CN110445621B - 一种可信标识的应用方法及系统 - Google Patents
一种可信标识的应用方法及系统 Download PDFInfo
- Publication number
- CN110445621B CN110445621B CN201910920961.7A CN201910920961A CN110445621B CN 110445621 B CN110445621 B CN 110445621B CN 201910920961 A CN201910920961 A CN 201910920961A CN 110445621 B CN110445621 B CN 110445621B
- Authority
- CN
- China
- Prior art keywords
- user
- key
- identifier
- trusted
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910920961.7A CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910920961.7A CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445621A CN110445621A (zh) | 2019-11-12 |
CN110445621B true CN110445621B (zh) | 2019-12-27 |
Family
ID=68440610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910920961.7A Active CN110445621B (zh) | 2019-09-27 | 2019-09-27 | 一种可信标识的应用方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110445621B (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112688784B (zh) * | 2020-12-23 | 2023-04-11 | 中科美络科技股份有限公司 | 一种数字签名、验证方法、装置及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566127A (zh) * | 2017-09-30 | 2018-01-09 | 北京迪曼森科技有限公司 | 一种iki可信数字标识的生成方法及使用方法 |
CN108471351A (zh) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | 基于无证书聚合签名的车联网认证与密钥协商方法 |
CN109005029B (zh) * | 2018-06-25 | 2019-08-16 | 北京迪曼森科技有限公司 | 可信应用标识的生成方法和系统、应用方法和应用端设备 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8694771B2 (en) * | 2012-02-10 | 2014-04-08 | Connect In Private Panama Corp. | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption |
CN108650080B (zh) * | 2018-03-27 | 2019-11-19 | 北京迪曼森科技有限公司 | 一种标识密钥管理方法和系统 |
-
2019
- 2019-09-27 CN CN201910920961.7A patent/CN110445621B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566127A (zh) * | 2017-09-30 | 2018-01-09 | 北京迪曼森科技有限公司 | 一种iki可信数字标识的生成方法及使用方法 |
CN109005029B (zh) * | 2018-06-25 | 2019-08-16 | 北京迪曼森科技有限公司 | 可信应用标识的生成方法和系统、应用方法和应用端设备 |
CN108471351A (zh) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | 基于无证书聚合签名的车联网认证与密钥协商方法 |
Also Published As
Publication number | Publication date |
---|---|
CN110445621A (zh) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989053B (zh) | 一种基于椭圆曲线的无证书公钥密码体制实现方法 | |
CN108173639B (zh) | 一种基于sm9签名算法的两方合作签名方法 | |
US8464058B1 (en) | Password-based cryptographic method and apparatus | |
US8223970B2 (en) | Message deciphering method, system and article | |
CN108667626A (zh) | 安全的两方协作sm2签名方法 | |
US9705683B2 (en) | Verifiable implicit certificates | |
CN108989054B (zh) | 一种密码系统及数字签名方法 | |
US11223486B2 (en) | Digital signature method, device, and system | |
US20060215837A1 (en) | Method and apparatus for generating an identifier-based public/private key pair | |
CN104539423A (zh) | 一种无双线性对运算的无证书公钥密码体制的实现方法 | |
CN110113150B (zh) | 基于无证书环境的可否认认证的加密方法和系统 | |
CN107425971B (zh) | 无证书的数据加/解密方法和装置、终端 | |
Chen et al. | Public-key quantum digital signature scheme with one-time pad private-key | |
CN110830236A (zh) | 基于全域哈希的身份基加密方法 | |
CN104767612A (zh) | 一种从无证书环境到公钥基础设施环境的签密方法 | |
GB2390515A (en) | Verifying An Association Between Two Parties | |
CN112104453B (zh) | 一种基于数字证书的抗量子计算数字签名系统及签名方法 | |
CN110601859B (zh) | 一种基于25519椭圆曲线的无证书公钥密码签名方法 | |
KR20030008183A (ko) | 겹선형쌍을 이용한 개인식별정보 기반의 원형서명 방법 | |
US20140321642A1 (en) | Group encryption methods and devices | |
CN104767611A (zh) | 一种从公钥基础设施环境到无证书环境的签密方法 | |
GB2421408A (en) | Generating an Identifier-Based Public / Private Key Pair from a Multi-Component Signature | |
Kumar et al. | An efficient implementation of digital signature algorithm with SRNN public key cryptography | |
CN110445621B (zh) | 一种可信标识的应用方法及系统 | |
CN102299795A (zh) | 基于身份的签密方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210425 Address after: Room 310, building 1, 2966 Jinke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee after: Airy Technology (Shanghai) Co.,Ltd. Address before: 5 / F, No.1, Lane 999, Dangui Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area Patentee before: Wago Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210910 Address after: 518133 B09, building 2, Haibin market complex, Zifang Road, district 47, Fanshen community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province Patentee after: Shenzhen coolian Digital Communication Co.,Ltd. Address before: Room 310, building 1, 2966 Jinke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee before: Airy Technology (Shanghai) Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220406 Address after: 201203 unit 01, floor 1, building 4, No. 666 shengxia road and No. 122 Yindong Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Airy Technology (Shanghai) Co.,Ltd. Address before: 518133 B09, building 2, Haibin market complex, Zifang Road, district 47, Fanshen community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province Patentee before: Shenzhen coolian Digital Communication Co.,Ltd. |
|
TR01 | Transfer of patent right |