ES2230814T3 - Metodos y sistemas de firma de clave publica. - Google Patents
Metodos y sistemas de firma de clave publica.Info
- Publication number
- ES2230814T3 ES2230814T3 ES99401048T ES99401048T ES2230814T3 ES 2230814 T3 ES2230814 T3 ES 2230814T3 ES 99401048 T ES99401048 T ES 99401048T ES 99401048 T ES99401048 T ES 99401048T ES 2230814 T3 ES2230814 T3 ES 2230814T3
- Authority
- ES
- Spain
- Prior art keywords
- variables
- vinegar
- oil
- game
- equations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 235000021419 vinegar Nutrition 0.000 claims abstract description 116
- 239000000052 vinegar Substances 0.000 claims abstract description 116
- 230000009466 transformation Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 238000006467 substitution reaction Methods 0.000 abstract 1
- 239000011159 matrix material Substances 0.000 description 24
- 239000013598 vector Substances 0.000 description 12
- 230000008859 change Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 6
- 230000009467 reduction Effects 0.000 description 4
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000012886 linear function Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 238000000844 transformation Methods 0.000 description 2
- 230000001154 acute effect Effects 0.000 description 1
- 244000309464 bull Species 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Optimization (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- Mathematical Physics (AREA)
- Algebra (AREA)
- Complex Calculations (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP99401048A EP1049289B1 (en) | 1999-04-29 | 1999-04-29 | Public-key signature methods and systems |
| PCT/IB2000/000692 WO2000067423A1 (en) | 1999-04-29 | 2000-04-28 | Public-key signature methods and systems |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ES2230814T3 true ES2230814T3 (es) | 2005-05-01 |
Family
ID=8241961
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES99401048T Expired - Lifetime ES2230814T3 (es) | 1999-04-29 | 1999-04-29 | Metodos y sistemas de firma de clave publica. |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US7100051B1 (enExample) |
| EP (1) | EP1049289B1 (enExample) |
| JP (2) | JP4183387B2 (enExample) |
| CN (1) | CN1285191C (enExample) |
| AU (1) | AU774346B2 (enExample) |
| BR (1) | BRPI0006085B1 (enExample) |
| DE (1) | DE69920875T2 (enExample) |
| DK (1) | DK1049289T3 (enExample) |
| ES (1) | ES2230814T3 (enExample) |
| HK (1) | HK1039004B (enExample) |
| IL (1) | IL135647A (enExample) |
| WO (1) | WO2000067423A1 (enExample) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2810139B1 (fr) * | 2000-06-08 | 2002-08-23 | Bull Cp8 | Procede de securisation de la phase de pre-initialisation d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede |
| WO2002084590A1 (en) * | 2001-04-11 | 2002-10-24 | Applied Minds, Inc. | Knowledge web |
| US7844610B2 (en) * | 2003-12-12 | 2010-11-30 | Google Inc. | Delegated authority evaluation system |
| US20030195834A1 (en) * | 2002-04-10 | 2003-10-16 | Hillis W. Daniel | Automated online purchasing system |
| US20030196094A1 (en) * | 2002-04-10 | 2003-10-16 | Hillis W. Daniel | Method and apparatus for authenticating the content of a distributed database |
| US8069175B2 (en) * | 2002-04-10 | 2011-11-29 | Google Inc. | Delegating authority to evaluate content |
| US7600118B2 (en) * | 2002-09-27 | 2009-10-06 | Intel Corporation | Method and apparatus for augmenting authentication in a cryptographic system |
| US7765206B2 (en) | 2002-12-13 | 2010-07-27 | Metaweb Technologies, Inc. | Meta-Web |
| US8012025B2 (en) * | 2002-12-13 | 2011-09-06 | Applied Minds, Llc | Video game controller hub with control input reduction and combination schemes |
| US20050131918A1 (en) * | 2003-12-12 | 2005-06-16 | W. Daniel Hillis | Personalized profile for evaluating content |
| US7961876B2 (en) * | 2005-01-11 | 2011-06-14 | Jintai Ding | Method to produce new multivariate public key cryptosystems |
| CN1870499B (zh) * | 2005-01-11 | 2012-01-04 | 丁津泰 | 产生新的多变量公钥密码系统的方法 |
| WO2007057610A1 (fr) * | 2005-11-18 | 2007-05-24 | France Telecom | Systeme et procede cryptographique d'authentification ou de signature |
| FR2916317B1 (fr) * | 2007-05-15 | 2009-08-07 | Sagem Defense Securite | Protection d'execution d'un calcul cryptographique |
| CN101321059B (zh) * | 2007-06-07 | 2011-02-16 | 管海明 | 一种用于编码和译码数字消息的方法和系统 |
| FR2918525A1 (fr) | 2007-07-06 | 2009-01-09 | France Telecom | Procede asymetrique de chiffrement ou de verification de signature. |
| CN101227286B (zh) * | 2008-01-31 | 2010-04-14 | 北京飞天诚信科技有限公司 | 一种生成消息认证码的方法 |
| WO2011033642A1 (ja) * | 2009-09-17 | 2011-03-24 | 株式会社 東芝 | 署名生成装置及び署名検証装置 |
| JP2011107528A (ja) * | 2009-11-19 | 2011-06-02 | Sony Corp | 情報処理装置、鍵生成装置、署名検証装置、情報処理方法、署名生成方法、及びプログラム |
| IL205803A0 (en) | 2010-05-16 | 2010-12-30 | Yaron Sella | Collision-based signature scheme |
| IL206139A0 (en) | 2010-06-02 | 2010-12-30 | Yaron Sella | Efficient multivariate signature generation |
| IL207918A0 (en) | 2010-09-01 | 2011-01-31 | Aviad Kipnis | Attack-resistant multivariate signature scheme |
| JP5790287B2 (ja) * | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、及び記録媒体 |
| CN105359455A (zh) * | 2013-07-12 | 2016-02-24 | 皇家飞利浦有限公司 | 电子签名系统 |
| CN103457726B (zh) * | 2013-08-26 | 2016-12-28 | 华南理工大学 | 基于矩阵的多变量公钥加密方法 |
| CN103780383B (zh) * | 2014-01-13 | 2017-05-31 | 华南理工大学 | 一种基于超球面的多变量公钥签名/验证系统及方法 |
| CN104009848B (zh) * | 2014-05-26 | 2017-09-29 | 华南理工大学 | 一种混合型的多变量数字签名系统及方法 |
| CN105245343B (zh) * | 2015-09-22 | 2018-09-14 | 华南理工大学 | 一种基于多变量密码技术的在线离线签名系统及方法 |
| US11030618B1 (en) | 2016-09-30 | 2021-06-08 | Winkk, Inc. | Authentication and personal data sharing for partner services using out-of-band optical mark recognition |
| JP7322763B2 (ja) * | 2020-03-13 | 2023-08-08 | 日本電信電話株式会社 | 鍵生成装置、鍵生成方法及びプログラム |
| US12395353B2 (en) * | 2022-09-21 | 2025-08-19 | Winkk, Inc. | Authentication process with an exposed and unregistered public certificate |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NZ240019A (en) * | 1991-09-30 | 1996-04-26 | Peter John Smith | Public key encrypted communication with non-multiplicative cipher |
| US5263085A (en) | 1992-11-13 | 1993-11-16 | Yeda Research & Development Co. Ltd. | Fast signature scheme based on sequentially linearized equations |
| US5375170A (en) | 1992-11-13 | 1994-12-20 | Yeda Research & Development Co., Ltd. | Efficient signature scheme based on birational permutations |
| FR2737370B1 (fr) * | 1995-07-27 | 1997-08-22 | Bull Cp8 | Procede de communication cryptographique |
| FR2744309B1 (fr) * | 1996-01-26 | 1998-03-06 | Bull Cp8 | Procede de communicatin cryptographique asymetrique, et objet portatif associe |
| US6076163A (en) * | 1997-10-20 | 2000-06-13 | Rsa Security Inc. | Secure user identification based on constrained polynomials |
-
1999
- 1999-04-29 DE DE69920875T patent/DE69920875T2/de not_active Expired - Lifetime
- 1999-04-29 DK DK99401048T patent/DK1049289T3/da active
- 1999-04-29 EP EP99401048A patent/EP1049289B1/en not_active Expired - Lifetime
- 1999-04-29 ES ES99401048T patent/ES2230814T3/es not_active Expired - Lifetime
-
2000
- 2000-04-13 IL IL135647A patent/IL135647A/en not_active IP Right Cessation
- 2000-04-19 US US09/552,115 patent/US7100051B1/en not_active Expired - Lifetime
- 2000-04-28 JP JP2000616162A patent/JP4183387B2/ja not_active Expired - Lifetime
- 2000-04-28 HK HK02100489.6A patent/HK1039004B/zh not_active IP Right Cessation
- 2000-04-28 BR BRPI0006085A patent/BRPI0006085B1/pt active IP Right Grant
- 2000-04-28 CN CNB008010382A patent/CN1285191C/zh not_active Expired - Lifetime
- 2000-04-28 AU AU46028/00A patent/AU774346B2/en not_active Expired
- 2000-04-28 WO PCT/IB2000/000692 patent/WO2000067423A1/en not_active Ceased
-
2005
- 2005-04-12 JP JP2005114430A patent/JP2005253107A/ja active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| IL135647A0 (en) | 2001-05-20 |
| BRPI0006085B1 (pt) | 2016-05-10 |
| IL135647A (en) | 2010-11-30 |
| WO2000067423A1 (en) | 2000-11-09 |
| DK1049289T3 (da) | 2005-02-14 |
| EP1049289A1 (en) | 2000-11-02 |
| AU4602800A (en) | 2000-11-17 |
| AU774346B2 (en) | 2004-06-24 |
| US7100051B1 (en) | 2006-08-29 |
| BR0006085A (pt) | 2001-03-20 |
| HK1039004A1 (en) | 2002-04-04 |
| DE69920875D1 (de) | 2004-11-11 |
| CN1285191C (zh) | 2006-11-15 |
| CN1314040A (zh) | 2001-09-19 |
| JP4183387B2 (ja) | 2008-11-19 |
| DE69920875T2 (de) | 2005-10-27 |
| EP1049289B1 (en) | 2004-10-06 |
| JP2002543478A (ja) | 2002-12-17 |
| JP2005253107A (ja) | 2005-09-15 |
| HK1039004B (zh) | 2007-05-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2230814T3 (es) | Metodos y sistemas de firma de clave publica. | |
| Kipnis et al. | Unbalanced oil and vinegar signature schemes | |
| Amigo et al. | Theory and practice of chaotic cryptography | |
| Stinson | Cryptography: theory and practice | |
| Giraud | Dfa on aes | |
| Paar et al. | Understanding cryptography | |
| Trappe | Introduction to cryptography with coding theory | |
| KR100855958B1 (ko) | 해밍거리를 이용한 부가 채널 공격에 안전한 암호화시스템 및 방법 | |
| US8966279B2 (en) | Securing the implementation of a cryptographic process using key expansion | |
| AU2011292312B2 (en) | Apparatus and method for block cipher process for insecure environments | |
| ES2999676T3 (en) | Data security apparatus with analog component | |
| JP7123959B2 (ja) | 楕円曲線点乗算デバイス及び方法 | |
| US20160012255A1 (en) | Method for encoding data on a chip card by means of constant-weight codes | |
| US20200097256A1 (en) | A calculation device for encoded addition | |
| US20100070779A1 (en) | Integrity of ciphered data | |
| Chaigneau et al. | Cryptanalysis of NORX v2. 0 | |
| KR100574965B1 (ko) | 유한체 곱셈기 | |
| Geiselmann et al. | An attack on the isomorphisms of polynomials problem with one secret | |
| Chang et al. | Resistance of ascon family against conditional cube attacks in nonce-misuse setting | |
| Perrin | Cryptanalysis, reverse-engineering and design of symmetric cryptographic algorithms | |
| EP3078154A1 (en) | A computing device for iterative application of table networks | |
| US20170272236A1 (en) | Encrypting apparatus and method using logical complement values for enhanced security against side channel analysis | |
| US11029922B2 (en) | Method for determining a modular inverse and associated cryptographic processing device | |
| Aulbach et al. | Practical key-recovery attack on MQ-sign and more | |
| Venkatraman et al. | Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology |