IN2013MU02907A - - Google Patents

Info

Publication number
IN2013MU02907A
IN2013MU02907A IN2907MU2013A IN2013MU02907A IN 2013MU02907 A IN2013MU02907 A IN 2013MU02907A IN 2907MU2013 A IN2907MU2013 A IN 2907MU2013A IN 2013MU02907 A IN2013MU02907 A IN 2013MU02907A
Authority
IN
India
Prior art keywords
receiver
key set
computed
elliptic curve
public key
Prior art date
Application number
Other languages
English (en)
Inventor
Bhattachar Rajan Mindigal Alasingara
Barkur Suryanarayana Adiga
Shivraj Vijayshankar Lokamathe
Ravishankara Shastry
Balamuralidhar Purushothaman
Original Assignee
Tata Consultancy Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tata Consultancy Services Ltd filed Critical Tata Consultancy Services Ltd
Priority to IN2907MU2013 priority Critical patent/IN2013MU02907A/en
Priority to US14/477,226 priority patent/US9509511B2/en
Priority to EP14183656.9A priority patent/EP2846494A1/en
Publication of IN2013MU02907A publication Critical patent/IN2013MU02907A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
IN2907MU2013 2013-09-06 2013-09-06 IN2013MU02907A (ru)

Priority Applications (3)

Application Number Priority Date Filing Date Title
IN2907MU2013 IN2013MU02907A (ru) 2013-09-06 2013-09-06
US14/477,226 US9509511B2 (en) 2013-09-06 2014-09-04 Identity based encryption
EP14183656.9A EP2846494A1 (en) 2013-09-06 2014-09-05 Identity based encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN2907MU2013 IN2013MU02907A (ru) 2013-09-06 2013-09-06

Publications (1)

Publication Number Publication Date
IN2013MU02907A true IN2013MU02907A (ru) 2015-07-03

Family

ID=51542143

Family Applications (1)

Application Number Title Priority Date Filing Date
IN2907MU2013 IN2013MU02907A (ru) 2013-09-06 2013-09-06

Country Status (3)

Country Link
US (1) US9509511B2 (ru)
EP (1) EP2846494A1 (ru)
IN (1) IN2013MU02907A (ru)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IN2014MU00771A (ru) * 2014-03-06 2015-09-25 Tata Consultancy Services Ltd
DE102015214267A1 (de) * 2015-07-28 2017-02-02 Siemens Aktiengesellschaft Verfahren und System zum Erzeugen eines sicheren Kommunikationskanals für Endgeräte
US11128452B2 (en) * 2017-03-25 2021-09-21 AVAST Software s.r.o. Encrypted data sharing with a hierarchical key structure
EP3474484A1 (en) * 2017-10-17 2019-04-24 Koninklijke Philips N.V. Cryptographic device with updatable shared matrix
CN110677249A (zh) * 2019-03-25 2020-01-10 深圳奥联信息安全技术有限公司 基于双线性对的密码系统实现方法和密码系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7590236B1 (en) 2004-06-04 2009-09-15 Voltage Security, Inc. Identity-based-encryption system

Also Published As

Publication number Publication date
US9509511B2 (en) 2016-11-29
US20150071435A1 (en) 2015-03-12
EP2846494A1 (en) 2015-03-11

Similar Documents

Publication Publication Date Title
MX2017001090A (es) Gestion de claves inalambrica para autenticacion.
MX2017000430A (es) Sistema de control de acceso en red.
MX2017009596A (es) Comunicacion privada entre vehiculos.
WO2018098081A3 (en) Apparatus and method for sharing credentials in an internet of things (iot) system
TW201612787A (en) Network authentication method for secure electronic transactions
MX2017008651A (es) Metodo y aparato de aseguramiento de aplicacion movil.
MY190913A (en) Device and method for secure connection
MX361152B (es) Aprovisionamiento de licencias de gestión de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones.
PE20170656A1 (es) Autenticacion de la red de servicio
WO2015023341A3 (en) Secure authorization systems and methods
MX2017005313A (es) Mensajeria de transacciones.
MX2020010495A (es) Provision de certificados para autenticacion de candado electronico a un servidor.
MX2014004838A (es) Sistema y metodo para gestion de claves para dominio de seguridad del emisor utilizando especificaciones de plataformas globales.
MX2018016420A (es) Sistema de gestion de credenciales electrónicas.
WO2014191768A3 (en) Multi-factor zero-knowledge authentication using pairings
GB2562923A (en) Data security system with encryption
IN2013MU02907A (ru)
RU2018113732A (ru) Способ и система для генерации усовершенствованного ключа хранения в мобильном устройстве без защитных элементов
ATE523020T1 (de) Verfahren zur synchronisierung zwischen server und mobiler vorrichtung
GB2538927A (en) Methods and apparatus to identify media using hash keys
PH12016501866B1 (en) Systems and methods for identity validation and verification
IN2014MU00771A (ru)
GB2573679A (en) Cloud security stack
RU2013113592A (ru) Способ защищенного удаленного доступа к информационным ресурсам
MX2014014004A (es) Determinacion de codigos criptograficos.