CN110445621A - 一种可信标识的应用方法及系统 - Google Patents
一种可信标识的应用方法及系统 Download PDFInfo
- Publication number
- CN110445621A CN110445621A CN201910920961.7A CN201910920961A CN110445621A CN 110445621 A CN110445621 A CN 110445621A CN 201910920961 A CN201910920961 A CN 201910920961A CN 110445621 A CN110445621 A CN 110445621A
- Authority
- CN
- China
- Prior art keywords
- user
- key
- trusted identities
- root
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910920961.7A CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910920961.7A CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445621A true CN110445621A (zh) | 2019-11-12 |
CN110445621B CN110445621B (zh) | 2019-12-27 |
Family
ID=68440610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910920961.7A Active CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110445621B (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112688784A (zh) * | 2020-12-23 | 2021-04-20 | 安徽中科美络信息技术有限公司 | 一种数字签名、验证方法、装置及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130212377A1 (en) * | 2012-02-10 | 2013-08-15 | Behzad Malek | Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption |
CN107566127A (zh) * | 2017-09-30 | 2018-01-09 | 北京迪曼森科技有限公司 | 一种iki可信数字标识的生成方法及使用方法 |
CN108471351A (zh) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | 基于无证书聚合签名的车联网认证与密钥协商方法 |
CN108650080A (zh) * | 2018-03-27 | 2018-10-12 | 北京迪曼森科技有限公司 | 一种密钥管理方法和系统 |
CN109005029B (zh) * | 2018-06-25 | 2019-08-16 | 北京迪曼森科技有限公司 | 可信应用标识的生成方法和系统、应用方法和应用端设备 |
-
2019
- 2019-09-27 CN CN201910920961.7A patent/CN110445621B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130212377A1 (en) * | 2012-02-10 | 2013-08-15 | Behzad Malek | Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption |
CN107566127A (zh) * | 2017-09-30 | 2018-01-09 | 北京迪曼森科技有限公司 | 一种iki可信数字标识的生成方法及使用方法 |
CN108650080A (zh) * | 2018-03-27 | 2018-10-12 | 北京迪曼森科技有限公司 | 一种密钥管理方法和系统 |
CN109005029B (zh) * | 2018-06-25 | 2019-08-16 | 北京迪曼森科技有限公司 | 可信应用标识的生成方法和系统、应用方法和应用端设备 |
CN108471351A (zh) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | 基于无证书聚合签名的车联网认证与密钥协商方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112688784A (zh) * | 2020-12-23 | 2021-04-20 | 安徽中科美络信息技术有限公司 | 一种数字签名、验证方法、装置及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN110445621B (zh) | 2019-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109559117B (zh) | 基于属性基加密的区块链合约隐私保护方法与系统 | |
CN106961336B (zh) | 一种基于sm2算法的密钥分量托管方法和系统 | |
US8223970B2 (en) | Message deciphering method, system and article | |
US9705683B2 (en) | Verifiable implicit certificates | |
CN101951388B (zh) | 一种可信计算环境中的远程证明方法 | |
CN101420300A (zh) | 双因子组合公钥生成和认证方法 | |
CN108418686A (zh) | 一种多分布式的sm9解密方法与介质及密钥生成方法 | |
CN109194523A (zh) | 隐私保护的多方诊断模型融合方法及系统、云端服务器 | |
US20130276084A1 (en) | Anonymous access to a service by means of aggregated certificates | |
CN111415718A (zh) | 一种基于区块链和条件代理重加密的电子处方共享方法 | |
CN103746811B (zh) | 从身份公钥系统到证书公钥系统的匿名签密方法 | |
CN110830236A (zh) | 基于全域哈希的身份基加密方法 | |
CN110402560B (zh) | 具有前向安全性的基于身份的认证密钥交换方案中用于计算公有会话密钥的系统和方法 | |
CN104821880A (zh) | 一种无证书广义代理签密方法 | |
CN104767612A (zh) | 一种从无证书环境到公钥基础设施环境的签密方法 | |
CN107172043B (zh) | 一种基于同态加密的智能电网用户售电方法 | |
CN105790941A (zh) | 一种基于标识的具有域划分的组合密钥生成及认证方法 | |
CN111264045B (zh) | 基于异构身份的交互系统及方法 | |
CN110380845A (zh) | 基于群组对称密钥池的量子保密通信联盟链交易方法、系统、设备 | |
CN105376064A (zh) | 一种匿名消息认证系统及其消息签名方法 | |
CN104767611A (zh) | 一种从公钥基础设施环境到无证书环境的签密方法 | |
CN103746810B (zh) | 从证书公钥系统到身份公钥系统的匿名签密方法 | |
CN106453253B (zh) | 一种高效的基于身份的匿签密方法 | |
EP3664361B1 (en) | Methods and devices for secured identity-based encryption systems with two trusted centers | |
CN108933659A (zh) | 一种智能电网的身份验证系统及验证方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210425 Address after: Room 310, building 1, 2966 Jinke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee after: Airy Technology (Shanghai) Co.,Ltd. Address before: 5 / F, No.1, Lane 999, Dangui Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area Patentee before: Wago Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210910 Address after: 518133 B09, building 2, Haibin market complex, Zifang Road, district 47, Fanshen community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province Patentee after: Shenzhen coolian Digital Communication Co.,Ltd. Address before: Room 310, building 1, 2966 Jinke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee before: Airy Technology (Shanghai) Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220406 Address after: 201203 unit 01, floor 1, building 4, No. 666 shengxia road and No. 122 Yindong Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Airy Technology (Shanghai) Co.,Ltd. Address before: 518133 B09, building 2, Haibin market complex, Zifang Road, district 47, Fanshen community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province Patentee before: Shenzhen coolian Digital Communication Co.,Ltd. |
|
TR01 | Transfer of patent right |