GB0309157D0 - Cryptographic method and apparatus - Google Patents
Cryptographic method and apparatusInfo
- Publication number
- GB0309157D0 GB0309157D0 GB0309157A GB0309157A GB0309157D0 GB 0309157 D0 GB0309157 D0 GB 0309157D0 GB 0309157 A GB0309157 A GB 0309157A GB 0309157 A GB0309157 A GB 0309157A GB 0309157 D0 GB0309157 D0 GB 0309157D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- cryptographic method
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0309157A GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
GB0311786A GB2401009A (en) | 2003-04-23 | 2003-05-22 | Identifier-based encryption |
EP04252330A EP1471680B1 (en) | 2003-04-23 | 2004-04-21 | Identifier-Based Encryption method and apparatus |
DE602004001273T DE602004001273T2 (en) | 2003-04-23 | 2004-04-21 | Method and device for identification-based encryption |
US10/831,549 US7574596B2 (en) | 2003-04-23 | 2004-04-22 | Cryptographic method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0309157A GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0309157D0 true GB0309157D0 (en) | 2003-05-28 |
GB2401006A GB2401006A (en) | 2004-10-27 |
Family
ID=9957116
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0309157A Withdrawn GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
GB0311786A Withdrawn GB2401009A (en) | 2003-04-23 | 2003-05-22 | Identifier-based encryption |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0311786A Withdrawn GB2401009A (en) | 2003-04-23 | 2003-05-22 | Identifier-based encryption |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2401006A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7895666B1 (en) * | 2006-09-01 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Data structure representation using hash-based directed acyclic graphs and related method |
GB2457491A (en) * | 2008-02-15 | 2009-08-19 | Listertalent Ltd | Identifying a remote network user having a password |
US11232093B2 (en) | 2012-03-02 | 2022-01-25 | Pure Storage, Inc. | Slice migration in a dispersed storage network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9903124D0 (en) * | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | An authentication method |
EP1425874B1 (en) * | 2001-08-13 | 2010-04-21 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
GB0216690D0 (en) * | 2002-07-18 | 2002-08-28 | Hewlett Packard Co | Method and appatatus for encrypting data |
GB0221639D0 (en) * | 2002-09-17 | 2002-10-30 | Hewlett Packard Co | Method and apparatus for printing |
-
2003
- 2003-04-23 GB GB0309157A patent/GB2401006A/en not_active Withdrawn
- 2003-05-22 GB GB0311786A patent/GB2401009A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2401006A (en) | 2004-10-27 |
GB0311786D0 (en) | 2003-06-25 |
GB2401009A (en) | 2004-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2401014B (en) | Cryptographic method and apparatus | |
GB0403082D0 (en) | Apparatus and method | |
EP1627319A4 (en) | Authenticating method and apparatus | |
GB2401013B (en) | Cryptographic method and apparatus | |
GB2415579B (en) | Cryptographic method and apparatus | |
GB2413465B (en) | Cryptographic method and apparatus | |
GB0424574D0 (en) | Apparatus and method | |
GB0311730D0 (en) | Cryptographic method and apparatus | |
GB0327981D0 (en) | De-blistering apparatus and method | |
GB0311786D0 (en) | Cryptographic method and apparatus | |
GB0305023D0 (en) | Apparatus and method | |
GB0315475D0 (en) | Apparatus and method | |
GB0410751D0 (en) | Apparatus and method | |
GB0313968D0 (en) | De-Infestation method and apparatus | |
GB0309162D0 (en) | Cryptographic method and apparatus | |
GB0328090D0 (en) | Apparatus and method | |
GB0303973D0 (en) | Method and apparatus | |
GB2415112B (en) | Cryptographic method and apparatus | |
GB0317220D0 (en) | Apparatus and method | |
GB0313439D0 (en) | Apparatus and method | |
GB0407679D0 (en) | Method and apparatus | |
GB0409069D0 (en) | Cryptographic method and apparatus | |
GB0315932D0 (en) | Apparatus and method | |
GB0317120D0 (en) | Method and apparatus | |
GB0313783D0 (en) | Apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |