CN1723654B - 零知识协议的有效执行 - Google Patents
零知识协议的有效执行 Download PDFInfo
- Publication number
- CN1723654B CN1723654B CN2003801055016A CN200380105501A CN1723654B CN 1723654 B CN1723654 B CN 1723654B CN 2003801055016 A CN2003801055016 A CN 2003801055016A CN 200380105501 A CN200380105501 A CN 200380105501A CN 1723654 B CN1723654 B CN 1723654B
- Authority
- CN
- China
- Prior art keywords
- montgomery
- prover
- value
- password
- verifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0228760.5 | 2002-12-10 | ||
GBGB0228760.5A GB0228760D0 (en) | 2002-12-10 | 2002-12-10 | Efficient implementation of zero knowledge protocols |
PCT/IB2003/005335 WO2004054168A1 (en) | 2002-12-10 | 2003-11-21 | Efficient implementation of zero knowledge protocols |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1723654A CN1723654A (zh) | 2006-01-18 |
CN1723654B true CN1723654B (zh) | 2010-10-06 |
Family
ID=9949405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2003801055016A Expired - Fee Related CN1723654B (zh) | 2002-12-10 | 2003-11-21 | 零知识协议的有效执行 |
Country Status (7)
Country | Link |
---|---|
US (1) | US7555646B2 (zh) |
EP (1) | EP1573957A1 (zh) |
JP (1) | JP2006510265A (zh) |
CN (1) | CN1723654B (zh) |
AU (1) | AU2003280132A1 (zh) |
GB (1) | GB0228760D0 (zh) |
WO (1) | WO2004054168A1 (zh) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2880149B1 (fr) * | 2004-12-23 | 2007-03-30 | Oberthur Card Syst Sa | Procede de traitement de donnees et dispositif associe |
WO2007007229A1 (en) * | 2005-07-07 | 2007-01-18 | Koninklijke Philips Electronics N.V. | Method, apparatus and system for verifying authenticity of an object |
WO2007006798A1 (fr) * | 2005-07-13 | 2007-01-18 | Gemplus | Procede et systeme d'authentification de puces electroniques |
US20110271109A1 (en) * | 2010-05-01 | 2011-11-03 | Tor Anumana, Inc. | Systems and methods of remote device authentication |
US9425966B1 (en) * | 2013-03-14 | 2016-08-23 | Amazon Technologies, Inc. | Security mechanism evaluation service |
US9930523B2 (en) * | 2014-03-11 | 2018-03-27 | Ecole Polytechnique Federale De Lausanne (Epfl) | Method and device for proving his identity |
US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
US11245528B1 (en) | 2018-11-19 | 2022-02-08 | Protocol Labs, Inc. | Protocols for decentralized networks |
US10708071B1 (en) | 2018-07-12 | 2020-07-07 | Protocol Labs, Inc. | Consensus protocols in distributed computing systems |
US11570001B1 (en) * | 2018-07-12 | 2023-01-31 | Protocol Labs, Inc. | Protocols for decentralized networks |
US11546161B2 (en) * | 2020-02-21 | 2023-01-03 | Hong Kong Applied Science and Technology Research Institute Company Limited | Zero knowledge proof hardware accelerator and the method thereof |
JPWO2022009388A1 (zh) | 2020-07-09 | 2022-01-13 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0578059A1 (en) * | 1992-06-30 | 1994-01-12 | THOMSON multimedia | Method for executing number-theoretic cryptographic and/or error-correcting protocols |
CN1204088A (zh) * | 1997-05-28 | 1999-01-06 | 西门子公司 | 保护软件的计算机系统和一种保护软件的方法 |
US5987138A (en) * | 1996-04-09 | 1999-11-16 | France Telecom | Identification and/or signature process |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4748668A (en) * | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
US7165181B2 (en) * | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
FR2880149B1 (fr) * | 2004-12-23 | 2007-03-30 | Oberthur Card Syst Sa | Procede de traitement de donnees et dispositif associe |
US7607019B2 (en) * | 2005-02-03 | 2009-10-20 | Apple Inc. | Small memory footprint fast elliptic encryption |
-
2002
- 2002-12-10 GB GBGB0228760.5A patent/GB0228760D0/en not_active Ceased
-
2003
- 2003-11-21 CN CN2003801055016A patent/CN1723654B/zh not_active Expired - Fee Related
- 2003-11-21 EP EP03772508A patent/EP1573957A1/en not_active Ceased
- 2003-11-21 US US10/538,449 patent/US7555646B2/en not_active Expired - Fee Related
- 2003-11-21 WO PCT/IB2003/005335 patent/WO2004054168A1/en active Application Filing
- 2003-11-21 AU AU2003280132A patent/AU2003280132A1/en not_active Abandoned
- 2003-11-21 JP JP2004558896A patent/JP2006510265A/ja not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0578059A1 (en) * | 1992-06-30 | 1994-01-12 | THOMSON multimedia | Method for executing number-theoretic cryptographic and/or error-correcting protocols |
US5987138A (en) * | 1996-04-09 | 1999-11-16 | France Telecom | Identification and/or signature process |
CN1204088A (zh) * | 1997-05-28 | 1999-01-06 | 西门子公司 | 保护软件的计算机系统和一种保护软件的方法 |
Non-Patent Citations (1)
Title |
---|
CN 1204088 A,全文. |
Also Published As
Publication number | Publication date |
---|---|
AU2003280132A1 (en) | 2004-06-30 |
GB0228760D0 (en) | 2003-01-15 |
CN1723654A (zh) | 2006-01-18 |
JP2006510265A (ja) | 2006-03-23 |
US7555646B2 (en) | 2009-06-30 |
WO2004054168A1 (en) | 2004-06-24 |
EP1573957A1 (en) | 2005-09-14 |
US20060112273A1 (en) | 2006-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun | An efficient remote use authentication scheme using smart cards | |
CN101032117B (zh) | 基于多项式的认证方法、系统和用于示证者设备的方法 | |
EP0482233B1 (en) | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction | |
US8402264B2 (en) | Method for securing an interaction between nodes and related nodes | |
US8661240B2 (en) | Joint encryption of data | |
US5475763A (en) | Method of deriving a per-message signature for a DSS or El Gamal encryption system | |
EP0661845B1 (en) | System and method for message authentication in a non-malleable public-key cryptosystem | |
CN1723654B (zh) | 零知识协议的有效执行 | |
CN101383707A (zh) | 一种轻量级认证系统及其关键算法 | |
KR101485747B1 (ko) | 노드를 구성하는 방법, 관련 노드 및 구성 서버 | |
Bai et al. | Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card | |
US7228418B1 (en) | Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems | |
Park et al. | Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment | |
WO2002009348A2 (en) | Ring-based digital signature and authentication method and apparatus | |
Hwang et al. | An efficient user identification scheme based on ID-based cryptosystem | |
Brickell et al. | Interactive identification and digital signatures | |
CN103155480A (zh) | 认证装置、认证方法和程序 | |
Das | Strong security and privacy of RFID system for internet of things infrastructure | |
US7404078B2 (en) | Methods and apparatus for private certificates in public key cryptography | |
Anshul et al. | A ZKP-based identification scheme for base nodes in wireless sensor networks | |
Hajný | Anonymous Authentication for Smartcards. | |
Hsu et al. | A new efficient and secure secret reconstruction scheme (SSRS) with verifiable shares based on a symmetric bivariate polynomial | |
Martınez et al. | An elliptic curve and zero knowledge based forward secure RFID protocol | |
Sarier | A new approach for biometric template storage and remote authentication | |
JP2570848B2 (ja) | 暗号通信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: NXP CO., LTD. Free format text: FORMER OWNER: KONINKLIJKE PHILIPS ELECTRONICS N.V. Effective date: 20070907 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20070907 Address after: Holland Ian Deho Finn Applicant after: Koninkl Philips Electronics NV Address before: Holland Ian Deho Finn Applicant before: Koninklijke Philips Electronics N.V. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101006 Termination date: 20151121 |
|
EXPY | Termination of patent right or utility model |