CA2232936A1 - Implicit certificate scheme - Google Patents

Implicit certificate scheme Download PDF

Info

Publication number
CA2232936A1
CA2232936A1 CA 2232936 CA2232936A CA2232936A1 CA 2232936 A1 CA2232936 A1 CA 2232936A1 CA 2232936 CA2232936 CA 2232936 CA 2232936 A CA2232936 A CA 2232936A CA 2232936 A1 CA2232936 A1 CA 2232936A1
Authority
CA
Canada
Prior art keywords
entity
gamma
information
generating
implicit certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA 2232936
Other languages
French (fr)
Other versions
CA2232936C (en
Inventor
Minghua Qu
Scott A. Vanstone
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Certicom Corp
Original Assignee
Certicom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Certicom Corp filed Critical Certicom Corp
Priority to CA 2232936 priority Critical patent/CA2232936C/en
Priority to CA2235359A priority patent/CA2235359C/en
Priority to PCT/CA1999/000244 priority patent/WO1999049612A1/en
Priority to DE69918818T priority patent/DE69918818T2/en
Priority to AU28235/99A priority patent/AU758044B2/en
Priority to IL13866099A priority patent/IL138660A0/en
Priority to EP99908723A priority patent/EP1066699B1/en
Priority to JP2000538463A priority patent/JP4588874B2/en
Publication of CA2232936A1 publication Critical patent/CA2232936A1/en
Priority to US09/667,819 priority patent/US6792530B1/en
Priority to US10/921,870 priority patent/US7391868B2/en
Priority to US12/137,276 priority patent/US7653201B2/en
Application granted granted Critical
Publication of CA2232936C publication Critical patent/CA2232936C/en
Priority to US12/627,906 priority patent/US8270601B2/en
Priority to JP2010023602A priority patent/JP5247740B2/en
Priority to US13/527,060 priority patent/US8705735B2/en
Priority to US13/527,007 priority patent/US8712042B2/en
Priority to JP2013038451A priority patent/JP5702813B2/en
Priority to US14/257,781 priority patent/US20140229730A1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A method of generating a public key in a secure digital communication system, having at least one: trusted entity CA and subscriber entities A, the method comprising the steps of: for each entity A, the CA selecting a unique identity I A distinguishing the entity A; generating a public key reconstruction public data .gamma.A of entity A by mathematically combining a generator of the trusted party CA with a private value of the entity A, such that the pair (I A, .gamma.A ) serves as A's implicit certificate; combining the implicit certificate information (I A, .gamma.A ) in accordance with a mathematical function F(.gamma.A , I A) to derive an entity information f; generating a private key a of the entity A by signing the entity information f and transmitting the private key a to the entity A, whereby the entity A's public key may be reconstructed from the public information, the generator .gamma.A and the identity I A relatively efficiently.
CA 2232936 1998-03-23 1998-03-23 Implicit certificate scheme Expired - Lifetime CA2232936C (en)

Priority Applications (17)

Application Number Priority Date Filing Date Title
CA 2232936 CA2232936C (en) 1998-03-23 1998-03-23 Implicit certificate scheme
CA2235359A CA2235359C (en) 1998-03-23 1998-04-20 Implicit certificate scheme with ca chaining
PCT/CA1999/000244 WO1999049612A1 (en) 1998-03-23 1999-03-23 Implicit certificate scheme
DE69918818T DE69918818T2 (en) 1998-03-23 1999-03-23 A method for generating a public key in a secure digital communication system and implicit certificate
AU28235/99A AU758044B2 (en) 1998-03-23 1999-03-23 Implicit certificate scheme
IL13866099A IL138660A0 (en) 1998-03-23 1999-03-23 Implicit certificate scheme
EP99908723A EP1066699B1 (en) 1998-03-23 1999-03-23 Method of generating a public key in a secure digital communication system and implicit certificate
JP2000538463A JP4588874B2 (en) 1998-03-23 1999-03-23 Inherent certificate method
US09/667,819 US6792530B1 (en) 1998-03-23 2000-09-22 Implicit certificate scheme
US10/921,870 US7391868B2 (en) 1998-03-23 2004-08-20 Implicit certificate scheme
US12/137,276 US7653201B2 (en) 1998-03-23 2008-06-11 Implicit certificate scheme
US12/627,906 US8270601B2 (en) 1998-03-23 2009-11-30 Implicit certificate scheme
JP2010023602A JP5247740B2 (en) 1998-03-23 2010-02-04 Inherent certificate method
US13/527,060 US8705735B2 (en) 1998-03-23 2012-06-19 Implicit certificate scheme
US13/527,007 US8712042B2 (en) 1998-03-23 2012-06-19 Implicit certificate scheme
JP2013038451A JP5702813B2 (en) 1998-03-23 2013-02-28 Inherent certificate method
US14/257,781 US20140229730A1 (en) 1998-03-23 2014-04-21 Implicit certificate scheme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2232936 CA2232936C (en) 1998-03-23 1998-03-23 Implicit certificate scheme

Publications (2)

Publication Number Publication Date
CA2232936A1 true CA2232936A1 (en) 1999-09-23
CA2232936C CA2232936C (en) 2008-10-21

Family

ID=29409501

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2232936 Expired - Lifetime CA2232936C (en) 1998-03-23 1998-03-23 Implicit certificate scheme

Country Status (1)

Country Link
CA (1) CA2232936C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009009869A1 (en) * 2007-07-17 2009-01-22 Certicom Corp. Method and system for generating implicit certificates and applications to identity-based encryption (ibe)
EP2148465A1 (en) 2000-06-09 2010-01-27 Certicom Corp. A method for the application of implicit signature schemes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2148465A1 (en) 2000-06-09 2010-01-27 Certicom Corp. A method for the application of implicit signature schemes
EP2276196A1 (en) 2000-06-09 2011-01-19 Certicom Corp. Method for the Application of Implicit Signature Schemes
WO2009009869A1 (en) * 2007-07-17 2009-01-22 Certicom Corp. Method and system for generating implicit certificates and applications to identity-based encryption (ibe)
US9071445B2 (en) 2007-07-17 2015-06-30 Certicom Corp. Method and system for generating implicit certificates and applications to identity-based encryption (IBE)

Also Published As

Publication number Publication date
CA2232936C (en) 2008-10-21

Similar Documents

Publication Publication Date Title
CA2235359A1 (en) Implicit certificate scheme with ca chaining
DE60029391T2 (en) Public key encryption using a digital signature process
TW431108B (en) Method for establishing a key using over-the-air communication and password protocol and password protocol
EP0802654A3 (en) Enciphering method, deciphering method and certifying method
US8520847B2 (en) Split-key key-agreement protocol
DE69131789T2 (en) METHOD FOR SAFE TIME STAMPING OF DIGITAL DOCUMENTS
CN110011802A (en) A kind of two side of efficient SM9 cooperates with the method and system of generation digital signature
EP0792043A3 (en) Method of sharing cryptokey
CA2202566A1 (en) Digital signatures on a smart card
MY118736A (en) Scheme for authentication of at least one prover by a verifier
EP0743774A3 (en) Strengthened public key protocol
EP0823802A3 (en) Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion
CA2151590A1 (en) Method of Extending the Validity of a Cryptographic Certificate
CA2056886A1 (en) Method for secure communication
HUP9902892A2 (en) Method and apparatus for providing for the recovery of a cryptographic key
ATE355684T1 (en) DEVICE FOR REALIZING VIRTUAL PRIVATE NETWORKS
EP0393806A3 (en) Cryptographic method and apparatus for public key exchange with authentication
CA2241052A1 (en) Application level security system and method
CA2068488A1 (en) Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
MY130611A (en) Methods and arrangements for secure linking of entity authentication and ciphering key generation
EP0801478A3 (en) Cryptographic key recovery system
CA2317775A1 (en) Hybrid signature scheme
WO2004047352A3 (en) Identity-based encryption system
CN106059747A (en) Reusable public key certificate scheme based on public key infrastructure
GB2342022A (en) Split-key cryptographic system and method

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20180323