
JP4312835B2 (ja) 2009-08-12
EP0981874A1 (en) 2000-03-01
US6035041A (en) 2000-03-07
AU7468498A (en) 1998-11-24
CA2286732A1 (en) 1998-11-05
EP0981874A4 (en) 2008-04-02

Similar Documents

Publication Publication Date Title
BR9809312A (pt) Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade
Corner et al. Zero-interaction authentication
ATE529809T1 (de) Verteilte speicherdatenverarbeitungsumgebung und implantierung dafür
ATE298435T1 (de) Hierarchische datensicherung- und wiederauffindungssystem
BR0204744A (pt) Sistema de proteção de dados que protege os dados pela encriptação dos dados
BR9806484A (pt) Método e aparelho para processamento de chamada com tolerância de falha
MX9803581A (es) Procesamiento de mensajes mejorado en dispositivos para datos bidireccionales.
Clemens Vaccines in the time of cholera
Torii et al. Elliptic curve cryptosystem
ES2183090T3 (es) Procedimientos y aparatos para enviar señales de datos electronicas.
Dhanalakshmi et al. Safety concerns of Sybil attack in WSN
FR2841013B1 (fr) Procede et systeme de gestion des evenements
FI20000456A0 (fi) Laite ja menetelmä tietoturvallisuuden parantamiseksi
Montvay Simulation of staggered fermions by polymer averaging
BRPI0409481A (pt) método, sistema, e sinal de subscrição de dispositivo segura, e, dispositivo de autoridade de subscrição para subscrição de dispositivo segura, e de subscrição para participar em uma rede requerendo subscrição
Nalajala et al. Privacy Preserving using PUP-RUP model
Baldwin Proper Initialization for the BSAFE Random Number Generator
Zhang et al. An efficient proactive secret sharing scheme for cloud storage
赵风光 et al. On the specific expression of bit-level arithmetic coding
Alsaawy et al. Protecting Privacy of User Data in Intelligent Transportation Systems
White Jr Viruses and worms: a campus under attack
Tauxe et al. Was the ancient geomagnetic field dipolar?: Sources of shallow bias in paleomagnetic inclinations
CN107392058A (zh) 一种由控制电路及存储体所组成的计算机安全卡
Summanen et al. The solar ionisation rate deduced from Ulysses measurements and its implications to interplanetary Lyman alpha-intensity
ENDO et al. ESTIMATION OF FUTURE EPIDEMIOLOGICAL TRENDS OF TUBERCULOSIS IN JAPAN AND THE EVALUATION OF TUBERCULOSIS CONTROL PROG R AMMES BY SLMULATION ANALYSIS

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 8A , 9A E 10A ANUIDADES.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO PUBLICADO NA RPI 1945 DE 15/04/2008.