CN101099329B - 基于椭圆曲线的新陷门单向函数及其用于较短签名和非对称加密的应用 - Google Patents
基于椭圆曲线的新陷门单向函数及其用于较短签名和非对称加密的应用 Download PDFInfo
- Publication number
- CN101099329B CN101099329B CN 200580046426 CN200580046426A CN101099329B CN 101099329 B CN101099329 B CN 101099329B CN 200580046426 CN200580046426 CN 200580046426 CN 200580046426 A CN200580046426 A CN 200580046426A CN 101099329 B CN101099329 B CN 101099329B
- Authority
- CN
- China
- Prior art keywords
- message
- signature
- computing
- data
- endomorphism
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 27
- 238000004364 calculation method Methods 0.000 claims description 18
- 238000004891 communication Methods 0.000 claims description 16
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 230000000295 complement effect Effects 0.000 claims 4
- 238000012892 rational function Methods 0.000 abstract description 18
- 238000013519 translation Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 238000012937 correction Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000006116 polymerization reaction Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000021615 conjugation Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000012886 linear function Methods 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Pure & Applied Mathematics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Complex Calculations (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Devices For Executing Special Programs (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
WOPCT/IB2004/003700 | 2004-11-11 | ||
IB2004003700 | 2004-11-11 | ||
IBPCT/IB2004/003700 | 2004-11-11 | ||
US62688404P | 2004-11-12 | 2004-11-12 | |
US60/626,884 | 2004-11-12 | ||
PCT/CA2005/001720 WO2006050605A1 (en) | 2004-11-11 | 2005-11-14 | New trapdoor one-way function on elliptic curves and their applications to shorter signatures and asymmetric encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101099329A CN101099329A (zh) | 2008-01-02 |
CN101099329B true CN101099329B (zh) | 2012-12-26 |
Family
ID=36336180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200580046426 Active CN101099329B (zh) | 2004-11-11 | 2005-11-14 | 基于椭圆曲线的新陷门单向函数及其用于较短签名和非对称加密的应用 |
Country Status (7)
Country | Link |
---|---|
US (3) | US7844051B2 (zh) |
EP (1) | EP1815636B1 (zh) |
JP (2) | JP4842276B2 (zh) |
CN (1) | CN101099329B (zh) |
AT (1) | ATE546909T1 (zh) |
CA (1) | CA2587474C (zh) |
WO (1) | WO2006050605A1 (zh) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8862866B2 (en) | 2003-07-07 | 2014-10-14 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
US8245279B2 (en) | 2003-08-19 | 2012-08-14 | Certicom Corp. | Method and apparatus for synchronizing an adaptable security level in an electronic communication |
FR2877788B1 (fr) * | 2004-11-05 | 2007-01-05 | Gemplus Sa | Procede de generation de signature avec preuve de securite "tight", procede de verification et schema de signature associes bases sur le modele de diffie-hellman |
JP4842276B2 (ja) * | 2004-11-11 | 2011-12-21 | サーティコム コーポレーション | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
DE102005045733A1 (de) * | 2005-09-23 | 2007-04-05 | Nec Europe Ltd. | Verfahren zum Übermitteln von Nachrichten |
EP1775880A1 (en) * | 2005-10-11 | 2007-04-18 | STMicroelectronics S.r.l. | Method of processing information to be confidentially transmitted |
WO2007118307A1 (en) | 2006-04-13 | 2007-10-25 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
US7885406B2 (en) * | 2006-10-10 | 2011-02-08 | Microsoft Corporation | Computing endomorphism rings of Abelian surfaces over finite fields |
US9059838B2 (en) * | 2007-03-30 | 2015-06-16 | Verizon Patent And Licensing Inc. | Encryption algorithm with randomized buffer |
US20090046849A1 (en) * | 2007-04-23 | 2009-02-19 | Bally Gaming, Inc. | Data integrity and non-repudiation method |
FR2941115B1 (fr) * | 2009-01-14 | 2011-02-25 | Sagem Securite | Codage de points d'une courbe elliptique |
EP2222015A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
US20100208884A1 (en) * | 2009-02-19 | 2010-08-19 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
US8787564B2 (en) | 2011-11-30 | 2014-07-22 | Certicom Corp. | Assessing cryptographic entropy |
CN104126284B (zh) | 2011-12-28 | 2018-06-08 | 塞尔蒂卡姆公司 | 生成数字签名 |
WO2013153628A1 (ja) * | 2012-04-11 | 2013-10-17 | 株式会社日立製作所 | 演算処理システムおよび演算結果認証方法 |
KR102238681B1 (ko) * | 2013-07-01 | 2021-04-12 | 삼성전자주식회사 | 데이터 인증을 위한 서명 정보 생성 및 검증 방법과 이를 위한 시스템 |
KR20150017844A (ko) * | 2013-08-08 | 2015-02-23 | 삼성전자주식회사 | 페이지 구성 방법 및 이를 지원하는 전자 장치 |
CN103780382B (zh) * | 2014-01-13 | 2017-01-18 | 华南理工大学 | 一种基于超球面的多变量公钥加密/解密系统及方法 |
CN103825743A (zh) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | 一种具有隐私保护功能的数据安全聚合方法 |
CN105099693B (zh) * | 2014-05-23 | 2018-10-19 | 华为技术有限公司 | 一种传输方法及传输装置 |
US10129026B2 (en) | 2016-05-03 | 2018-11-13 | Certicom Corp. | Method and system for cheon resistant static diffie-hellman security |
US10320565B2 (en) * | 2017-02-28 | 2019-06-11 | Certicom Corp. | Generating an elliptic curve point in an elliptic curve cryptographic system |
CN109714153B (zh) * | 2019-02-01 | 2022-04-08 | 铜陵学院 | 一种高效的聚合签名方法 |
CN110363509B (zh) * | 2019-07-19 | 2022-03-29 | 华中师范大学 | 一种信息保护方法及装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146500A (en) * | 1991-03-14 | 1992-09-08 | Omnisec A.G. | Public key cryptographic system using elliptic curves over rings |
US5751808A (en) * | 1995-03-09 | 1998-05-12 | Anshel; Michael M. | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
US5159632A (en) * | 1991-09-17 | 1992-10-27 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
DE69840959D1 (de) * | 1997-12-17 | 2009-08-20 | Nippon Telegraph & Telephone | Verschlüsselungs- und Entschlüsselungsvorrichtungen für Kryptosysteme mit öffentlichem Schlüssel und Aufzeichnungsmedium mit darauf gespeicherten zugehörigen Verarbeitungsprogrammen. |
CA2257008C (en) * | 1998-12-24 | 2007-12-11 | Certicom Corp. | A method for accelerating cryptographic operations on elliptic curves |
FR2788650B1 (fr) * | 1999-01-14 | 2001-02-16 | Gemplus Card Int | Procede cryptographique a cles publique et privee |
US6507907B1 (en) * | 1999-02-26 | 2003-01-14 | Intel Corporation | Protecting information in a system |
US6959085B1 (en) * | 1999-05-03 | 2005-10-25 | Ntru Cryptosystems, Inc. | Secure user identification based on ring homomorphisms |
US20020199001A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for conducting a secure response communication session |
US20020194501A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for conducting a secure interactive communication session |
AU2002332671A1 (en) * | 2001-08-13 | 2003-03-03 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
JP4752176B2 (ja) * | 2003-09-11 | 2011-08-17 | 日本電信電話株式会社 | 一方向性関数演算方法及び装置及びプログラム |
US7499544B2 (en) * | 2003-11-03 | 2009-03-03 | Microsoft Corporation | Use of isogenies for design of cryptosystems |
US7587605B1 (en) * | 2004-03-19 | 2009-09-08 | Microsoft Corporation | Cryptographic pairing-based short signature generation and verification |
JP4842276B2 (ja) * | 2004-11-11 | 2011-12-21 | サーティコム コーポレーション | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
-
2005
- 2005-11-14 JP JP2007540466A patent/JP4842276B2/ja active Active
- 2005-11-14 AT AT05803301T patent/ATE546909T1/de active
- 2005-11-14 EP EP05803301A patent/EP1815636B1/en active Active
- 2005-11-14 CN CN 200580046426 patent/CN101099329B/zh active Active
- 2005-11-14 CA CA2587474A patent/CA2587474C/en active Active
- 2005-11-14 US US11/272,152 patent/US7844051B2/en active Active
- 2005-11-14 WO PCT/CA2005/001720 patent/WO2006050605A1/en active Application Filing
-
2010
- 2010-11-12 US US12/945,234 patent/US8213605B2/en active Active
-
2011
- 2011-08-18 JP JP2011179245A patent/JP5190142B2/ja active Active
-
2012
- 2012-06-13 US US13/495,307 patent/US8782400B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146500A (en) * | 1991-03-14 | 1992-09-08 | Omnisec A.G. | Public key cryptographic system using elliptic curves over rings |
US5751808A (en) * | 1995-03-09 | 1998-05-12 | Anshel; Michael M. | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions |
Non-Patent Citations (2)
Title |
---|
WO 01/01625 A1,全文. |
平昭.椭圆曲线公钥密码体制研究与应用.电子科技大学硕士论文.2003,24-31. * |
Also Published As
Publication number | Publication date |
---|---|
CA2587474A1 (en) | 2006-05-18 |
WO2006050605A1 (en) | 2006-05-18 |
JP2008519994A (ja) | 2008-06-12 |
US7844051B2 (en) | 2010-11-30 |
JP4842276B2 (ja) | 2011-12-21 |
JP5190142B2 (ja) | 2013-04-24 |
JP2011232782A (ja) | 2011-11-17 |
US8213605B2 (en) | 2012-07-03 |
CN101099329A (zh) | 2008-01-02 |
US20060140400A1 (en) | 2006-06-29 |
ATE546909T1 (de) | 2012-03-15 |
CA2587474C (en) | 2016-08-09 |
EP1815636A4 (en) | 2011-03-16 |
US8782400B2 (en) | 2014-07-15 |
US20120314855A1 (en) | 2012-12-13 |
US20110060909A1 (en) | 2011-03-10 |
EP1815636A1 (en) | 2007-08-08 |
EP1815636B1 (en) | 2012-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101099329B (zh) | 基于椭圆曲线的新陷门单向函数及其用于较短签名和非对称加密的应用 | |
Bernstein et al. | Post-quantum cryptography---dealing with the fallout of physics success | |
AU2004218638B2 (en) | Use of isogenies for design of cryptosystems | |
US8180047B2 (en) | Trapdoor pairings | |
US7961876B2 (en) | Method to produce new multivariate public key cryptosystems | |
Paar et al. | Introduction to public-key cryptography | |
Paillier | Trapdooring discrete logarithms on elliptic curves over rings | |
Mittal et al. | Group ring based public key cryptosystems | |
Pilaram et al. | A lattice-based changeable threshold multi-secret sharing scheme and its application to threshold cryptography | |
Liu et al. | New efficient identity based encryption without pairings | |
Singh et al. | Improvement of image transmission using chaotic system and elliptic curve cryptography | |
Li et al. | A new self-certified signature scheme based on ntrus ing for smart mobile communications | |
Wu et al. | Practical t-out-n oblivious transfer and its applications | |
US20080019508A1 (en) | Public key cryptographic methods and systems with rebalancing | |
CN111817853B (zh) | 一种后量子安全的签密算法 | |
Thakur et al. | A Variant of NTRU with split quaternions algebra. | |
Lizama-Perez | Non-invertible key exchange protocol | |
WO2003013052A1 (en) | Cryptosystems based on non-commutatity | |
Mohapatra | Signcryption schemes with forward secrecy based on elliptic curve cryptography | |
Vambol | Polynomial-Time Plaintext-Recovery Attack on the Matrix-Based Knapsack Cipher | |
Cheon et al. | A cryptanalysis of the original Domingo-Ferrer's algebraic privacy homomophism | |
Dhamodharan et al. | Multifarious mapping schemes on Elliptic curve cryptography for IoT security | |
Wang et al. | Signature scheme using the root extraction problem on quaternions | |
CN110837623B (zh) | 利用非欧几里得环上的crt非迭代算法实现秘密共享的方法 | |
Nabil et al. | New authenticated key agreement protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191028 Address after: Voight, Ontario, Canada Patentee after: BlackBerry Ltd. Address before: Ontario, Canada Patentee before: CERTICOM Corp. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240529 Address after: Ai Erlandubailin Patentee after: Maliki Innovation Co.,Ltd. Country or region after: Ireland Address before: Voight, Ontario, Canada Patentee before: BlackBerry Ltd. Country or region before: Canada |