BR9809312A - Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade - Google Patents
Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidadeInfo
- Publication number
- BR9809312A BR9809312A BR9809312-6A BR9809312A BR9809312A BR 9809312 A BR9809312 A BR 9809312A BR 9809312 A BR9809312 A BR 9809312A BR 9809312 A BR9809312 A BR 9809312A
- Authority
- BR
- Brazil
- Prior art keywords
- proactive
- systems
- public key
- opponent
- time
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
"SISTEMA E MéTODO CRIPTOGRáFICO DE CHAVE PúBLICA, PRó-ATIVO, DE óTIMA ELASTICIDADE" Esquemas limiares robustos pró-ativos são apresentados para sistemas gerais de chave pública do "tipo homomórfico", bem como sistemas otimizados para a função RSA. A segurança pró-ativa emprega renovação de memória dinâmica e nos possibilita tolerar um "adversário móvel" que dinamicamente corrompe os componentes dos sistemas (talvez todos eles) já que o número de corrupções (falhas) está limitado dentro de um período de tempo. Os sistemas são de ótima elasticidade. A saber, eles suportam qualquer corrupção da minoria de servidores em qualquer período de tempo por um adversário ativo (malicioso) (i.e., qualquer subconjunto menor do que a metade). Também descritos estão sistemas gerais de chave pública com ótima elasticidade que são esquemas "limiares robustos" (contra adversário estacionário), e são estendidos a sistemas "pró-ativos" (contra o móvel). A vantagem adicional da pró-ativação em situações práticas é o fato de que, em um sistema limiar de longa duração, um adversário tem um longo tempo (e.g., anos) para irromper em quaisquer servidores t fora de 1. Ao contrário, o adversário em um sistema pró-ativo tem somente um curto período de tempo (e.g., uma semana) para irromper em quaisquer t servidores. O modelo do adversário móvel parece ser crucial para tais sistemas de "longa duração" que devem transpor a rede segura e a infra-estrutura do comércio eletrónico.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/842,080 US6035041A (en) | 1997-04-28 | 1997-04-28 | Optimal-resilience, proactive, public-key cryptographic system and method |
PCT/US1998/008299 WO1998049804A1 (en) | 1997-04-28 | 1998-04-24 | Optimal-resilience, proactive, public-key cryptographic system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
BR9809312A true BR9809312A (pt) | 2000-07-04 |
Family
ID=25286477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR9809312-6A BR9809312A (pt) | 1997-04-28 | 1998-04-24 | Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade |
Country Status (7)
Country | Link |
---|---|
US (1) | US6035041A (pt) |
EP (1) | EP0981874A4 (pt) |
JP (1) | JP4312835B2 (pt) |
AU (1) | AU739042B2 (pt) |
BR (1) | BR9809312A (pt) |
CA (1) | CA2286732A1 (pt) |
WO (1) | WO1998049804A1 (pt) |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US6363481B1 (en) * | 1998-08-03 | 2002-03-26 | Nortel Networks Limited | Method and apparatus for secure data storage using distributed databases |
CA2347007A1 (en) * | 1998-10-30 | 2000-05-11 | Yair Frankel | Incorporating shared randomness into distributed cryptography |
US6535607B1 (en) * | 1998-11-02 | 2003-03-18 | International Business Machines Corporation | Method and apparatus for providing interoperability between key recovery and non-key recovery systems |
US7006633B1 (en) | 1999-07-16 | 2006-02-28 | Global Encryption Standard Corporation | Global encryption system |
US7003677B1 (en) * | 1999-11-01 | 2006-02-21 | International Business Machines Corporation | Method for operating proactively secured applications on an insecure system |
US6757822B1 (en) | 2000-05-31 | 2004-06-29 | Networks Associates Technology, Inc. | System, method and computer program product for secure communications using a security service provider manager |
WO2002023795A1 (en) * | 2000-09-11 | 2002-03-21 | Zhang Jinglong F | A method and apparatus employing one-way transforms |
US8554607B2 (en) * | 2001-03-13 | 2013-10-08 | Science Applications International Corporation | Method and system for securing network-based electronic voting |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US20020141586A1 (en) * | 2001-03-29 | 2002-10-03 | Aladdin Knowledge Systems Ltd. | Authentication employing the bluetooth communication protocol |
PT1386215E (pt) * | 2001-04-27 | 2007-01-31 | Betrusted Ireland Limtited | Sistema e método para processamento de um código secreto repartido |
CN1207867C (zh) * | 2001-09-28 | 2005-06-22 | 中国科学院研究生院 | 一种安全的数字签名系统及其数字签名方法 |
JP4034585B2 (ja) * | 2002-01-28 | 2008-01-16 | 松下電器産業株式会社 | 楕円曲線演算装置及び楕円曲線演算方法 |
CA2369304A1 (en) * | 2002-01-30 | 2003-07-30 | Cloakware Corporation | A protocol to hide cryptographic private keys |
CN101483523A (zh) * | 2002-04-15 | 2009-07-15 | 株式会社Ntt都科摩 | 利用双线性映射的签名方案 |
US7356516B2 (en) | 2002-06-13 | 2008-04-08 | Visa U.S.A. Inc. | Method and system for facilitating electronic dispute resolution |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
EP1676396A4 (en) * | 2003-10-03 | 2010-03-10 | Agency Science Tech & Res | METHOD FOR CRYPTOGRAPHIC PROCESSING OF A MESSAGE, METHOD FOR CREATING A CRYPTOGRAPHIC MESSAGE, METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATION ON A MESSAGE, COMPUTER SYSTEM, CLIENT COMPUTER, SERVER COMPUTER AND COMPUTER PROGRAM ELEMENTS |
US7698557B2 (en) * | 2003-12-22 | 2010-04-13 | Guardtime As | System and method for generating a digital certificate |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
JP5537032B2 (ja) * | 2005-12-13 | 2014-07-02 | コーニンクレッカ フィリップス エヌ ヴェ | 安全な閾値復号プロトコル計算 |
EP2122900A4 (en) * | 2007-01-22 | 2014-07-23 | Spyrus Inc | PORTABLE DATA ENCRYPTION DEVICE WITH CONFIGURABLE SAFETY FUNCTIONS AND METHOD FOR FILING ENCRYPTION |
US8068606B2 (en) * | 2007-08-29 | 2011-11-29 | Red Hat, Inc. | Embedding a secret in a bit string for safeguarding the secret |
US8243933B2 (en) * | 2007-08-29 | 2012-08-14 | Red Hat, Inc. | Method for sharing secret information among cooperating parties |
US8767964B2 (en) * | 2008-03-26 | 2014-07-01 | International Business Machines Corporation | Secure communications in computer cluster systems |
US8615084B2 (en) * | 2008-05-29 | 2013-12-24 | Red Hat, Inc. | Extending a secret bit string to safeguard the secret |
US20100054481A1 (en) * | 2008-08-27 | 2010-03-04 | Sushil Jajodia | Scalable Distributed Data Structure with Recoverable Encryption |
US8200616B2 (en) * | 2008-12-31 | 2012-06-12 | Nokia Corporation | Method, apparatus, and computer program product for polynomial-based data transformation and utilization |
US11418580B2 (en) * | 2011-04-01 | 2022-08-16 | Pure Storage, Inc. | Selective generation of secure signatures in a distributed storage network |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
US8745415B2 (en) * | 2012-09-26 | 2014-06-03 | Pure Storage, Inc. | Multi-drive cooperation to generate an encryption key |
US10623386B1 (en) * | 2012-09-26 | 2020-04-14 | Pure Storage, Inc. | Secret sharing data protection in a storage system |
US11032259B1 (en) * | 2012-09-26 | 2021-06-08 | Pure Storage, Inc. | Data protection in a storage system |
US8817988B1 (en) | 2012-12-31 | 2014-08-26 | Emc Corporation | Variable epoch scheduler for proactive cryptography systems |
US9467451B1 (en) | 2013-03-13 | 2016-10-11 | Hrl Laboratories, Llc | Generic proactively-secure secret-sharing protocol from any suitable honest-majority secret-sharing protocol |
US9536114B1 (en) | 2013-03-13 | 2017-01-03 | Hrl Laboratories, Llc | Secure mobile proactive multiparty computation protocol |
US9450938B1 (en) * | 2013-03-13 | 2016-09-20 | Hrl Laboratories, Llc | Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity |
US10083310B1 (en) | 2013-03-13 | 2018-09-25 | Hrl Laboratories, Llc | System and method for mobile proactive secure multi-party computation (MPMPC) using commitments |
US9558359B1 (en) | 2013-03-13 | 2017-01-31 | Hrl Laboratories, Llc | Information theoretically secure protocol for mobile proactive secret sharing with near-optimal resilience |
US9614676B1 (en) | 2013-03-13 | 2017-04-04 | Hrl Laboratories, Llc | Cryptographically-secure packed proactive secret sharing (PPSS) protocol |
EP2860905A1 (en) * | 2013-10-09 | 2015-04-15 | Thomson Licensing | Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product |
US11128448B1 (en) | 2013-11-06 | 2021-09-21 | Pure Storage, Inc. | Quorum-aware secret sharing |
US10263770B2 (en) | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
US9516016B2 (en) | 2013-11-11 | 2016-12-06 | Pure Storage, Inc. | Storage array password management |
WO2015107952A1 (ja) * | 2014-01-17 | 2015-07-23 | 日本電信電話株式会社 | 秘密計算方法、秘密計算システム、ランダム置換装置及びプログラム |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
GB2540220A (en) * | 2015-07-06 | 2017-01-11 | Barclays Bank Plc | Distributed encryption system and method |
CN107404723B (zh) * | 2016-05-20 | 2020-08-21 | 北京小米移动软件有限公司 | 一种接入基站的方法和装置 |
GB201720753D0 (en) * | 2017-12-13 | 2018-01-24 | Nchain Holdings Ltd | Computer-implemented system and method |
US11070374B2 (en) * | 2018-02-28 | 2021-07-20 | Vmware, Inc. | Methods and systems that efficiently and securely store encryption keys |
EP3902196B1 (en) * | 2020-04-22 | 2022-12-07 | SEPIOR ApS | Restoration of a distributed key from a backup storage |
US11991400B2 (en) | 2022-07-15 | 2024-05-21 | Bank Of America Corporation | Device for executing audio cryptology in real-time for audio misappropriation prevention |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5005200A (en) * | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4888801A (en) * | 1988-05-02 | 1989-12-19 | Motorola, Inc. | Hierarchical key management system |
US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5412723A (en) * | 1994-03-01 | 1995-05-02 | International Business Machines Corporation | Mechanism for keeping a key secret from mobile eavesdroppers |
US5469507A (en) * | 1994-03-01 | 1995-11-21 | International Business Machines Corporation | Secure communication and computation in an insecure environment |
US5481613A (en) * | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system |
US5588061A (en) * | 1994-07-20 | 1996-12-24 | Bell Atlantic Network Services, Inc. | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
EP0695056B1 (en) * | 1994-07-29 | 2005-05-11 | Canon Kabushiki Kaisha | A method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information processing apparatuses and a communication system that employs such a method |
US5495532A (en) * | 1994-08-19 | 1996-02-27 | Nec Research Institute, Inc. | Secure electronic voting using partially compatible homomorphisms |
US5625692A (en) * | 1995-01-23 | 1997-04-29 | International Business Machines Corporation | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing |
NZ500372A (en) * | 1995-06-05 | 2001-04-27 | Certco Inc | Delegated use of electronic signature |
US5764767A (en) * | 1996-08-21 | 1998-06-09 | Technion Research And Development Foundation Ltd. | System for reconstruction of a secret shared by a plurality of participants |
-
1997
- 1997-04-28 US US08/842,080 patent/US6035041A/en not_active Expired - Lifetime
-
1998
- 1998-04-24 AU AU74684/98A patent/AU739042B2/en not_active Ceased
- 1998-04-24 WO PCT/US1998/008299 patent/WO1998049804A1/en active IP Right Grant
- 1998-04-24 JP JP54718298A patent/JP4312835B2/ja not_active Expired - Fee Related
- 1998-04-24 CA CA002286732A patent/CA2286732A1/en not_active Abandoned
- 1998-04-24 BR BR9809312-6A patent/BR9809312A/pt not_active IP Right Cessation
- 1998-04-24 EP EP98922052A patent/EP0981874A4/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
AU739042B2 (en) | 2001-10-04 |
WO1998049804A1 (en) | 1998-11-05 |
JP2001524285A (ja) | 2001-11-27 |
JP4312835B2 (ja) | 2009-08-12 |
EP0981874A1 (en) | 2000-03-01 |
US6035041A (en) | 2000-03-07 |
AU7468498A (en) | 1998-11-24 |
CA2286732A1 (en) | 1998-11-05 |
EP0981874A4 (en) | 2008-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR9809312A (pt) | Sistema e método criptográfico de chave pública, pró-ativo, de ótima elasticidade | |
Corner et al. | Zero-interaction authentication | |
ATE529809T1 (de) | Verteilte speicherdatenverarbeitungsumgebung und implantierung dafür | |
ATE298435T1 (de) | Hierarchische datensicherung- und wiederauffindungssystem | |
BR0204744A (pt) | Sistema de proteção de dados que protege os dados pela encriptação dos dados | |
BR9806484A (pt) | Método e aparelho para processamento de chamada com tolerância de falha | |
MX9803581A (es) | Procesamiento de mensajes mejorado en dispositivos para datos bidireccionales. | |
Clemens | Vaccines in the time of cholera | |
Torii et al. | Elliptic curve cryptosystem | |
ES2183090T3 (es) | Procedimientos y aparatos para enviar señales de datos electronicas. | |
Dhanalakshmi et al. | Safety concerns of Sybil attack in WSN | |
FR2841013B1 (fr) | Procede et systeme de gestion des evenements | |
FI20000456A0 (fi) | Laite ja menetelmä tietoturvallisuuden parantamiseksi | |
Montvay | Simulation of staggered fermions by polymer averaging | |
BRPI0409481A (pt) | método, sistema, e sinal de subscrição de dispositivo segura, e, dispositivo de autoridade de subscrição para subscrição de dispositivo segura, e de subscrição para participar em uma rede requerendo subscrição | |
Nalajala et al. | Privacy Preserving using PUP-RUP model | |
Baldwin | Proper Initialization for the BSAFE Random Number Generator | |
Zhang et al. | An efficient proactive secret sharing scheme for cloud storage | |
赵风光 et al. | On the specific expression of bit-level arithmetic coding | |
Alsaawy et al. | Protecting Privacy of User Data in Intelligent Transportation Systems | |
White Jr | Viruses and worms: a campus under attack | |
Tauxe et al. | Was the ancient geomagnetic field dipolar?: Sources of shallow bias in paleomagnetic inclinations | |
CN107392058A (zh) | 一种由控制电路及存储体所组成的计算机安全卡 | |
Summanen et al. | The solar ionisation rate deduced from Ulysses measurements and its implications to interplanetary Lyman alpha-intensity | |
ENDO et al. | ESTIMATION OF FUTURE EPIDEMIOLOGICAL TRENDS OF TUBERCULOSIS IN JAPAN AND THE EVALUATION OF TUBERCULOSIS CONTROL PROG R AMMES BY SLMULATION ANALYSIS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 8A , 9A E 10A ANUIDADES. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO PUBLICADO NA RPI 1945 DE 15/04/2008. |