CN103988466A - 群加密方法及设备 - Google Patents

群加密方法及设备 Download PDF

Info

Publication number
CN103988466A
CN103988466A CN201280061831.9A CN201280061831A CN103988466A CN 103988466 A CN103988466 A CN 103988466A CN 201280061831 A CN201280061831 A CN 201280061831A CN 103988466 A CN103988466 A CN 103988466A
Authority
CN
China
Prior art keywords
ots
signature
secret value
secret
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201280061831.9A
Other languages
English (en)
Chinese (zh)
Inventor
L.埃尔艾马尼
M.乔耶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Publication of CN103988466A publication Critical patent/CN103988466A/zh
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
CN201280061831.9A 2011-12-15 2012-12-11 群加密方法及设备 Pending CN103988466A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP11306672 2011-12-15
EP11306672.4 2011-12-15
PCT/EP2012/075091 WO2013087629A1 (en) 2011-12-15 2012-12-11 Group encryption methods and devices

Publications (1)

Publication Number Publication Date
CN103988466A true CN103988466A (zh) 2014-08-13

Family

ID=47324184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280061831.9A Pending CN103988466A (zh) 2011-12-15 2012-12-11 群加密方法及设备

Country Status (6)

Country Link
US (1) US20140321642A1 (https=)
EP (1) EP2792098B1 (https=)
JP (1) JP2015501110A (https=)
KR (1) KR20140103269A (https=)
CN (1) CN103988466A (https=)
WO (1) WO2013087629A1 (https=)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530093A (zh) * 2015-12-10 2016-04-27 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法
CN105553664A (zh) * 2015-12-10 2016-05-04 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10623409B2 (en) * 2012-03-23 2020-04-14 Irdeto B.V. Controlling access to IP streaming content
EP2860905A1 (en) * 2013-10-09 2015-04-15 Thomson Licensing Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product
CN103780383B (zh) * 2014-01-13 2017-05-31 华南理工大学 一种基于超球面的多变量公钥签名/验证系统及方法
US10742413B2 (en) * 2017-04-25 2020-08-11 International Business Machines Corporation Flexible verifiable encryption from lattices
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
KR102360944B1 (ko) * 2020-07-13 2022-02-08 고려대학교 산학협력단 그룹 서명 기법
JP7605297B2 (ja) 2021-04-15 2024-12-24 日本電信電話株式会社 暗号システム、暗号化装置、復号装置、方法、及びプログラム
KR102496583B1 (ko) * 2021-09-17 2023-02-06 이정훈 암호화 장치 및 이를 이용한 암호화 방법

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1722656A (zh) * 2004-04-08 2006-01-18 梁庆生 一种数字签名方法及数字签名工具
CN101169814A (zh) * 2006-10-26 2008-04-30 国际商业机器公司 用于管理和自动生成加密密钥的系统和方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1722656A (zh) * 2004-04-08 2006-01-18 梁庆生 一种数字签名方法及数字签名工具
CN101169814A (zh) * 2006-10-26 2008-04-30 国际商业机器公司 用于管理和自动生成加密密钥的系统和方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JULIENT CATHALO,BENO T LIBERT,AND MOTI YUNG: "《Group Encryption:Non-Interactive Realization in the Standard Model》", 《ADVANCES IN CRYPTOLOGY-ASIACRYPT LNCS 5912,2009》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530093A (zh) * 2015-12-10 2016-04-27 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法
CN105553664A (zh) * 2015-12-10 2016-05-04 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法
CN105553664B (zh) * 2015-12-10 2018-09-28 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法
CN105530093B (zh) * 2015-12-10 2019-02-01 中国电子科技集团公司第三十研究所 一种具有非交互式不可否认性质的签密方法

Also Published As

Publication number Publication date
JP2015501110A (ja) 2015-01-08
EP2792098B1 (en) 2015-12-09
WO2013087629A1 (en) 2013-06-20
KR20140103269A (ko) 2014-08-26
US20140321642A1 (en) 2014-10-30
EP2792098A1 (en) 2014-10-22

Similar Documents

Publication Publication Date Title
CN109257184B (zh) 基于匿名广播加密的可链接环签名方法
CN114157427B (zh) 基于sm2数字签名的门限签名方法
US6298153B1 (en) Digital signature method and information communication system and apparatus using such method
JP5201136B2 (ja) 匿名認証システムおよび匿名認証方法
CN107733648B (zh) 一种基于身份的rsa数字签名生成方法及系统
EP2792098B1 (en) Group encryption methods and devices
CN104821880B (zh) 一种无证书广义代理签密方法
CN110545279A (zh) 兼具隐私和监管功能的区块链交易方法、装置及系统
CN110505058A (zh) 跨链场景下异构区块链的身份认证方法
CN107659395B (zh) 一种多服务器环境下基于身份的分布式认证方法及系统
CN114095181B (zh) 一种基于国密算法的门限环签名方法及系统
US20120278609A1 (en) Joint encryption of data
CN104393996B (zh) 一种基于无证书的签密方法和系统
CN110113150B (zh) 基于无证书环境的可否认认证的加密方法和系统
JP2013539295A (ja) メッセージ復元を伴うデジタル署名の認証された暗号化
Shankar et al. Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm
CN109547209B (zh) 一种两方sm2数字签名生成方法
EP2846492A1 (en) Cryptographic group signature methods and devices
CN103493428B (zh) 数据加密
CN116346336B (zh) 一种基于多层密钥生成中心的密钥分发方法及相关系统
CN110572257A (zh) 基于身份的抗量子计算数据来源鉴别方法和系统
CN111092720A (zh) 能抵抗主密钥和解密密钥泄漏的基于证书加密方法
JP3862397B2 (ja) 情報通信システム
Witzke et al. Key management for large scale end-to-end encryption
Kohlweiss et al. Accountable tracing signatures

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140813