CN103069745B - 基于属性的数字签名 - Google Patents

基于属性的数字签名 Download PDF

Info

Publication number
CN103069745B
CN103069745B CN201180040747.4A CN201180040747A CN103069745B CN 103069745 B CN103069745 B CN 103069745B CN 201180040747 A CN201180040747 A CN 201180040747A CN 103069745 B CN103069745 B CN 103069745B
Authority
CN
China
Prior art keywords
signature
key
attribute
unit
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201180040747.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN103069745A (zh
Inventor
M·佩特科维奇
M·阿希姆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN103069745A publication Critical patent/CN103069745A/zh
Application granted granted Critical
Publication of CN103069745B publication Critical patent/CN103069745B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
CN201180040747.4A 2010-08-24 2011-08-22 基于属性的数字签名 Active CN103069745B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP10173838 2010-08-24
EP10173838.3 2010-08-24
PCT/IB2011/053672 WO2012025866A1 (en) 2010-08-24 2011-08-22 Attribute-based digital signatures

Publications (2)

Publication Number Publication Date
CN103069745A CN103069745A (zh) 2013-04-24
CN103069745B true CN103069745B (zh) 2017-04-19

Family

ID=44645160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201180040747.4A Active CN103069745B (zh) 2010-08-24 2011-08-22 基于属性的数字签名

Country Status (7)

Country Link
US (1) US9401811B2 (https=)
EP (1) EP2609712A1 (https=)
JP (1) JP2013536651A (https=)
CN (1) CN103069745B (https=)
BR (1) BR112013004074A2 (https=)
RU (1) RU2623724C2 (https=)
WO (1) WO2012025866A1 (https=)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108777626A (zh) * 2018-08-16 2018-11-09 西南交通大学 一种支持动态属性空间的属性基网络签名方法

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800555B2 (en) * 2012-08-17 2017-10-24 Koninklijke Philips N.V. Attribute-based encryption
CN104184584A (zh) * 2013-05-27 2014-12-03 华为技术有限公司 多重签名的方法及其装置
KR20150084221A (ko) * 2014-01-13 2015-07-22 삼성전자주식회사 어플리케이션 패키지의 재서명 장치, 방법 및 상기 어플리케이션 패키지를 실행하는 단말장치
US9230133B2 (en) 2014-01-14 2016-01-05 International Business Machines Corporation Secure access for sensitive digital information
US10452869B2 (en) * 2014-05-07 2019-10-22 Infineon Technologies Ag Systems and methods for processing and verifying data using signatures
US9544150B2 (en) 2014-06-04 2017-01-10 International Business Machines Corporation Using multiple digital identification documents to control information disclosure
US10097354B2 (en) 2015-08-21 2018-10-09 International Business Machines Corporation Privacy control using unique identifiers associated with sensitive data elements of a group
EP3179670A1 (en) * 2015-12-11 2017-06-14 Gemalto Sa Secure electronic device with mechanism to provide unlinkable attribute assertion verifiable by a service provider
US10218515B2 (en) * 2016-08-26 2019-02-26 Microsoft Technology Licensing, Llc Evolving a signature during trust verification of an object
US10116450B1 (en) * 2016-11-02 2018-10-30 ISARA Corporation Merkle signature scheme using subtrees
CN106789066B (zh) * 2016-12-12 2019-09-24 西北工业大学 基于ip签名的代理重签名方法
US11356427B1 (en) 2017-02-15 2022-06-07 Wells Fargo Bank, N.A. Signcrypted envelope message
US11354660B1 (en) 2017-04-27 2022-06-07 Wells Fargo Bank, N.A. Encapsulation of payment information
US11647006B2 (en) * 2018-05-10 2023-05-09 Telecom Italia S.P.A. Protecting signaling messages in hop-by-hop network communication link
US11601284B2 (en) * 2019-06-14 2023-03-07 Planetway Corporation Digital signature system based on a cloud of dedicated local devices
US10581616B1 (en) 2019-07-11 2020-03-03 ISARA Corporation Managing nodes of a cryptographic hash tree in a hash-based digital signature scheme
JP7348848B2 (ja) * 2020-01-16 2023-09-21 株式会社国際電気通信基礎技術研究所 統合属性ベースグループ署名処理方法、統合属性ベースグループ署名処理システム、および、プログラム
US11165588B1 (en) * 2020-04-09 2021-11-02 International Business Machines Corporation Key attribute verification
CN113271200A (zh) * 2021-05-26 2021-08-17 陕西理工大学 一种抗量子攻击的格属性签名方法
KR102568418B1 (ko) * 2021-08-26 2023-08-18 하이파이브랩 주식회사 다중 서명을 지원하는 전자 인증 시스템 및 방법
WO2023152797A1 (ja) * 2022-02-08 2023-08-17 富士通株式会社 検証方法、検証プログラムおよび情報処理装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1867877A (zh) * 2003-10-17 2006-11-22 国际商业机器公司 用于具有属性的用户证明签名的方法和系统
US20090327735A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Unidirectional multi-use proxy re-signature process

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5422953A (en) * 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device
DE69534490T2 (de) * 1994-07-19 2006-06-29 Certco, Llc Verfahren zur sicheren anwendung digitaler unterschriften in einem kommerziellen verschlüsselungssystem
US7003480B2 (en) * 1997-02-27 2006-02-21 Microsoft Corporation GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
US6151676A (en) * 1997-12-24 2000-11-21 Philips Electronics North America Corporation Administration and utilization of secret fresh random numbers in a networked environment
AU2001275298A1 (en) * 2000-06-06 2001-12-17 Ingeo Systems, Inc. Creating and verifying electronic documents
WO2002069087A2 (en) * 2001-02-22 2002-09-06 Bea Systems, Inc. System and method for message encryption and signing in a transaction processing system
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
ATE270800T1 (de) * 2002-05-24 2004-07-15 Swisscom Mobile Ag Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften
KR20070065385A (ko) * 2004-09-17 2007-06-22 코닌클리케 필립스 일렉트로닉스 엔.브이. 근접성 체크 서버
JP2006325072A (ja) 2005-05-20 2006-11-30 Kddi R & D Laboratories Inc 属性情報交換システム、属性情報交換方法および通信端末
CA2662675C (en) * 2006-09-08 2016-05-24 Blackberry Limited Authenticated radio frequency identification and key distribution system therefor
EP1944716B1 (de) * 2007-01-15 2010-04-28 Stepover GmbH Verfahren und Vorrichtung zum Sichern eines Dokuments mit eingefügtem Signaturabbild und biometrischen Daten in einem Computersystem
US8171527B2 (en) * 2007-06-26 2012-05-01 General Instrument Corporation Method and apparatus for securing unlock password generation and distribution
US20100037062A1 (en) * 2008-08-11 2010-02-11 Mark Carney Signed digital documents
EP2166493A1 (en) * 2008-09-12 2010-03-24 BRITISH TELECOMMUNICATIONS public limited company Control of supply networks and verification of items
DE102008055076A1 (de) * 2008-12-22 2010-07-01 Robert Bosch Gmbh Vorrichtung und Verfahren zum Schutz von Daten, Computerprogramm, Computerprogrammprodukt
EP2355402A1 (en) * 2010-01-29 2011-08-10 British Telecommunications public limited company Access control
WO2011134876A1 (en) 2010-04-30 2011-11-03 Syngenta Participations Ag A method of reducing insect-vectored viral infections
US8527777B2 (en) * 2010-07-30 2013-09-03 International Business Machines Corporation Cryptographic proofs in data processing systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1867877A (zh) * 2003-10-17 2006-11-22 国际商业机器公司 用于具有属性的用户证明签名的方法和系统
US20090327735A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Unidirectional multi-use proxy re-signature process

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108777626A (zh) * 2018-08-16 2018-11-09 西南交通大学 一种支持动态属性空间的属性基网络签名方法

Also Published As

Publication number Publication date
RU2623724C2 (ru) 2017-06-28
CN103069745A (zh) 2013-04-24
WO2012025866A1 (en) 2012-03-01
EP2609712A1 (en) 2013-07-03
US9401811B2 (en) 2016-07-26
JP2013536651A (ja) 2013-09-19
BR112013004074A2 (pt) 2016-07-26
RU2013112947A (ru) 2014-09-27
US20130159730A1 (en) 2013-06-20

Similar Documents

Publication Publication Date Title
CN103069745B (zh) 基于属性的数字签名
CN102907038B (zh) 基于属性的数字签名系统
CN115694838B (zh) 基于可验证凭证与零知识证明的匿名可信访问控制方法
EP1719284B1 (en) Token provisioning
CN104641592B (zh) 用于无证书认证加密(clae)的方法和系统
KR100568233B1 (ko) 인증서를 이용한 기기 인증 방법 및 상기 방법을 이용하여기기 인증을 수행하는 디지털 컨텐츠 처리 기기
US7634085B1 (en) Identity-based-encryption system with partial attribute matching
US20160127128A1 (en) Management of cryptographic keys
US20060129847A1 (en) Methods and systems for providing a secure data distribution via public networks
US20030163687A1 (en) Method and system for key certification
CN101573910A (zh) 生成和分配对数字对象的访问许可的设备和方法
WO2010044056A2 (en) Method and apparatus for pseudonym generation and authentication
Wang et al. A pre-authentication approach to proxy re-encryption in big data context
Benantar The Internet public key infrastructure
Hahn et al. Trustworthy delegation toward securing mobile healthcare cyber-physical systems
CN119892452B (zh) 一种基于密文策略属性基加密的电力数据隐私安全保护系统、方法和应用
JP5275468B2 (ja) サービスアクセスの制限を可能にする方法
Shiny et al. Decentralized access control technique with multi-tier authentication of user for cloud storage
CN116647390A (zh) 一种具有双重隐私的时限群签名方法
López et al. LACChain ID Framework: A Set of Recommendations for Blockchain-Based Interoperable, Privacy-Preserving, Regulatory Compliant, Secure, and Standardized Digital Identifiers, Credentials, and Wallets
Shareef et al. Using Role-based to Implement Certificate Authority Management for Big Data
Gritti Contributions to Cryptographic Solutions towards Securing Medical Applications
Vigašová Client tools for RemSig
Spies Public Key Infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant