IL146350A0 - Secure user identification based on ring homomorphisms - Google Patents

Secure user identification based on ring homomorphisms

Info

Publication number
IL146350A0
IL146350A0 IL14635000A IL14635000A IL146350A0 IL 146350 A0 IL146350 A0 IL 146350A0 IL 14635000 A IL14635000 A IL 14635000A IL 14635000 A IL14635000 A IL 14635000A IL 146350 A0 IL146350 A0 IL 146350A0
Authority
IL
Israel
Prior art keywords
homomorphisms
ring
user identification
identification based
secure user
Prior art date
Application number
IL14635000A
Original Assignee
Ntru Cryptosystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ntru Cryptosystems Inc filed Critical Ntru Cryptosystems Inc
Publication of IL146350A0 publication Critical patent/IL146350A0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
IL14635000A 1999-05-03 2000-05-03 Secure user identification based on ring homomorphisms IL146350A0 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13219999P 1999-05-03 1999-05-03
PCT/US2000/012025 WO2001001625A1 (en) 1999-05-03 2000-05-03 Secure user identification based on ring homomorphisms

Publications (1)

Publication Number Publication Date
IL146350A0 true IL146350A0 (en) 2002-07-25

Family

ID=22452933

Family Applications (1)

Application Number Title Priority Date Filing Date
IL14635000A IL146350A0 (en) 1999-05-03 2000-05-03 Secure user identification based on ring homomorphisms

Country Status (4)

Country Link
EP (1) EP1190523A4 (en)
AU (1) AU6889100A (en)
IL (1) IL146350A0 (en)
WO (1) WO2001001625A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL156606A (en) * 2003-06-23 2011-07-31 Aviad Kipnis Digital certificates
CN112003707A (en) * 2020-08-25 2020-11-27 湖南宸瀚信息科技有限责任公司 Quantum computation attack resistant block chain digital signature encryption method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220606A (en) * 1992-02-10 1993-06-15 Harold Greenberg Cryptographic system and method
TW242206B (en) * 1993-08-27 1995-03-01 At & T Corp
DE69638018D1 (en) * 1995-02-13 2009-10-15 Intertrust Tech Corp Systems and procedures for managing secure transactions and protecting electronic rights
FR2737370B1 (en) * 1995-07-27 1997-08-22 Bull Cp8 CRYPTOGRAPHIC COMMUNICATION METHOD
US5740250A (en) * 1995-12-15 1998-04-14 Moh; Tzuong-Tsieng Tame automorphism public key system

Also Published As

Publication number Publication date
WO2001001625A9 (en) 2002-06-13
AU6889100A (en) 2001-01-31
EP1190523A4 (en) 2004-08-04
WO2001001625A1 (en) 2001-01-04
EP1190523A1 (en) 2002-03-27

Similar Documents

Publication Publication Date Title
GB9923802D0 (en) User authentication
GB2346097B (en) Retaining ring
GB2351330B (en) Retaining ring
EP1181664A4 (en) Identification device
GB9913536D0 (en) Use
EP1210084A4 (en) Pyridomorphinans, thienomoprhinans and use thereof
IL146350A0 (en) Secure user identification based on ring homomorphisms
EP1224886A4 (en) Portable case
GB9919971D0 (en) Use
GB9922295D0 (en) Identification
GB9907417D0 (en) Object identification
AU145684S (en) Ring
GB2356976B (en) Button retention feature
GB9926814D0 (en) Watch tag - personal identification
GB9909774D0 (en) Position identification
AU142478S (en) Ring
AU142337S (en) Ring
AU137965S (en) Key ring
ZA200002872B (en) Umbrella.
CA88114S (en) Carrying case
GB9922145D0 (en) Ring cover
GB9914293D0 (en) Umbrella
AU140751S (en) Umbrella
GB9922387D0 (en) Drygo umbrella
GB9923122D0 (en) Umbrella