GB0311786D0 - Cryptographic method and apparatus - Google Patents
Cryptographic method and apparatusInfo
- Publication number
- GB0311786D0 GB0311786D0 GB0311786A GB0311786A GB0311786D0 GB 0311786 D0 GB0311786 D0 GB 0311786D0 GB 0311786 A GB0311786 A GB 0311786A GB 0311786 A GB0311786 A GB 0311786A GB 0311786 D0 GB0311786 D0 GB 0311786D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- cryptographic method
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE602004001273T DE602004001273T2 (en) | 2003-04-23 | 2004-04-21 | Method and device for identification-based encryption |
EP04252330A EP1471680B1 (en) | 2003-04-23 | 2004-04-21 | Identifier-Based Encryption method and apparatus |
US10/831,549 US7574596B2 (en) | 2003-04-23 | 2004-04-22 | Cryptographic method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0309157A GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0311786D0 true GB0311786D0 (en) | 2003-06-25 |
GB2401009A GB2401009A (en) | 2004-10-27 |
Family
ID=9957116
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0309157A Withdrawn GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
GB0311786A Withdrawn GB2401009A (en) | 2003-04-23 | 2003-05-22 | Identifier-based encryption |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0309157A Withdrawn GB2401006A (en) | 2003-04-23 | 2003-04-23 | Cryptographic method and apparatus |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2401006A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7895666B1 (en) * | 2006-09-01 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Data structure representation using hash-based directed acyclic graphs and related method |
GB2457491A (en) * | 2008-02-15 | 2009-08-19 | Listertalent Ltd | Identifying a remote network user having a password |
US11232093B2 (en) * | 2012-03-02 | 2022-01-25 | Pure Storage, Inc. | Slice migration in a dispersed storage network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9903124D0 (en) * | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | An authentication method |
US7113594B2 (en) * | 2001-08-13 | 2006-09-26 | The Board Of Trustees Of The Leland Stanford University | Systems and methods for identity-based encryption and related cryptographic techniques |
GB0216690D0 (en) * | 2002-07-18 | 2002-08-28 | Hewlett Packard Co | Method and appatatus for encrypting data |
GB0221639D0 (en) * | 2002-09-17 | 2002-10-30 | Hewlett Packard Co | Method and apparatus for printing |
-
2003
- 2003-04-23 GB GB0309157A patent/GB2401006A/en not_active Withdrawn
- 2003-05-22 GB GB0311786A patent/GB2401009A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB0309157D0 (en) | 2003-05-28 |
GB2401006A (en) | 2004-10-27 |
GB2401009A (en) | 2004-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2401012B (en) | Cryptographic method and apparatus | |
GB0303422D0 (en) | Apparatus and method | |
EP1627319A4 (en) | Authenticating method and apparatus | |
GB2401013B (en) | Cryptographic method and apparatus | |
GB2415579B (en) | Cryptographic method and apparatus | |
GB0424574D0 (en) | Apparatus and method | |
GB2413465B (en) | Cryptographic method and apparatus | |
GB0309161D0 (en) | Cryptographic method and apparatus | |
GB0327981D0 (en) | De-blistering apparatus and method | |
GB0305023D0 (en) | Apparatus and method | |
GB0309157D0 (en) | Cryptographic method and apparatus | |
GB0313968D0 (en) | De-Infestation method and apparatus | |
GB0315475D0 (en) | Apparatus and method | |
GB0410751D0 (en) | Apparatus and method | |
GB0309162D0 (en) | Cryptographic method and apparatus | |
GB0303973D0 (en) | Method and apparatus | |
GB0328090D0 (en) | Apparatus and method | |
GB2415112B (en) | Cryptographic method and apparatus | |
GB0407679D0 (en) | Method and apparatus | |
GB0317220D0 (en) | Apparatus and method | |
GB0313439D0 (en) | Apparatus and method | |
GB0409069D0 (en) | Cryptographic method and apparatus | |
GB0328929D0 (en) | Method and apparatus | |
GB0326900D0 (en) | Apparatus and method | |
GB0308030D0 (en) | Apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |