CA2692817A1 - Procede de compression de valeur cryptographique - Google Patents
Procede de compression de valeur cryptographique Download PDFInfo
- Publication number
- CA2692817A1 CA2692817A1 CA 2692817 CA2692817A CA2692817A1 CA 2692817 A1 CA2692817 A1 CA 2692817A1 CA 2692817 CA2692817 CA 2692817 CA 2692817 A CA2692817 A CA 2692817A CA 2692817 A1 CA2692817 A1 CA 2692817A1
- Authority
- CA
- Canada
- Prior art keywords
- public key
- criteria
- cryptographic value
- key
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000007906 compression Methods 0.000 claims description 21
- 230000006835 compression Effects 0.000 claims description 20
- 230000005540 biological transmission Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US95023507P | 2007-07-17 | 2007-07-17 | |
US60/950,235 | 2007-07-17 | ||
PCT/CA2008/001254 WO2009009868A1 (fr) | 2007-07-17 | 2008-07-09 | Procede de compression de valeur cryptographique |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2692817A1 true CA2692817A1 (fr) | 2009-01-22 |
Family
ID=40259240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2692817 Abandoned CA2692817A1 (fr) | 2007-07-17 | 2008-07-09 | Procede de compression de valeur cryptographique |
Country Status (4)
Country | Link |
---|---|
US (2) | US8073139B2 (fr) |
EP (1) | EP2168299A4 (fr) |
CA (1) | CA2692817A1 (fr) |
WO (1) | WO2009009868A1 (fr) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571740A (zh) * | 2010-09-09 | 2012-07-11 | 西尔瑞特有限公司 | 相对记账报告有条件地模糊秘密实体 |
US8675869B2 (en) | 2011-03-23 | 2014-03-18 | Blackberry Limited | Incorporating data into an ECDSA signature component |
US9003181B2 (en) | 2011-03-23 | 2015-04-07 | Certicom Corp. | Incorporating data into cryptographic components of an ECQV certificate |
FR2979043B1 (fr) * | 2011-08-12 | 2016-02-12 | Gratzer And Partners | Dispositif et procede de compression de cles publiques pour algorithme de chiffrement pleinement homomorphique |
CN103546567B (zh) * | 2013-10-28 | 2016-12-07 | 中国航天科工集团第二研究院七〇六所 | 一种可信云计算环境中无证书跨域认证方法 |
CN105187425B (zh) * | 2015-09-02 | 2018-01-30 | 南京理工大学紫金学院 | 面向云计算通信系统安全的无证书门限解密方法 |
AU2017223129A1 (en) | 2016-02-23 | 2018-07-12 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
AU2017222468B2 (en) | 2016-02-23 | 2023-01-12 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
EP4235552A3 (fr) | 2016-02-23 | 2023-09-13 | nChain Licensing AG | Procédés et systèmes de transfert efficace d'entités sur un registre distribué poste à poste au moyen d'une chaîne de blocs |
CN108780548B (zh) * | 2016-02-23 | 2022-08-05 | 区块链控股有限公司 | 将椭圆曲线加密用于个人装置安全以共享秘密 |
MX2018010056A (es) | 2016-02-23 | 2019-01-21 | Nchain Holdings Ltd | Un metodo y sistema para asegurar software de computadora usando un cuadro hash distribuido y una cadena de bloques. |
SG10202011640TA (en) | 2016-02-23 | 2021-01-28 | Nchain Holdings Ltd | System and method for controlling asset-related actions via a blockchain |
EP3420669B1 (fr) | 2016-02-23 | 2021-03-24 | Nchain Holdings Limited | Procédé et système cryptographiques pour l'extraction sécurisée de données à partir d'une chaîne de blocs |
US11410145B2 (en) | 2016-02-23 | 2022-08-09 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
US11120437B2 (en) | 2016-02-23 | 2021-09-14 | nChain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
KR20180116278A (ko) | 2016-02-23 | 2018-10-24 | 엔체인 홀딩스 리미티드 | 안전한 정보 교환과 계층 구조적이고 결정론적인 암호키를 위한 공통 비밀 결정 |
EP4167165A1 (fr) | 2016-02-23 | 2023-04-19 | nChain Licensing AG | Échange basé sur une chaîne de blocs avec segmentation en unités |
US9800411B1 (en) | 2016-05-05 | 2017-10-24 | ISARA Corporation | Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme |
EP3301852A1 (fr) * | 2016-09-29 | 2018-04-04 | Alcatel Lucent | Procédé de génération et d'utilisation d'une identité de noeud persistante unique, noeud initiateur et noeud répondeur correspondants |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5497423A (en) * | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
WO1996004602A1 (fr) * | 1994-07-29 | 1996-02-15 | Certicom Corp. | Systemes de chiffrement a courbe elliptique |
US6252960B1 (en) * | 1998-08-04 | 2001-06-26 | Hewlett-Packard Company | Compression and decompression of elliptic curve data points |
CA2257008C (fr) * | 1998-12-24 | 2007-12-11 | Certicom Corp. | Methode permettant l'acceleration des operations cryptographiques sur des courbes elliptiques |
US7092523B2 (en) * | 1999-01-11 | 2006-08-15 | Certicom Corp. | Method and apparatus for minimizing differential power attacks on processors |
US7599491B2 (en) * | 1999-01-11 | 2009-10-06 | Certicom Corp. | Method for strengthening the implementation of ECDSA against power analysis |
US6490352B1 (en) * | 1999-03-05 | 2002-12-03 | Richard Schroeppel | Cryptographic elliptic curve apparatus and method |
CN100423041C (zh) * | 2000-01-21 | 2008-10-01 | 索尼公司 | 数据处理设备和数据处理方法 |
US7111175B2 (en) * | 2000-12-28 | 2006-09-19 | Intel Corporation | Method and apparatus for verifying the integrity of a media key block |
US20030037237A1 (en) * | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US7006673B2 (en) * | 2001-07-25 | 2006-02-28 | Activcard Ireland Limited | Method of hash string extraction |
CA2427870C (fr) * | 2002-05-03 | 2014-07-08 | Certicom Corp. | Methode et dispositif permettant d'effectuer l'arithmetique des courbes elliptiques |
JP4488354B2 (ja) * | 2002-09-16 | 2010-06-23 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 電子機器へのデータのローディング方法 |
US7043015B2 (en) | 2002-10-31 | 2006-05-09 | Microsoft Corporation | Methods for point compression for Jacobians of hyperelliptic curves |
EP1475920A4 (fr) * | 2002-12-03 | 2005-03-02 | Matsushita Electric Ind Co Ltd | Systeme de partage de cle, dispositif de creation de cle partagee et dispositif de retablissement de cle partagee |
US7555122B2 (en) * | 2002-12-04 | 2009-06-30 | Wired Communications LLC | Method for elliptic curve point multiplication |
IL156606A (en) | 2003-06-23 | 2011-07-31 | Aviad Kipnis | Digital certificates |
US7584153B2 (en) * | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US7693277B2 (en) * | 2005-01-07 | 2010-04-06 | First Data Corporation | Generating digital signatures using ephemeral cryptographic key |
CA2592875C (fr) * | 2005-01-18 | 2016-09-06 | Certicom Corp. | Verification acceleree de signatures numeriques et de cles publiques |
WO2006077651A1 (fr) * | 2005-01-24 | 2006-07-27 | Fujitsu Limited | Dispositif de cryptage protege contre les fraudes par analyse de puissance |
US8468361B2 (en) * | 2005-09-21 | 2013-06-18 | Broadcom Corporation | System and method for securely provisioning and generating one-time-passwords in a remote device |
US7813503B2 (en) * | 2006-09-13 | 2010-10-12 | Pitney Bowes Inc. | Method and system for generation of cryptographic keys for use in cryptographic systems |
-
2008
- 2008-07-09 EP EP08772872A patent/EP2168299A4/fr not_active Withdrawn
- 2008-07-09 WO PCT/CA2008/001254 patent/WO2009009868A1/fr active Application Filing
- 2008-07-09 US US12/169,795 patent/US8073139B2/en active Active
- 2008-07-09 CA CA 2692817 patent/CA2692817A1/fr not_active Abandoned
-
2011
- 2011-10-27 US US13/283,463 patent/US8548165B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2009009868A1 (fr) | 2009-01-22 |
EP2168299A1 (fr) | 2010-03-31 |
EP2168299A4 (fr) | 2011-10-05 |
US20090022311A1 (en) | 2009-01-22 |
US8548165B2 (en) | 2013-10-01 |
US20120039466A1 (en) | 2012-02-16 |
US8073139B2 (en) | 2011-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8073139B2 (en) | Method of compressing a cryptographic value | |
EP2174445B1 (fr) | Procédé pour fournir une représentation textuelle d'une valeur cryptographique | |
US5432852A (en) | Large provably fast and secure digital signature schemes based on secure hash functions | |
JP4555859B2 (ja) | 認証システム、認証方法、証明装置、検証装置、それらのプログラム及び記録媒体 | |
US7730319B2 (en) | Provisional signature schemes | |
US20110060903A1 (en) | Group signature system, apparatus and storage medium | |
EP2375628A2 (fr) | Schémas de signature utilisant des cartographies bilinéaires | |
US8139765B2 (en) | Elliptical polynomial-based message authentication code | |
CN110363509B (zh) | 一种信息保护方法及装置 | |
CN112887081B (zh) | 基于sm2的签名验签方法、装置及系统 | |
CN112380269B (zh) | 一种基于区块链的身份证信息查询固证与取证方法 | |
US20070220134A1 (en) | Endpoint Verification Using Call Signs | |
Gao et al. | Similarity-based Secure Deduplication for IIoT Cloud Management System | |
EP2294753B1 (fr) | Procédé et appareil pour générer une signature pour un message et procédé et appareils pour vérifier une telle signature | |
US6928163B1 (en) | Methods, systems and computer program products for generating user-dependent RSA values without storing seeds | |
Rahouma | Reviewing and applying security services with non-english letter coding to secure software applications in light of software trade-offs | |
CN104935591A (zh) | 基于非对称身份的动态口令生成与验证方法 | |
JPWO2006057171A1 (ja) | 署名および検証方法ならびに署名および検証装置 | |
WO2011033642A1 (fr) | Dispositif de génération de signature et dispositif de vérification de signature | |
Oleksik et al. | Methods for data validation using QR codes | |
Andrei et al. | Methods for data validation using QR codes | |
Begum et al. | Data Analytic Framework with Hybrid Security | |
US11968292B1 (en) | Incremental authenticated data encodings | |
CN116915407A (zh) | 基于区块链的电子公证书校验方法及系统 | |
CN115766016A (zh) | 一种检测方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |
Effective date: 20150402 |