CN103988466A - 群加密方法及设备 - Google Patents
群加密方法及设备 Download PDFInfo
- Publication number
- CN103988466A CN103988466A CN201280061831.9A CN201280061831A CN103988466A CN 103988466 A CN103988466 A CN 103988466A CN 201280061831 A CN201280061831 A CN 201280061831A CN 103988466 A CN103988466 A CN 103988466A
- Authority
- CN
- China
- Prior art keywords
- ots
- signature
- secret value
- secret
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP11306672 | 2011-12-15 | ||
| EP11306672.4 | 2011-12-15 | ||
| PCT/EP2012/075091 WO2013087629A1 (en) | 2011-12-15 | 2012-12-11 | Group encryption methods and devices |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN103988466A true CN103988466A (zh) | 2014-08-13 |
Family
ID=47324184
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201280061831.9A Pending CN103988466A (zh) | 2011-12-15 | 2012-12-11 | 群加密方法及设备 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20140321642A1 (https=) |
| EP (1) | EP2792098B1 (https=) |
| JP (1) | JP2015501110A (https=) |
| KR (1) | KR20140103269A (https=) |
| CN (1) | CN103988466A (https=) |
| WO (1) | WO2013087629A1 (https=) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105530093A (zh) * | 2015-12-10 | 2016-04-27 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
| CN105553664A (zh) * | 2015-12-10 | 2016-05-04 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10623409B2 (en) * | 2012-03-23 | 2020-04-14 | Irdeto B.V. | Controlling access to IP streaming content |
| EP2860905A1 (en) * | 2013-10-09 | 2015-04-15 | Thomson Licensing | Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product |
| CN103780383B (zh) * | 2014-01-13 | 2017-05-31 | 华南理工大学 | 一种基于超球面的多变量公钥签名/验证系统及方法 |
| US10742413B2 (en) * | 2017-04-25 | 2020-08-11 | International Business Machines Corporation | Flexible verifiable encryption from lattices |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| KR102360944B1 (ko) * | 2020-07-13 | 2022-02-08 | 고려대학교 산학협력단 | 그룹 서명 기법 |
| JP7605297B2 (ja) | 2021-04-15 | 2024-12-24 | 日本電信電話株式会社 | 暗号システム、暗号化装置、復号装置、方法、及びプログラム |
| KR102496583B1 (ko) * | 2021-09-17 | 2023-02-06 | 이정훈 | 암호화 장치 및 이를 이용한 암호화 방법 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1722656A (zh) * | 2004-04-08 | 2006-01-18 | 梁庆生 | 一种数字签名方法及数字签名工具 |
| CN101169814A (zh) * | 2006-10-26 | 2008-04-30 | 国际商业机器公司 | 用于管理和自动生成加密密钥的系统和方法 |
-
2012
- 2012-12-11 US US14/364,400 patent/US20140321642A1/en not_active Abandoned
- 2012-12-11 CN CN201280061831.9A patent/CN103988466A/zh active Pending
- 2012-12-11 EP EP12798326.0A patent/EP2792098B1/en not_active Not-in-force
- 2012-12-11 KR KR1020147015912A patent/KR20140103269A/ko not_active Withdrawn
- 2012-12-11 JP JP2014546461A patent/JP2015501110A/ja not_active Withdrawn
- 2012-12-11 WO PCT/EP2012/075091 patent/WO2013087629A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1722656A (zh) * | 2004-04-08 | 2006-01-18 | 梁庆生 | 一种数字签名方法及数字签名工具 |
| CN101169814A (zh) * | 2006-10-26 | 2008-04-30 | 国际商业机器公司 | 用于管理和自动生成加密密钥的系统和方法 |
Non-Patent Citations (1)
| Title |
|---|
| JULIENT CATHALO,BENO T LIBERT,AND MOTI YUNG: "《Group Encryption:Non-Interactive Realization in the Standard Model》", 《ADVANCES IN CRYPTOLOGY-ASIACRYPT LNCS 5912,2009》 * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105530093A (zh) * | 2015-12-10 | 2016-04-27 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
| CN105553664A (zh) * | 2015-12-10 | 2016-05-04 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
| CN105553664B (zh) * | 2015-12-10 | 2018-09-28 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
| CN105530093B (zh) * | 2015-12-10 | 2019-02-01 | 中国电子科技集团公司第三十研究所 | 一种具有非交互式不可否认性质的签密方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2015501110A (ja) | 2015-01-08 |
| EP2792098B1 (en) | 2015-12-09 |
| WO2013087629A1 (en) | 2013-06-20 |
| KR20140103269A (ko) | 2014-08-26 |
| US20140321642A1 (en) | 2014-10-30 |
| EP2792098A1 (en) | 2014-10-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109257184B (zh) | 基于匿名广播加密的可链接环签名方法 | |
| CN114157427B (zh) | 基于sm2数字签名的门限签名方法 | |
| US6298153B1 (en) | Digital signature method and information communication system and apparatus using such method | |
| JP5201136B2 (ja) | 匿名認証システムおよび匿名認証方法 | |
| CN107733648B (zh) | 一种基于身份的rsa数字签名生成方法及系统 | |
| EP2792098B1 (en) | Group encryption methods and devices | |
| CN104821880B (zh) | 一种无证书广义代理签密方法 | |
| CN110545279A (zh) | 兼具隐私和监管功能的区块链交易方法、装置及系统 | |
| CN110505058A (zh) | 跨链场景下异构区块链的身份认证方法 | |
| CN107659395B (zh) | 一种多服务器环境下基于身份的分布式认证方法及系统 | |
| CN114095181B (zh) | 一种基于国密算法的门限环签名方法及系统 | |
| US20120278609A1 (en) | Joint encryption of data | |
| CN104393996B (zh) | 一种基于无证书的签密方法和系统 | |
| CN110113150B (zh) | 基于无证书环境的可否认认证的加密方法和系统 | |
| JP2013539295A (ja) | メッセージ復元を伴うデジタル署名の認証された暗号化 | |
| Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
| CN109547209B (zh) | 一种两方sm2数字签名生成方法 | |
| EP2846492A1 (en) | Cryptographic group signature methods and devices | |
| CN103493428B (zh) | 数据加密 | |
| CN116346336B (zh) | 一种基于多层密钥生成中心的密钥分发方法及相关系统 | |
| CN110572257A (zh) | 基于身份的抗量子计算数据来源鉴别方法和系统 | |
| CN111092720A (zh) | 能抵抗主密钥和解密密钥泄漏的基于证书加密方法 | |
| JP3862397B2 (ja) | 情報通信システム | |
| Witzke et al. | Key management for large scale end-to-end encryption | |
| Kohlweiss et al. | Accountable tracing signatures |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140813 |