GB0517700D0 - Method and apparatus for generating an identifier-based public/private key pair - Google Patents

Method and apparatus for generating an identifier-based public/private key pair

Info

Publication number
GB0517700D0
GB0517700D0 GB0517700A GB0517700A GB0517700D0 GB 0517700 D0 GB0517700 D0 GB 0517700D0 GB 0517700 A GB0517700 A GB 0517700A GB 0517700 A GB0517700 A GB 0517700A GB 0517700 D0 GB0517700 D0 GB 0517700D0
Authority
GB
United Kingdom
Prior art keywords
identifier
generating
private key
key pair
based public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0517700A
Other versions
GB2421408A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Publication of GB0517700D0 publication Critical patent/GB0517700D0/en
Priority to GB0525074A priority Critical patent/GB2421410A/en
Priority to US11/305,869 priority patent/US20060215837A1/en
Publication of GB2421408A publication Critical patent/GB2421408A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • H04L9/306
    • H04L9/3281
    • H04L9/0802

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
GB0517700A 2004-12-18 2005-09-01 Generating an Identifier-Based Public / Private Key Pair from a Multi-Component Signature Withdrawn GB2421408A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0525074A GB2421410A (en) 2004-12-18 2005-12-09 Generating and Identifier-Based Public / Private key Pair from a Multi-Component Signature
US11/305,869 US20060215837A1 (en) 2004-12-18 2005-12-16 Method and apparatus for generating an identifier-based public/private key pair

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0427795A GB2421407A (en) 2004-12-18 2004-12-18 Generating a shared symmetric key using identifier based cryptography

Publications (2)

Publication Number Publication Date
GB0517700D0 true GB0517700D0 (en) 2005-10-05
GB2421408A GB2421408A (en) 2006-06-21

Family

ID=34090324

Family Applications (3)

Application Number Title Priority Date Filing Date
GB0427795A Withdrawn GB2421407A (en) 2004-12-18 2004-12-18 Generating a shared symmetric key using identifier based cryptography
GB0517700A Withdrawn GB2421408A (en) 2004-12-18 2005-09-01 Generating an Identifier-Based Public / Private Key Pair from a Multi-Component Signature
GB0525074A Withdrawn GB2421410A (en) 2004-12-18 2005-12-09 Generating and Identifier-Based Public / Private key Pair from a Multi-Component Signature

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB0427795A Withdrawn GB2421407A (en) 2004-12-18 2004-12-18 Generating a shared symmetric key using identifier based cryptography

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB0525074A Withdrawn GB2421410A (en) 2004-12-18 2005-12-09 Generating and Identifier-Based Public / Private key Pair from a Multi-Component Signature

Country Status (1)

Country Link
GB (3) GB2421407A (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959350B2 (en) 2009-03-25 2015-02-17 Pacid Technologies, Llc Token for securing communication
US8934625B2 (en) 2009-03-25 2015-01-13 Pacid Technologies, Llc Method and system for securing communication
WO2010111448A1 (en) 2009-03-25 2010-09-30 Pacid Technologies, Llc Method and system for securing communication
TW201103298A (en) 2009-03-25 2011-01-16 Pacid Technologies Llc Method and system for securing communication
WO2010111438A2 (en) 2009-03-25 2010-09-30 Pacid Technologies, Llc System and method for protecting a secrets file
US8615085B2 (en) * 2009-09-29 2013-12-24 Zamtec Ltd Encrypted communication system with limited number of stored encryption key retrievals
WO2011081589A1 (en) * 2010-01-04 2011-07-07 Dts Steering Group Ab Secure digital communications
US8479021B2 (en) 2011-09-29 2013-07-02 Pacid Technologies, Llc Secure island computing system and method
GB2577122A (en) * 2018-09-17 2020-03-18 Trustonic Ltd Establishing a protected communication channel
DE102024002220A1 (en) 2024-07-08 2024-09-19 Mercedes-Benz Group AG Procedure for encrypted data exchange

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0257585B1 (en) * 1986-08-22 1992-11-25 Nec Corporation Key distribution method
ATE119726T1 (en) * 1990-10-24 1995-03-15 Omnisec Ag SECRET TRANSMISSION SYSTEM WITH THE POSSIBILITY OF ENCRYPTED COMMUNICATION BETWEEN USERS WITH A SECURED KEY, WHICH IS DETERMINED WITHOUT USER INTERVENTION.
US6567793B1 (en) * 1997-12-22 2003-05-20 Christian Bielefeldt Hicks Remote authorization for unlocking electronic data system and method
CA2235359C (en) * 1998-03-23 2012-04-10 Certicom Corp. Implicit certificate scheme with ca chaining
CA2350118C (en) * 2000-06-09 2013-08-13 Certicom Corp. A method for the application of implicit signature schemes
GB2384406B (en) * 2002-01-21 2004-05-12 Hyun Ku Yeun Cryptosystem
CN102868528B (en) * 2003-10-28 2015-09-09 塞尔蒂卡姆公司 A kind of equipment of the generation verified of public-key cryptography and corresponding authentication center

Also Published As

Publication number Publication date
GB0427795D0 (en) 2005-01-19
GB0525074D0 (en) 2006-01-18
GB2421408A (en) 2006-06-21
GB2421410A (en) 2006-06-21
GB2421407A (en) 2006-06-21

Similar Documents

Publication Publication Date Title
EP1843509A4 (en) Identifier-based private key generating method and device
GB0525074D0 (en) Method and apparatus for generating an identifier-based public/private key pair
EP1687931A4 (en) Method and apparatus for verifiable generation of public keys
EP1771014A4 (en) Stereoscopic image generating method and apparatus
ZA200700961B (en) Method and apparatus for random-number generator
EP1750884A4 (en) Ion generation method and apparatus
GB2426612C (en) Method and apparatus for generating configuration.
EP1751912A4 (en) Method and apparatus for providing electronic message authentication
GB0803534D0 (en) Power generating apparatus and power generating method
EP1836378A4 (en) Methods and apparatus for power generation
EP1719735A4 (en) Ozone generator and ozone generating method
GB2401012B (en) Cryptographic method and apparatus
GB0316165D0 (en) Method and apparatus for imaging earth formation
HK1106053A1 (en) Authentication apparatus and authentication method
EP1796153A4 (en) Ashing method and ashing apparatus
SG119232A1 (en) Desalination apparatus and method
ZA200705385B (en) Apparatus for generating energy and method therefor
GB2415579B (en) Cryptographic method and apparatus
EP1608101A4 (en) Encrypting apparatus and encrypting method
EP1833131A4 (en) Ion generating unit and ion generating apparatus
GB2401013B (en) Cryptographic method and apparatus
GB0413601D0 (en) Trenching apparatus and method
GB0405862D0 (en) Apparatus for extracting or generating power
GB0328877D0 (en) Sonar apparatus and method
HK1073912A1 (en) Character generating apparatus and character generating method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)