CN103069745B - 基于属性的数字签名 - Google Patents

基于属性的数字签名 Download PDF

Info

Publication number
CN103069745B
CN103069745B CN201180040747.4A CN201180040747A CN103069745B CN 103069745 B CN103069745 B CN 103069745B CN 201180040747 A CN201180040747 A CN 201180040747A CN 103069745 B CN103069745 B CN 103069745B
Authority
CN
China
Prior art keywords
signature
key
attribute
unit
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201180040747.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN103069745A (zh
Inventor
M·佩特科维奇
M·阿希姆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN103069745A publication Critical patent/CN103069745A/zh
Application granted granted Critical
Publication of CN103069745B publication Critical patent/CN103069745B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
CN201180040747.4A 2010-08-24 2011-08-22 基于属性的数字签名 Active CN103069745B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP10173838.3 2010-08-24
EP10173838 2010-08-24
PCT/IB2011/053672 WO2012025866A1 (en) 2010-08-24 2011-08-22 Attribute-based digital signatures

Publications (2)

Publication Number Publication Date
CN103069745A CN103069745A (zh) 2013-04-24
CN103069745B true CN103069745B (zh) 2017-04-19

Family

ID=44645160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201180040747.4A Active CN103069745B (zh) 2010-08-24 2011-08-22 基于属性的数字签名

Country Status (7)

Country Link
US (1) US9401811B2 (cg-RX-API-DMAC7.html)
EP (1) EP2609712A1 (cg-RX-API-DMAC7.html)
JP (1) JP2013536651A (cg-RX-API-DMAC7.html)
CN (1) CN103069745B (cg-RX-API-DMAC7.html)
BR (1) BR112013004074A2 (cg-RX-API-DMAC7.html)
RU (1) RU2623724C2 (cg-RX-API-DMAC7.html)
WO (1) WO2012025866A1 (cg-RX-API-DMAC7.html)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108777626A (zh) * 2018-08-16 2018-11-09 西南交通大学 一种支持动态属性空间的属性基网络签名方法

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112015003216A2 (pt) * 2012-08-17 2017-07-04 Koninklijke Philips Nv sistema de criptografia com base em atributos; sistema de comunicação; gerador de chave para utilização no sistema; e método de criptografia com base em atributos
CN104184584A (zh) * 2013-05-27 2014-12-03 华为技术有限公司 多重签名的方法及其装置
KR20150084221A (ko) * 2014-01-13 2015-07-22 삼성전자주식회사 어플리케이션 패키지의 재서명 장치, 방법 및 상기 어플리케이션 패키지를 실행하는 단말장치
US9230133B2 (en) 2014-01-14 2016-01-05 International Business Machines Corporation Secure access for sensitive digital information
US10452869B2 (en) * 2014-05-07 2019-10-22 Infineon Technologies Ag Systems and methods for processing and verifying data using signatures
US9544150B2 (en) 2014-06-04 2017-01-10 International Business Machines Corporation Using multiple digital identification documents to control information disclosure
US10097354B2 (en) 2015-08-21 2018-10-09 International Business Machines Corporation Privacy control using unique identifiers associated with sensitive data elements of a group
EP3179670A1 (en) * 2015-12-11 2017-06-14 Gemalto Sa Secure electronic device with mechanism to provide unlinkable attribute assertion verifiable by a service provider
US10218515B2 (en) * 2016-08-26 2019-02-26 Microsoft Technology Licensing, Llc Evolving a signature during trust verification of an object
US10116450B1 (en) * 2016-11-02 2018-10-30 ISARA Corporation Merkle signature scheme using subtrees
CN106789066B (zh) * 2016-12-12 2019-09-24 西北工业大学 基于ip签名的代理重签名方法
US11356427B1 (en) 2017-02-15 2022-06-07 Wells Fargo Bank, N.A. Signcrypted envelope message
US11354660B1 (en) 2017-04-27 2022-06-07 Wells Fargo Bank, N.A. Encapsulation of payment information
US11647006B2 (en) * 2018-05-10 2023-05-09 Telecom Italia S.P.A. Protecting signaling messages in hop-by-hop network communication link
US11601284B2 (en) * 2019-06-14 2023-03-07 Planetway Corporation Digital signature system based on a cloud of dedicated local devices
US10581616B1 (en) 2019-07-11 2020-03-03 ISARA Corporation Managing nodes of a cryptographic hash tree in a hash-based digital signature scheme
JP7348848B2 (ja) * 2020-01-16 2023-09-21 株式会社国際電気通信基礎技術研究所 統合属性ベースグループ署名処理方法、統合属性ベースグループ署名処理システム、および、プログラム
US11165588B1 (en) * 2020-04-09 2021-11-02 International Business Machines Corporation Key attribute verification
CN113271200A (zh) * 2021-05-26 2021-08-17 陕西理工大学 一种抗量子攻击的格属性签名方法
KR102568418B1 (ko) * 2021-08-26 2023-08-18 하이파이브랩 주식회사 다중 서명을 지원하는 전자 인증 시스템 및 방법
WO2023152797A1 (ja) * 2022-02-08 2023-08-17 富士通株式会社 検証方法、検証プログラムおよび情報処理装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1867877A (zh) * 2003-10-17 2006-11-22 国际商业机器公司 用于具有属性的用户证明签名的方法和系统
US20090327735A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Unidirectional multi-use proxy re-signature process

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5422953A (en) * 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device
CZ11597A3 (en) * 1994-07-19 1997-09-17 Bankers Trust Co Method of safe use of digital designation in a commercial coding system
US7003480B2 (en) * 1997-02-27 2006-02-21 Microsoft Corporation GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
US6151676A (en) * 1997-12-24 2000-11-21 Philips Electronics North America Corporation Administration and utilization of secret fresh random numbers in a networked environment
AU2001275298A1 (en) * 2000-06-06 2001-12-17 Ingeo Systems, Inc. Creating and verifying electronic documents
DE60227247D1 (de) * 2001-02-22 2008-08-07 Bea Systems Inc System und verfahren zum verschlüsseln von nachrichten und zum registrieren in einem transaktionsverarbeitungssystem
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
DK1365537T3 (da) * 2002-05-24 2004-11-01 Swisscom Mobile Ag Indretninger og fremgangsmåder til certificering af digitale underskrifter
EP1792469A1 (en) * 2004-09-17 2007-06-06 Koninklijke Philips Electronics N.V. Proximity check server
JP2006325072A (ja) * 2005-05-20 2006-11-30 Kddi R & D Laboratories Inc 属性情報交換システム、属性情報交換方法および通信端末
EP2076799A4 (en) * 2006-09-08 2011-03-09 Certicom Corp AUTHENTICATED HIGH FREQUENCY IDENTIFICATION AND KEY DISTRIBUTION SYSTEM THEREFOR
ATE466347T1 (de) * 2007-01-15 2010-05-15 Stepover Gmbh Verfahren und vorrichtung zum sichern eines dokuments mit eingefügtem signaturabbild und biometrischen daten in einem computersystem
US8171527B2 (en) * 2007-06-26 2012-05-01 General Instrument Corporation Method and apparatus for securing unlock password generation and distribution
US20100037062A1 (en) * 2008-08-11 2010-02-11 Mark Carney Signed digital documents
EP2166493A1 (en) * 2008-09-12 2010-03-24 BRITISH TELECOMMUNICATIONS public limited company Control of supply networks and verification of items
DE102008055076A1 (de) * 2008-12-22 2010-07-01 Robert Bosch Gmbh Vorrichtung und Verfahren zum Schutz von Daten, Computerprogramm, Computerprogrammprodukt
EP2355402A1 (en) * 2010-01-29 2011-08-10 British Telecommunications public limited company Access control
JP2013525395A (ja) 2010-04-30 2013-06-20 シンジェンタ パーティシペーションズ アクチェンゲゼルシャフト 昆虫媒介性ウイルス感染を減少させる方法
US8527777B2 (en) * 2010-07-30 2013-09-03 International Business Machines Corporation Cryptographic proofs in data processing systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1867877A (zh) * 2003-10-17 2006-11-22 国际商业机器公司 用于具有属性的用户证明签名的方法和系统
US20090327735A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Unidirectional multi-use proxy re-signature process

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108777626A (zh) * 2018-08-16 2018-11-09 西南交通大学 一种支持动态属性空间的属性基网络签名方法

Also Published As

Publication number Publication date
RU2013112947A (ru) 2014-09-27
EP2609712A1 (en) 2013-07-03
US9401811B2 (en) 2016-07-26
US20130159730A1 (en) 2013-06-20
BR112013004074A2 (pt) 2016-07-26
RU2623724C2 (ru) 2017-06-28
JP2013536651A (ja) 2013-09-19
CN103069745A (zh) 2013-04-24
WO2012025866A1 (en) 2012-03-01

Similar Documents

Publication Publication Date Title
CN103069745B (zh) 基于属性的数字签名
CN102907038B (zh) 基于属性的数字签名系统
EP1719284B1 (en) Token provisioning
CN104641592B (zh) 用于无证书认证加密(clae)的方法和系统
US7308574B2 (en) Method and system for key certification
KR100568233B1 (ko) 인증서를 이용한 기기 인증 방법 및 상기 방법을 이용하여기기 인증을 수행하는 디지털 컨텐츠 처리 기기
US7634085B1 (en) Identity-based-encryption system with partial attribute matching
US20160127128A1 (en) Management of cryptographic keys
US20060129847A1 (en) Methods and systems for providing a secure data distribution via public networks
CN101573910A (zh) 生成和分配对数字对象的访问许可的设备和方法
EP2359524A2 (en) Method and apparatus for pseudonym generation and authentication
Wang et al. A pre-authentication approach to proxy re-encryption in big data context
Benantar The Internet public key infrastructure
Hahn et al. Trustworthy delegation toward securing mobile healthcare cyber-physical systems
JP5275468B2 (ja) サービスアクセスの制限を可能にする方法
Shiny et al. Decentralized access control technique with multi-tier authentication of user for cloud storage
CN116647390A (zh) 一种具有双重隐私的时限群签名方法
López et al. LACChain ID Framework: A Set of Recommendations for Blockchain-Based Interoperable, Privacy-Preserving, Regulatory Compliant, Secure, and Standardized Digital Identifiers, Credentials, and Wallets
Shareef et al. Using Role-based to Implement Certificate Authority Management for Big Data
Gritti Contributions to Cryptographic Solutions towards Securing Medical Applications
Vigašová Client tools for RemSig
Bianchi et al. From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant