CN109074759A - 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 - Google Patents
用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 Download PDFInfo
- Publication number
- CN109074759A CN109074759A CN201780027865.9A CN201780027865A CN109074759A CN 109074759 A CN109074759 A CN 109074759A CN 201780027865 A CN201780027865 A CN 201780027865A CN 109074759 A CN109074759 A CN 109074759A
- Authority
- CN
- China
- Prior art keywords
- curve
- group
- cheon
- ecdh
- diffie
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000003068 static effect Effects 0.000 title claims abstract description 37
- 238000004891 communication Methods 0.000 claims abstract description 17
- 230000007717 exclusion Effects 0.000 claims abstract description 6
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 claims description 7
- 238000004422 calculation algorithm Methods 0.000 description 43
- 238000012360 testing method Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 241000269319 Squalius cephalus Species 0.000 description 5
- 230000015654 memory Effects 0.000 description 5
- 238000009795 derivation Methods 0.000 description 4
- 238000007873 sieving Methods 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000047 product Substances 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000005056 compaction Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000006227 byproduct Substances 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012892 rational function Methods 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Algebra (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
Abstract
Description
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210517133.0A CN114866238A (zh) | 2016-05-03 | 2017-02-14 | 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/145,428 US10129026B2 (en) | 2016-05-03 | 2016-05-03 | Method and system for cheon resistant static diffie-hellman security |
US15/145,428 | 2016-05-03 | ||
PCT/CA2017/050175 WO2017190223A1 (en) | 2016-05-03 | 2017-02-14 | Method and system for cheon resistant static diffie-hellman security |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210517133.0A Division CN114866238A (zh) | 2016-05-03 | 2017-02-14 | 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109074759A true CN109074759A (zh) | 2018-12-21 |
CN109074759B CN109074759B (zh) | 2022-04-26 |
Family
ID=60202663
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210517133.0A Pending CN114866238A (zh) | 2016-05-03 | 2017-02-14 | 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 |
CN201780027865.9A Active CN109074759B (zh) | 2016-05-03 | 2017-02-14 | 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210517133.0A Pending CN114866238A (zh) | 2016-05-03 | 2017-02-14 | 用于Cheon抗性的静态DIFFIE-HELLMAN安全性的方法和系统 |
Country Status (6)
Country | Link |
---|---|
US (5) | US10129026B2 (zh) |
EP (1) | EP3430607B1 (zh) |
KR (1) | KR20190006490A (zh) |
CN (2) | CN114866238A (zh) |
CA (1) | CA3020828C (zh) |
WO (1) | WO2017190223A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11005656B2 (en) | 2018-12-07 | 2021-05-11 | Arris Enterprises Llc | Embedding information in elliptic curve base point |
US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
US11711207B2 (en) | 2021-03-30 | 2023-07-25 | International Business Machines Corporation | Quantum safe key exchange scheme |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101099328A (zh) * | 2004-11-11 | 2008-01-02 | 塞尔蒂卡姆公司 | 定制的静态Diffie-Helman群 |
CN101489226A (zh) * | 2009-02-24 | 2009-07-22 | 东南大学 | 一种基于椭圆曲线的无线局域网切换认证方法 |
CN101541001A (zh) * | 2009-04-28 | 2009-09-23 | 刘建 | 一种基密钥的更新方法及系统 |
EP1805929B1 (en) * | 2004-10-29 | 2010-08-11 | Thomson Licensing | Secure authenticated channel |
CN101808319A (zh) * | 2010-03-16 | 2010-08-18 | 东南大学 | 一种保护移动锚点和移动节点通信安全的方法 |
CN102098157A (zh) * | 2009-12-10 | 2011-06-15 | 塔塔咨询服务有限公司 | 一种基于无证书公共密钥基础结构用于加强客户/服务器通讯协议安全性的系统和方法 |
CN103326852A (zh) * | 2013-06-20 | 2013-09-25 | 武汉大学 | 一种量子计算环境下的共享密钥建立方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
WO1996004602A1 (en) * | 1994-07-29 | 1996-02-15 | Certicom Corp. | Elliptic curve encryption systems |
DE69723872D1 (de) * | 1997-02-14 | 2003-09-04 | Citibank Na | Aufbau eines zyklotomischen polynoms eines kryptosystems basierend auf dem diskreten logarithmus über endliche körper |
US6778666B1 (en) * | 1999-03-15 | 2004-08-17 | Lg Electronics Inc. | Cryptographic method using construction of elliptic curve cryptosystem |
US7359507B2 (en) * | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
FR2807898B1 (fr) * | 2000-04-18 | 2002-06-28 | Gemplus Card Int | Procede de cryptographie sur courbes elliptiques |
US7215708B2 (en) * | 2001-05-22 | 2007-05-08 | Koninklijke Philips Electronics N.V. | Resolution downscaling of video images |
US7215780B2 (en) | 2001-12-31 | 2007-05-08 | Certicom Corp. | Method and apparatus for elliptic curve scalar multiplication |
US7418099B2 (en) * | 2002-05-03 | 2008-08-26 | Certicom Corp. | Method and apparatus for performing elliptic curve arithmetic |
EP1815636B1 (en) | 2004-11-11 | 2012-02-22 | Certicom Corp. | New trapdoor one-way function on elliptic curves and its application to asymmetric encryption and shorter signatures |
CN101617351B (zh) | 2007-01-19 | 2011-06-22 | 三菱电机株式会社 | 密文生成装置、密码通信系统以及群参数生成装置 |
CN102017510B (zh) * | 2007-10-23 | 2013-06-12 | 赵运磊 | 自封闭联合知识证明和Diffie-Hellman密钥交换方法与结构 |
GB0803320D0 (en) * | 2008-02-22 | 2008-04-02 | Cambridge Silicon Radio Ltd | Protecting against security attack |
JP2010164904A (ja) * | 2009-01-19 | 2010-07-29 | Fujitsu Ltd | 楕円曲線演算処理装置、楕円曲線演算処理プログラム及び方法 |
US8510393B2 (en) | 2009-12-21 | 2013-08-13 | International Business Machines Corporation | E-mail awareness enhancement |
US8634533B2 (en) | 2010-11-11 | 2014-01-21 | At&T Intellectual Property I, L.P. | Directed notifications |
FR3001315B1 (fr) * | 2013-01-18 | 2016-05-06 | Inside Secure | Procede de cryptographie comprenant une operation de multiplication par un scalaire ou une exponentiation |
US9584320B1 (en) * | 2014-12-23 | 2017-02-28 | EMC IP Holding Company LLC | Blinding function in elliptic curve cryptography |
-
2016
- 2016-05-03 US US15/145,428 patent/US10129026B2/en active Active
-
2017
- 2017-02-14 CN CN202210517133.0A patent/CN114866238A/zh active Pending
- 2017-02-14 KR KR1020187032502A patent/KR20190006490A/ko not_active Application Discontinuation
- 2017-02-14 CA CA3020828A patent/CA3020828C/en active Active
- 2017-02-14 CN CN201780027865.9A patent/CN109074759B/zh active Active
- 2017-02-14 WO PCT/CA2017/050175 patent/WO2017190223A1/en unknown
- 2017-02-14 EP EP17792314.1A patent/EP3430607B1/en active Active
-
2018
- 2018-10-19 US US16/164,965 patent/US10841092B2/en active Active
-
2020
- 2020-10-13 US US17/069,297 patent/US11424924B2/en active Active
-
2022
- 2022-07-12 US US17/862,791 patent/US11616648B2/en active Active
-
2023
- 2023-02-27 US US18/114,310 patent/US11902440B2/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1805929B1 (en) * | 2004-10-29 | 2010-08-11 | Thomson Licensing | Secure authenticated channel |
CN101099328A (zh) * | 2004-11-11 | 2008-01-02 | 塞尔蒂卡姆公司 | 定制的静态Diffie-Helman群 |
CN101489226A (zh) * | 2009-02-24 | 2009-07-22 | 东南大学 | 一种基于椭圆曲线的无线局域网切换认证方法 |
CN101541001A (zh) * | 2009-04-28 | 2009-09-23 | 刘建 | 一种基密钥的更新方法及系统 |
CN102098157A (zh) * | 2009-12-10 | 2011-06-15 | 塔塔咨询服务有限公司 | 一种基于无证书公共密钥基础结构用于加强客户/服务器通讯协议安全性的系统和方法 |
US20120023336A1 (en) * | 2009-12-10 | 2012-01-26 | Vijayarangan Natarajan | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure |
CN101808319A (zh) * | 2010-03-16 | 2010-08-18 | 东南大学 | 一种保护移动锚点和移动节点通信安全的方法 |
CN103326852A (zh) * | 2013-06-20 | 2013-09-25 | 武汉大学 | 一种量子计算环境下的共享密钥建立方法 |
Non-Patent Citations (2)
Title |
---|
DANIEL R. L. BROWN: "Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication", 《INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH》 * |
JUNG HEE CHEON: "Security analysis of the strong Diffie-Hellman problem", 《SPRINGER-VERLAG BERLIN HEIDELBERG 2006》 * |
Also Published As
Publication number | Publication date |
---|---|
US20230224157A1 (en) | 2023-07-13 |
US20200186345A1 (en) | 2020-06-11 |
WO2017190223A1 (en) | 2017-11-09 |
US11616648B2 (en) | 2023-03-28 |
US11424924B2 (en) | 2022-08-23 |
US10129026B2 (en) | 2018-11-13 |
CN114866238A (zh) | 2022-08-05 |
US20170324556A1 (en) | 2017-11-09 |
CA3020828A1 (en) | 2017-11-09 |
CN109074759B (zh) | 2022-04-26 |
US11902440B2 (en) | 2024-02-13 |
EP3430607A4 (en) | 2020-01-22 |
EP3430607B1 (en) | 2023-04-05 |
KR20190006490A (ko) | 2019-01-18 |
EP3430607A1 (en) | 2019-01-23 |
US10841092B2 (en) | 2020-11-17 |
CA3020828C (en) | 2024-06-18 |
US20210028937A1 (en) | 2021-01-28 |
US20220345308A1 (en) | 2022-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mayer | ECDSA security in bitcoin and ethereum: a research survey | |
US7844051B2 (en) | Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption | |
US7961874B2 (en) | XZ-elliptic curve cryptography with secret key embedding | |
US11902440B2 (en) | Method and system for Cheon resistant static Diffie-Hellman security | |
Gayoso Martínez et al. | Secure elliptic curves in cryptography | |
Ahmadi et al. | Error Detection Schemes for τ NAF Conversion within Koblitz Curves Benchmarked on Various ARM Processors | |
Gebregiyorgis | Algorithms for the Elliptic Curve Discrete Logarithm Problem and the Approximate Common Divisor Problem | |
Banoth et al. | Mathematical Foundation for Classical and Modern Cryptography | |
US20240223368A1 (en) | A system and a method for performing operations | |
Gebregiyorgis | Algorithms for the elliptic curve discrete logarithm and the approximate common divisor problem | |
Xu et al. | Cryptography on elliptic curves over p-adic number fields | |
Emmanuel et al. | Safety Measures Using Sextic Curve Cryptography | |
Severns | AN EXPOSITION OF ELLIPTIC CURVE CRYPTOGRAPHY | |
Bartzia | A formalization of elliptic curves for cryptography | |
Guo et al. | Foundations of Group-Based Cryptography | |
JP4904981B2 (ja) | 公開鍵暗号システム構築方法、暗号演算方法、および情報処理装置、並びにコンピュータ・プログラム | |
CN114143005A (zh) | 一种Tate双线性对及其变体的加速方法 | |
Meng et al. | Curves For the Elliptic Curve Cryptosystem | |
Austrin | Efficient Arithmetic in Finite Fields of Small, Odd Characteristic | |
Suchánek | Analysis of standard elliptic curves | |
Rupp et al. | Sufficient Conditions for the Computational Intractability of Generic Group Problems | |
MOREIRA | ELLIPTIC CURVES AND CRYPTOGRAPHY | |
Alrefai | On Efficient Polynomial Multiplication and Its Impact on Curve based Cryptosystems | |
Ivancic et al. | An Interoperability Consideration in Selecting Domain Parameters for Elliptic Curve Cryptography | |
Belding | The Discrete Logarithm Problem on the p-torsion Subgroup of Elliptic Curves |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20191104 Address after: Ontario, Canada Applicant after: BlackBerry Ltd. Address before: Ontario, Canada Applicant before: Seteton |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240523 Address after: Illinois Patentee after: Ot patent trusteeship Co.,Ltd. Country or region after: U.S.A. Address before: Voight, Ontario, Canada Patentee before: BlackBerry Ltd. Country or region before: Canada |
|
TR01 | Transfer of patent right |
Effective date of registration: 20240702 Address after: Ai Erlandubailin Patentee after: Maliki Innovation Co.,Ltd. Country or region after: Ireland Address before: Illinois Patentee before: Ot patent trusteeship Co.,Ltd. Country or region before: U.S.A. |