ES2230814T3 - Metodos y sistemas de firma de clave publica. - Google Patents

Metodos y sistemas de firma de clave publica.

Info

Publication number
ES2230814T3
ES2230814T3 ES99401048T ES99401048T ES2230814T3 ES 2230814 T3 ES2230814 T3 ES 2230814T3 ES 99401048 T ES99401048 T ES 99401048T ES 99401048 T ES99401048 T ES 99401048T ES 2230814 T3 ES2230814 T3 ES 2230814T3
Authority
ES
Spain
Prior art keywords
variables
vinegar
oil
game
equations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
ES99401048T
Other languages
English (en)
Spanish (es)
Inventor
Jacques Patarin
Aviad Kipnis
Louis Goubin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CP8 Technologies SA
Synamedia Ltd
Original Assignee
CP8 Technologies SA
NDS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CP8 Technologies SA, NDS Ltd filed Critical CP8 Technologies SA
Application granted granted Critical
Publication of ES2230814T3 publication Critical patent/ES2230814T3/es
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mathematical Optimization (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Physics (AREA)
  • Algebra (AREA)
  • Complex Calculations (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
ES99401048T 1999-04-29 1999-04-29 Metodos y sistemas de firma de clave publica. Expired - Lifetime ES2230814T3 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP99401048A EP1049289B1 (en) 1999-04-29 1999-04-29 Public-key signature methods and systems
PCT/IB2000/000692 WO2000067423A1 (en) 1999-04-29 2000-04-28 Public-key signature methods and systems

Publications (1)

Publication Number Publication Date
ES2230814T3 true ES2230814T3 (es) 2005-05-01

Family

ID=8241961

Family Applications (1)

Application Number Title Priority Date Filing Date
ES99401048T Expired - Lifetime ES2230814T3 (es) 1999-04-29 1999-04-29 Metodos y sistemas de firma de clave publica.

Country Status (12)

Country Link
US (1) US7100051B1 (enExample)
EP (1) EP1049289B1 (enExample)
JP (2) JP4183387B2 (enExample)
CN (1) CN1285191C (enExample)
AU (1) AU774346B2 (enExample)
BR (1) BRPI0006085B1 (enExample)
DE (1) DE69920875T2 (enExample)
DK (1) DK1049289T3 (enExample)
ES (1) ES2230814T3 (enExample)
HK (1) HK1039004B (enExample)
IL (1) IL135647A (enExample)
WO (1) WO2000067423A1 (enExample)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2810139B1 (fr) * 2000-06-08 2002-08-23 Bull Cp8 Procede de securisation de la phase de pre-initialisation d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede
WO2002084590A1 (en) * 2001-04-11 2002-10-24 Applied Minds, Inc. Knowledge web
US7844610B2 (en) * 2003-12-12 2010-11-30 Google Inc. Delegated authority evaluation system
US20030195834A1 (en) * 2002-04-10 2003-10-16 Hillis W. Daniel Automated online purchasing system
US20030196094A1 (en) * 2002-04-10 2003-10-16 Hillis W. Daniel Method and apparatus for authenticating the content of a distributed database
US8069175B2 (en) * 2002-04-10 2011-11-29 Google Inc. Delegating authority to evaluate content
US7600118B2 (en) * 2002-09-27 2009-10-06 Intel Corporation Method and apparatus for augmenting authentication in a cryptographic system
US7765206B2 (en) 2002-12-13 2010-07-27 Metaweb Technologies, Inc. Meta-Web
US8012025B2 (en) * 2002-12-13 2011-09-06 Applied Minds, Llc Video game controller hub with control input reduction and combination schemes
US20050131918A1 (en) * 2003-12-12 2005-06-16 W. Daniel Hillis Personalized profile for evaluating content
US7961876B2 (en) * 2005-01-11 2011-06-14 Jintai Ding Method to produce new multivariate public key cryptosystems
CN1870499B (zh) * 2005-01-11 2012-01-04 丁津泰 产生新的多变量公钥密码系统的方法
WO2007057610A1 (fr) * 2005-11-18 2007-05-24 France Telecom Systeme et procede cryptographique d'authentification ou de signature
FR2916317B1 (fr) * 2007-05-15 2009-08-07 Sagem Defense Securite Protection d'execution d'un calcul cryptographique
CN101321059B (zh) * 2007-06-07 2011-02-16 管海明 一种用于编码和译码数字消息的方法和系统
FR2918525A1 (fr) 2007-07-06 2009-01-09 France Telecom Procede asymetrique de chiffrement ou de verification de signature.
CN101227286B (zh) * 2008-01-31 2010-04-14 北京飞天诚信科技有限公司 一种生成消息认证码的方法
WO2011033642A1 (ja) * 2009-09-17 2011-03-24 株式会社 東芝 署名生成装置及び署名検証装置
JP2011107528A (ja) * 2009-11-19 2011-06-02 Sony Corp 情報処理装置、鍵生成装置、署名検証装置、情報処理方法、署名生成方法、及びプログラム
IL205803A0 (en) 2010-05-16 2010-12-30 Yaron Sella Collision-based signature scheme
IL206139A0 (en) 2010-06-02 2010-12-30 Yaron Sella Efficient multivariate signature generation
IL207918A0 (en) 2010-09-01 2011-01-31 Aviad Kipnis Attack-resistant multivariate signature scheme
JP5790287B2 (ja) * 2011-08-12 2015-10-07 ソニー株式会社 情報処理装置、情報処理方法、プログラム、及び記録媒体
CN105359455A (zh) * 2013-07-12 2016-02-24 皇家飞利浦有限公司 电子签名系统
CN103457726B (zh) * 2013-08-26 2016-12-28 华南理工大学 基于矩阵的多变量公钥加密方法
CN103780383B (zh) * 2014-01-13 2017-05-31 华南理工大学 一种基于超球面的多变量公钥签名/验证系统及方法
CN104009848B (zh) * 2014-05-26 2017-09-29 华南理工大学 一种混合型的多变量数字签名系统及方法
CN105245343B (zh) * 2015-09-22 2018-09-14 华南理工大学 一种基于多变量密码技术的在线离线签名系统及方法
US11030618B1 (en) 2016-09-30 2021-06-08 Winkk, Inc. Authentication and personal data sharing for partner services using out-of-band optical mark recognition
JP7322763B2 (ja) * 2020-03-13 2023-08-08 日本電信電話株式会社 鍵生成装置、鍵生成方法及びプログラム
US12395353B2 (en) * 2022-09-21 2025-08-19 Winkk, Inc. Authentication process with an exposed and unregistered public certificate

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ240019A (en) * 1991-09-30 1996-04-26 Peter John Smith Public key encrypted communication with non-multiplicative cipher
US5263085A (en) 1992-11-13 1993-11-16 Yeda Research & Development Co. Ltd. Fast signature scheme based on sequentially linearized equations
US5375170A (en) 1992-11-13 1994-12-20 Yeda Research & Development Co., Ltd. Efficient signature scheme based on birational permutations
FR2737370B1 (fr) * 1995-07-27 1997-08-22 Bull Cp8 Procede de communication cryptographique
FR2744309B1 (fr) * 1996-01-26 1998-03-06 Bull Cp8 Procede de communicatin cryptographique asymetrique, et objet portatif associe
US6076163A (en) * 1997-10-20 2000-06-13 Rsa Security Inc. Secure user identification based on constrained polynomials

Also Published As

Publication number Publication date
IL135647A0 (en) 2001-05-20
BRPI0006085B1 (pt) 2016-05-10
IL135647A (en) 2010-11-30
WO2000067423A1 (en) 2000-11-09
DK1049289T3 (da) 2005-02-14
EP1049289A1 (en) 2000-11-02
AU4602800A (en) 2000-11-17
AU774346B2 (en) 2004-06-24
US7100051B1 (en) 2006-08-29
BR0006085A (pt) 2001-03-20
HK1039004A1 (en) 2002-04-04
DE69920875D1 (de) 2004-11-11
CN1285191C (zh) 2006-11-15
CN1314040A (zh) 2001-09-19
JP4183387B2 (ja) 2008-11-19
DE69920875T2 (de) 2005-10-27
EP1049289B1 (en) 2004-10-06
JP2002543478A (ja) 2002-12-17
JP2005253107A (ja) 2005-09-15
HK1039004B (zh) 2007-05-04

Similar Documents

Publication Publication Date Title
ES2230814T3 (es) Metodos y sistemas de firma de clave publica.
Kipnis et al. Unbalanced oil and vinegar signature schemes
Amigo et al. Theory and practice of chaotic cryptography
Stinson Cryptography: theory and practice
Giraud Dfa on aes
Paar et al. Understanding cryptography
Trappe Introduction to cryptography with coding theory
KR100855958B1 (ko) 해밍거리를 이용한 부가 채널 공격에 안전한 암호화시스템 및 방법
US8966279B2 (en) Securing the implementation of a cryptographic process using key expansion
AU2011292312B2 (en) Apparatus and method for block cipher process for insecure environments
ES2999676T3 (en) Data security apparatus with analog component
JP7123959B2 (ja) 楕円曲線点乗算デバイス及び方法
US20160012255A1 (en) Method for encoding data on a chip card by means of constant-weight codes
US20200097256A1 (en) A calculation device for encoded addition
US20100070779A1 (en) Integrity of ciphered data
Chaigneau et al. Cryptanalysis of NORX v2. 0
KR100574965B1 (ko) 유한체 곱셈기
Geiselmann et al. An attack on the isomorphisms of polynomials problem with one secret
Chang et al. Resistance of ascon family against conditional cube attacks in nonce-misuse setting
Perrin Cryptanalysis, reverse-engineering and design of symmetric cryptographic algorithms
EP3078154A1 (en) A computing device for iterative application of table networks
US20170272236A1 (en) Encrypting apparatus and method using logical complement values for enhanced security against side channel analysis
US11029922B2 (en) Method for determining a modular inverse and associated cryptographic processing device
Aulbach et al. Practical key-recovery attack on MQ-sign and more
Venkatraman et al. Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology