GB0708876D0 - Providing short-term private keys in public-key cryptographic systems - Google Patents
Providing short-term private keys in public-key cryptographic systemsInfo
- Publication number
- GB0708876D0 GB0708876D0 GBGB0708876.8A GB0708876A GB0708876D0 GB 0708876 D0 GB0708876 D0 GB 0708876D0 GB 0708876 A GB0708876 A GB 0708876A GB 0708876 D0 GB0708876 D0 GB 0708876D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- private key
- public
- short
- entity
- term
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000003068 static effect Effects 0.000 abstract 6
- 238000013507 mapping Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
A computing entity, 11, has an associated static public/private key pair formed by a static private key comprising a secret (SA), and a static public key (P,R) comprising both a first element (P) and that element combined with the secret (SA). The secret (SA) is stored in higher-security storage provided, for example, by a smartcard, 20. A short-term private key (St) is provided for use by a computing entity 11 in effecting cryptographic operations during an operational period. This short-term private key (St) is generated, independently of any pending cryptographic operations, by mapping a string (str) to a second element (P') and multiplying that element by said secret (SA), the first and second elements (P,P') being such that a computable bilinear map exists for these elements. The short-term private key (St) is stored in lower-security storage, 15, in the computing entity, 11, for a limited period that encompasses the operational period in respect of which the key (St) was generated. A second embodiment relates to a cryptographic system comprising: a first entity arranged to use the private key of an associated static public/private key pair to form a plurality of different short-term private keys each for use during a corresponding limited operational period; a public key infrastructure for providing a certificate associating the first entity with the public key of its static public/private key pair; and a second entity arranged to use a known formula and known data to migrate the static public key of the first entity, whilst retaining the assurance provided by said certificate, to form short-term public keys each for use, during a corresponding said limited operational period, in carrying out cryptographic operations for which there exist complimentary operations requiring use of the corresponding short-term private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0708876A GB2434950A (en) | 2004-10-28 | 2007-05-09 | Providing temporary public/private keys from permanent public/private keys using a formulae involving bilinear mappings |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0423889A GB2419787B (en) | 2004-10-28 | 2004-10-28 | Method and apparatus for providing short-term private keys in public-key cryptographic systems |
GB0708876A GB2434950A (en) | 2004-10-28 | 2007-05-09 | Providing temporary public/private keys from permanent public/private keys using a formulae involving bilinear mappings |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0708876D0 true GB0708876D0 (en) | 2007-06-20 |
GB2434950A GB2434950A (en) | 2007-08-08 |
Family
ID=38219077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0708876A Withdrawn GB2434950A (en) | 2004-10-28 | 2007-05-09 | Providing temporary public/private keys from permanent public/private keys using a formulae involving bilinear mappings |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2434950A (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2009200139B2 (en) | 2008-01-15 | 2012-02-16 | Aristocrat Technologies Australia Pty Limited | A method of processing a user data card, an interface module and a gaming system |
WO2009095143A1 (en) * | 2008-01-28 | 2009-08-06 | Siemens Aktiengesellschaft | Asymmetrical cryptosystem |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2148465B9 (en) * | 2000-06-09 | 2013-04-17 | Certicom Corp. | A method for the application of implicit signature schemes |
-
2007
- 2007-05-09 GB GB0708876A patent/GB2434950A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2434950A (en) | 2007-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12018550109A1 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
US20060098824A1 (en) | Method and apparatus for providing short-term private keys in public key-cryptographic systems | |
TW200633462A (en) | Stateless hardware security module | |
ATE443384T1 (en) | DEVICE KEY | |
JPWO2014112551A1 (en) | Split storage device, secret key split storage method | |
GB2387937B (en) | Secure cpu and memory management unit with cryptographic extensions | |
JPWO2006118092A1 (en) | Information security device and elliptic curve calculation device | |
NO20044028L (en) | Use of isogenies for the development of cryptosystems | |
ATE374478T1 (en) | SYSTEM AND METHOD FOR RENEWING KEYS USED IN PUBLIC-KEY CRYPTOGRAPHY | |
ES2613811T3 (en) | Cryptographic processing system, cryptographic processing method, cryptographic processing program and key generation device | |
Wu et al. | On the improvement of Fermat factorization using a continued fraction technique | |
CN116830523A (en) | threshold key exchange | |
US20160294551A1 (en) | Data processing system, encryption apparatus, decryption apparatus, and computer readable medium | |
GB0708876D0 (en) | Providing short-term private keys in public-key cryptographic systems | |
US20180060976A1 (en) | Privacy-preserving smart metering | |
Iacono | Multi-centric universal pseudonymisation for secondary use of the EHR. | |
US20050102523A1 (en) | Smartcard with cryptographic functionality and method and system for using such cards | |
JP4328748B2 (en) | Key update method, key-isolated encryption system, and terminal device | |
JP4922139B2 (en) | Key sharing method, first device, second device, and program thereof | |
DE60325732D1 (en) | CRYPTOGRAPHIC METHOD AND DEVICES FOR ENABLING CALCULATIONS DURING TRANSACTIONS | |
EP2680486A1 (en) | Key management | |
JP4819625B2 (en) | Encryption processing method, key-isolated encryption system, and terminal device | |
CN101065924B (en) | Smartcard with cryptographic functionality and method and system for using such cards | |
Aithekar et al. | A provably secure, shortest, and efficient identity based signcryption technique in the standard model | |
CN105577373A (en) | Generating method of identification secret key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |