CO5630049A1 - Uso de isogenos para el diseño de criptosistemas - Google Patents

Uso de isogenos para el diseño de criptosistemas

Info

Publication number
CO5630049A1
CO5630049A1 CO04094973A CO04094973A CO5630049A1 CO 5630049 A1 CO5630049 A1 CO 5630049A1 CO 04094973 A CO04094973 A CO 04094973A CO 04094973 A CO04094973 A CO 04094973A CO 5630049 A1 CO5630049 A1 CO 5630049A1
Authority
CO
Colombia
Prior art keywords
isogen
generation
cited
key corresponding
encryption
Prior art date
Application number
CO04094973A
Other languages
English (en)
Inventor
David Y Jao
Venkatesan Ramarathnam
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CO5630049A1 publication Critical patent/CO5630049A1/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3257Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Dental Preparations (AREA)
  • Glass Compositions (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Complex Calculations (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Developing Agents For Electrophotography (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)
  • Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)

Abstract

Un método comprende:generando un isógeno que traza una pluralidad de puntos desde una primera curva elíptica hacia una segunda curva elíptica;publicando una clave pública que corresponde al isógeno;encriptando un mensaje que usa una clave de encriptación que corresponde al isógeno; yque descifra el mensaje encriptado que usa una clave de descencriptación correspondiendo al isógeno. Un método como el citado por la reivindicación 1 , en qué por lo menos una clave de encriptación o de descencriptación es una clave privada, la clave privada siendo un isógeno dual del isógeno. Un método como el citado por la reivindicación 1, en donde el isógeno se genera usando una técnica seleccionada de un grupo que comprende una generación múltiple compleja, una generación modular, una generación linealmente independiente, y combinaciones de ellas. SOLICITUDES DE PATENTES DE MODELO DE UTILIDADORDENADAS PUBLICAR EN MARZO DE 2006 IMPORTANTE:SOLICITUDES DE PATENTE DE MODELO DE UTILIDAD: A partir de la fecha de publicación de esta gaceta el solicitante cuenta con un plazo de tres (3) meses para pedir que se practique el examen de patentabilidad de la solicitud, anexando el recibo de pago de la tasa correspondiente a tal fin. De no procederse así la solicitud caerá en abandono (Arts. 85 y 44 de la Decisión 486).
CO04094973A 2003-11-03 2004-09-23 Uso de isogenos para el diseño de criptosistemas CO5630049A1 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US51714203P 2003-11-03 2003-11-03
US10/816,083 US7499544B2 (en) 2003-11-03 2004-03-31 Use of isogenies for design of cryptosystems

Publications (1)

Publication Number Publication Date
CO5630049A1 true CO5630049A1 (es) 2006-04-28

Family

ID=34426337

Family Applications (1)

Application Number Title Priority Date Filing Date
CO04094973A CO5630049A1 (es) 2003-11-03 2004-09-23 Uso de isogenos para el diseño de criptosistemas

Country Status (20)

Country Link
US (1) US7499544B2 (es)
EP (1) EP1528705B1 (es)
JP (1) JP4809598B2 (es)
KR (1) KR101098701B1 (es)
CN (1) CN100583755C (es)
AT (1) ATE429098T1 (es)
AU (1) AU2004218638B2 (es)
BR (1) BRPI0404122A (es)
CA (1) CA2483486C (es)
CO (1) CO5630049A1 (es)
DE (1) DE602004020565D1 (es)
HK (1) HK1085585A1 (es)
IL (1) IL164071A0 (es)
MX (1) MXPA04010155A (es)
MY (1) MY165770A (es)
NO (1) NO20044028L (es)
NZ (1) NZ535698A (es)
RU (1) RU2376651C2 (es)
SG (1) SG111191A1 (es)
TW (1) TWI360990B (es)

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4842276B2 (ja) 2004-11-11 2011-12-21 サーティコム コーポレーション 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用
US7594261B2 (en) * 2005-02-08 2009-09-22 Microsoft Corporation Cryptographic applications of the Cartier pairing
US7680268B2 (en) 2005-03-15 2010-03-16 Microsoft Corporation Elliptic curve point octupling using single instruction multiple data processing
US7702098B2 (en) 2005-03-15 2010-04-20 Microsoft Corporation Elliptic curve point octupling for weighted projective coordinates
US7617397B2 (en) 2005-04-29 2009-11-10 Microsoft Corporation Systems and methods for generation and validation of isogeny-based signatures
JP4575251B2 (ja) 2005-07-25 2010-11-04 株式会社東芝 デジタル署名生成装置、デジタル署名検証装置、デジタル署名生成方法、デジタル署名検証方法、デジタル署名生成プログラム及びデジタル署名検証プログラム
CN1980123B (zh) * 2005-11-30 2010-07-21 中国科学院研究生院 基于ibe的pki系统的实现方法及其密钥管理装置
US8180047B2 (en) * 2006-01-13 2012-05-15 Microsoft Corporation Trapdoor pairings
US8369518B2 (en) 2007-06-18 2013-02-05 Nec Corporation Electronic data encryption and encrypted data decryption system, and its method
KR101490687B1 (ko) * 2007-08-20 2015-02-06 삼성전자주식회사 홈 네트워크에서 디바이스들이 비밀 정보를 공유하는 방법및 이를 위한 장치
JP5079024B2 (ja) * 2008-02-20 2012-11-21 三菱電機株式会社 検証装置及び暗号文復号装置及び署名検証装置及び認証装置及び暗号システム及びコンピュータプログラム
US8037327B2 (en) * 2008-03-31 2011-10-11 Agilent Technologies, Inc. System and method for improving dynamic response in a power supply
JP5360836B2 (ja) * 2008-08-29 2013-12-04 国立大学法人 岡山大学 ペアリング演算装置、ペアリング演算方法、及びペアリング演算プログラム
US8250367B2 (en) * 2008-09-30 2012-08-21 Microsoft Corporation Cryptographic applications of efficiently evaluating large degree isogenies
US20100100947A1 (en) * 2008-10-21 2010-04-22 Apple Inc. Scheme for authenticating without password exchange
JP5268066B2 (ja) * 2009-01-16 2013-08-21 日本電信電話株式会社 変換演算装置、その方法、プログラム及び記録媒体
US8510558B2 (en) 2009-02-17 2013-08-13 Alcatel Lucent Identity based authenticated key agreement protocol
CN101800640B (zh) * 2009-11-10 2012-09-05 浙江工业大学 基于Web Service的IBE密钥管理系统
US8634563B2 (en) 2010-12-17 2014-01-21 Microsoft Corporation Attribute based encryption using lattices
JP5693206B2 (ja) * 2010-12-22 2015-04-01 三菱電機株式会社 暗号処理システム、鍵生成装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム
RU2494553C2 (ru) * 2011-05-03 2013-09-27 ЗАО Институт инфокоммуникационных технологий Способ защиты информации
RU2450457C1 (ru) * 2011-05-20 2012-05-10 Государственное образовательное учреждение высшего профессионального образования Марийский государственный технический университет Способ шифрования
EP2813029B1 (en) * 2012-02-09 2020-12-02 Irdeto B.V. System and method for generating and protecting cryptographic keys
US10148285B1 (en) 2012-07-25 2018-12-04 Erich Schmitt Abstraction and de-abstraction of a digital data stream
CN104348614B (zh) * 2013-07-24 2019-02-01 腾讯科技(深圳)有限公司 身份合法性验证的方法、装置及服务器
RU2541938C1 (ru) * 2013-11-20 2015-02-20 федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный политехнический университет" (ФГАОУ ВО "СПбПУ") Способ шифрования с защитой от квантовых атак на основе циклов функций вебера
US10795858B1 (en) 2014-02-18 2020-10-06 Erich Schmitt Universal abstraction and de-abstraction of a digital data stream
US12143468B2 (en) * 2015-12-20 2024-11-12 Lcip Jv Cryptographic computer machines with novel switching devices
JP6614979B2 (ja) * 2016-01-15 2019-12-04 三菱電機株式会社 暗号装置、暗号方法及び暗号プログラム
EP3364598B1 (en) 2016-02-23 2020-10-14 Nchain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
BR112018016819A2 (pt) 2016-02-23 2018-12-26 Nchain Holdings Ltd método e sistemas para proteger um recurso digital controlado utilizando uma tabela de dispersão e livro-razão distribuídos e um blockchain
EP4235552A3 (en) 2016-02-23 2023-09-13 nChain Licensing AG Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain
AU2017222469A1 (en) 2016-02-23 2018-08-30 nChain Holdings Limited System and method for controlling asset-related actions via a blockchain
BR112018016826A2 (pt) 2016-02-23 2018-12-26 Nchain Holdings Ltd método e sistema de controle implementados por blockchain
EP3257191B1 (en) 2016-02-23 2018-04-11 Nchain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
GB2561725A (en) 2016-02-23 2018-10-24 Nchain Holdings Ltd Blockchain-implemented method for control and distribution of digital content
CA3009731C (en) 2016-02-23 2024-04-09 nChain Holdings Limited Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
CN114282926A (zh) 2016-02-23 2022-04-05 区块链控股有限公司 用于从区块链中安全提取数据的密码方法和系统
AU2017223126B2 (en) 2016-02-23 2022-12-15 nChain Holdings Limited Blockchain-based exchange with tokenisation
KR101999188B1 (ko) * 2016-02-23 2019-07-11 엔체인 홀딩스 리미티드 비밀 공유를 위한 타원 곡선 암호를 사용하는 개인용 장치 보안
GB2561726A (en) 2016-02-23 2018-10-24 Nchain Holdings Ltd Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system
AU2017222468B2 (en) 2016-02-23 2023-01-12 nChain Holdings Limited Agent-based turing complete transactions integrating feedback within a blockchain system
CN105915520B (zh) * 2016-04-18 2019-02-12 深圳大学 基于公钥可搜索加密的文件存储、搜索方法及存储系统
JP2017212699A (ja) * 2016-05-27 2017-11-30 三菱電機株式会社 暗号化装置、復号装置及び暗号システム
US10673631B2 (en) * 2016-11-07 2020-06-02 Infosec Global Inc. Elliptic curve isogeny-based cryptographic scheme
EP3367608A1 (en) * 2017-02-28 2018-08-29 Koninklijke Philips N.V. Elliptic curve isogeny based key agreement protocol
EP3379766B1 (en) * 2017-03-20 2019-06-26 Huawei Technologies Co., Ltd. A wireless communication device for communication in a wireless communication network
US11146397B2 (en) * 2017-10-31 2021-10-12 Micro Focus Llc Encoding abelian variety-based ciphertext with metadata
CN108536651B (zh) * 2018-04-19 2022-04-05 武汉轻工大学 生成可逆模m矩阵的方法和装置
WO2019208484A1 (ja) * 2018-04-25 2019-10-31 日本電信電話株式会社 秘密集約総和システム、秘密計算装置、秘密集約総和方法、およびプログラム
AU2019354159B2 (en) * 2018-10-04 2022-01-20 Nippon Telegraph And Telephone Corporation Secret sigmoid function calculation system, secret logistic regression calculation system, secret sigmoid function calculation apparatus, secret logistic regression calculation apparatus, secret sigmoid function calculation method, secret logistic regression calculation method, and program
KR102184189B1 (ko) * 2018-11-19 2020-11-27 주식회사 엔에스에이치씨 꼬인 에드워즈 곡선에 대한 4차 아이소제니 계산 방법
KR102184188B1 (ko) * 2018-11-19 2020-11-27 주식회사 엔에스에이치씨 꼬인 에드워즈 곡선에 대한 3차 아이소제니 계산 방법
US11764940B2 (en) 2019-01-10 2023-09-19 Duality Technologies, Inc. Secure search of secret data in a semi-trusted environment using homomorphic encryption
US11032074B2 (en) * 2019-02-11 2021-06-08 Pqsecure Technologies, Llc Cryptosystem and method using isogeny-based computations to reduce a memory footprint
WO2020242614A1 (en) 2019-05-30 2020-12-03 Kim Bong Mann Quantum safe cryptography and advanced encryption and key exchange (aeke) method for symmetric key encryption/exchange
US10880278B1 (en) 2019-10-03 2020-12-29 ISARA Corporation Broadcasting in supersingular isogeny-based cryptosystems
WO2022019886A1 (en) * 2020-07-20 2022-01-27 Pqsecure Technologies, Llc An architecture and method for hybrid isogeny-based cryptosystems
US20240184699A1 (en) * 2021-05-25 2024-06-06 Pqsecure Technologies, Llc An efficient and scalable architecture and method for isogeny-based cryptosystems
CN113254985B (zh) * 2021-07-15 2021-12-21 北京信安世纪科技股份有限公司 数据加密方法、数据处理方法、数据解密方法及电子设备
US11483151B1 (en) * 2021-07-16 2022-10-25 Pqsecure Technologies, Llc Method and system for computing large-degree isogenies with an odd degree
US20240396735A1 (en) * 2021-09-30 2024-11-28 Visa International Service Association Round optimal oblivious transfers from isogenies
EP4311161A1 (en) * 2022-07-18 2024-01-24 GMV Soluciones Globales Internet, S.A.U. Method and entity for generating a private key in an identity-based cryptosystem without key escrow
WO2024224646A1 (ja) * 2023-04-28 2024-10-31 日本電信電話株式会社 電子署名システム、電子署名方法及びプログラム

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (ja) * 1988-07-23 1990-02-02 Nintendo Co Ltd 通信制御装置
US5497423A (en) 1993-06-18 1996-03-05 Matsushita Electric Industrial Co., Ltd. Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
AU758621B2 (en) 1997-12-05 2003-03-27 Icesoft Technologies, Inc. Transformation methods for optimizing elliptic curve cryptographic computations
US6212277B1 (en) 1998-03-05 2001-04-03 Matsushita Electric Industrial Co., Ltd. Elliptic curve transformation device, utilization device and utilization system
EP1112637A1 (en) 1998-09-08 2001-07-04 Citibank, N.A. Elliptic curve cryptosystems for low memory devices
US6816594B1 (en) 1999-09-08 2004-11-09 Hitachi, Ltd. Elliptic curve generating method and device, elliptic encryption system and recording medium
DE60236094D1 (de) * 2001-08-13 2010-06-02 Univ R Systeme und Verfahren zur Verschlüsselung auf Identitätsbasis und damit zusammenhängende kryptografische Techniken
US7209555B2 (en) * 2001-10-25 2007-04-24 Matsushita Electric Industrial Co., Ltd. Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device
US7215780B2 (en) 2001-12-31 2007-05-08 Certicom Corp. Method and apparatus for elliptic curve scalar multiplication

Also Published As

Publication number Publication date
JP2005141200A (ja) 2005-06-02
KR20050042441A (ko) 2005-05-09
TW200525979A (en) 2005-08-01
RU2376651C2 (ru) 2009-12-20
TWI360990B (en) 2012-03-21
CA2483486C (en) 2013-12-24
NZ535698A (en) 2006-02-24
EP1528705B1 (en) 2009-04-15
DE602004020565D1 (de) 2009-05-28
HK1085585A1 (en) 2006-08-25
CN100583755C (zh) 2010-01-20
US20050094806A1 (en) 2005-05-05
NO20044028L (no) 2005-05-04
EP1528705A1 (en) 2005-05-04
MXPA04010155A (es) 2005-05-17
ATE429098T1 (de) 2009-05-15
CN1614922A (zh) 2005-05-11
BRPI0404122A (pt) 2005-06-21
RU2004132057A (ru) 2006-04-10
CA2483486A1 (en) 2005-05-03
MY165770A (en) 2018-04-23
AU2004218638B2 (en) 2009-07-30
AU2004218638A1 (en) 2005-05-19
SG111191A1 (en) 2005-05-30
KR101098701B1 (ko) 2011-12-23
US7499544B2 (en) 2009-03-03
IL164071A0 (en) 2005-12-18
JP4809598B2 (ja) 2011-11-09

Similar Documents

Publication Publication Date Title
CO5630049A1 (es) Uso de isogenos para el diseño de criptosistemas
Singh et al. A performance analysis of DES and RSA cryptography
GB2492698A (en) An efficient homomorphic encryption scheme for bilinear forms
WO2008148784A3 (fr) Procedes et dispositifs cryptographiques de generation pseudo-aleatoire de chiffrement de donnees et de hachage cryptographique d'un message
ATE523017T1 (de) Schlüsselvereinbarungs- und transportprotokoll
JP2013047822A5 (es)
BR0316473A (pt) Método para gerar um código de fluxo utilizando múltiplas chaves
CN107359979A (zh) 基于截断多项式的对称全同态加密方法
Hales The NSA back door to NIST
CN103746811A (zh) 从身份公钥系统到证书公钥系统的匿名签密方法
Großschädl TinySA: A security architecture for wireless sensor networks
AR031413A1 (es) Certificado de transacciones.
Sharma et al. Modified elgamal cryptosystem algorithm (MECA)
Deepa et al. An enhanced DNA structure for one-time pad together with graph labeling techniques
Fu et al. An efficient implementation of RSA digital signature algorithm
CN107276759A (zh) 一种高效的门限加密方案
Leelavathi et al. Implementation of public key crypto processor with probabilistic encryption on FPGA for nodes in wireless sensor networks
JP4914377B2 (ja) 署名生成装置、署名検証装置、署名生成検証システム、それらの方法及びプログラム
JP3894919B2 (ja) 電子署名方法とそのプログラム及び装置
Hecht PQC: R-propping of a simple oblivious transfer
JP2005165290A5 (es)
Mittal et al. Understanding integer-based fully homomorphic encryption
John et al. Comparative analysis of discrete logarithm and RSA Algorithm in data cryptography
KR20120097729A (ko) 소수의 원시근을 이용한 암호화 방법
KR20230041403A (ko) 암호화 장치 및 이를 이용한 암호화 방법

Legal Events

Date Code Title Description
FC Application refused