IN2014CN04372A - - Google Patents
Info
- Publication number
- IN2014CN04372A IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
- Authority
- IN
- India
- Prior art keywords
- template
- random number
- public key
- storage portion
- stores
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/077623 WO2013080320A1 (ja) | 2011-11-30 | 2011-11-30 | データ処理装置及びデータ処理方法及びプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN04372A true IN2014CN04372A (enrdf_load_stackoverflow) | 2015-09-04 |
Family
ID=48534844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN4372CHN2014 IN2014CN04372A (enrdf_load_stackoverflow) | 2011-11-30 | 2011-11-30 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20140247939A1 (enrdf_load_stackoverflow) |
EP (1) | EP2787681B1 (enrdf_load_stackoverflow) |
JP (1) | JP5586795B2 (enrdf_load_stackoverflow) |
CN (1) | CN103975553B (enrdf_load_stackoverflow) |
IN (1) | IN2014CN04372A (enrdf_load_stackoverflow) |
WO (1) | WO2013080320A1 (enrdf_load_stackoverflow) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5606642B2 (ja) | 2012-01-25 | 2014-10-15 | 三菱電機株式会社 | データ検索装置、データ検索方法、データ検索プログラム、データ登録装置、データ登録方法、データ登録プログラムおよび情報処理装置 |
WO2014128958A1 (ja) | 2013-02-25 | 2014-08-28 | 三菱電機株式会社 | サーバ装置、秘匿検索プログラム,記録媒体及び秘匿検索システム |
US8966277B2 (en) * | 2013-03-15 | 2015-02-24 | Mitsubishi Electric Research Laboratories, Inc. | Method for authenticating an encryption of biometric data |
WO2015144764A1 (de) * | 2014-03-26 | 2015-10-01 | Continental Teves Ag & Co. Ohg | Verfahren und system zur verbesserung der datensicherheit bei einem kommunikationsvorgang |
US10592682B2 (en) * | 2015-02-20 | 2020-03-17 | Mitsubishi Electric Corporation | Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state |
WO2019014425A1 (en) * | 2017-07-13 | 2019-01-17 | Pindrop Security, Inc. | SAFE PARTY WITH SEVERAL PARTIES KNOWING NO VOICE IMPRESSIONS |
US10742410B2 (en) | 2018-02-13 | 2020-08-11 | Fingerprint Cards Ab | Updating biometric template protection keys |
US10665244B1 (en) | 2018-03-22 | 2020-05-26 | Pindrop Security, Inc. | Leveraging multiple audio channels for authentication |
US11354422B2 (en) * | 2018-11-02 | 2022-06-07 | Rank One Computing Corporation | Optimizations for privacy-preserving distance metric computation |
US12063293B2 (en) * | 2018-12-12 | 2024-08-13 | Nec Corporation | Collation system, client and server |
US20220052841A1 (en) * | 2018-12-12 | 2022-02-17 | Nec Corporation | Matching system, client and server |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US20240104182A1 (en) | 2021-01-29 | 2024-03-28 | Nec Corporation | Biometric authentication system, template updating method therefor, storage medium, biometric authentication client device, and biometric authentication server device |
US20230393762A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Verified key replacement in secure memory devices |
US20230396431A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Error reduction during cryptographic key updates in secure memory devices |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
WO2006054208A1 (en) * | 2004-11-16 | 2006-05-26 | Koninklijke Philips Electronics N.V. | Securely computing a similarity measure |
JP4961214B2 (ja) | 2006-03-29 | 2012-06-27 | 株式会社日立情報制御ソリューションズ | 生体認証方法およびシステム |
US8995665B1 (en) * | 2008-08-20 | 2015-03-31 | Symantec Corporation | Role based encryption without key management system |
US8958552B2 (en) * | 2009-10-29 | 2015-02-17 | Mitsubishi Electric Corporation | Data processing device |
JP5573293B2 (ja) * | 2010-03-30 | 2014-08-20 | 富士通株式会社 | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
-
2011
- 2011-11-30 US US14/350,740 patent/US20140247939A1/en not_active Abandoned
- 2011-11-30 CN CN201180075191.2A patent/CN103975553B/zh not_active Expired - Fee Related
- 2011-11-30 WO PCT/JP2011/077623 patent/WO2013080320A1/ja active Application Filing
- 2011-11-30 EP EP11876549.4A patent/EP2787681B1/en not_active Not-in-force
- 2011-11-30 IN IN4372CHN2014 patent/IN2014CN04372A/en unknown
- 2011-11-30 JP JP2013546896A patent/JP5586795B2/ja not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP2787681A1 (en) | 2014-10-08 |
JPWO2013080320A1 (ja) | 2015-04-27 |
EP2787681B1 (en) | 2016-10-12 |
CN103975553B (zh) | 2016-10-12 |
CN103975553A (zh) | 2014-08-06 |
WO2013080320A1 (ja) | 2013-06-06 |
JP5586795B2 (ja) | 2014-09-10 |
US20140247939A1 (en) | 2014-09-04 |
EP2787681A4 (en) | 2015-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CN04372A (enrdf_load_stackoverflow) | ||
IN2015DN04037A (enrdf_load_stackoverflow) | ||
AU2017269736A1 (en) | Multiple-link cryptologic blockchain | |
BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
MX2014002142A (es) | Cifrado y descifrado basados en atributos jerarquicos. | |
MX2016001900A (es) | Criptografia nado utilizando funciones unidireccionales. | |
IN2014CN04110A (enrdf_load_stackoverflow) | ||
MX2014004838A (es) | Sistema y metodo para gestion de claves para dominio de seguridad del emisor utilizando especificaciones de plataformas globales. | |
WO2016122747A3 (en) | Storage for encrypted data with enhanced security | |
ATE496500T1 (de) | Verfahren zum individuellen anpassen eines hörgeräts oder einer hörhilfe | |
WO2014139341A8 (zh) | 密钥管理方法及系统 | |
GB2490407B (en) | Joint encryption of data | |
UA122327C2 (uk) | Nado- криптографія з генераторами ключів | |
NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
EP2264640A3 (en) | Feature specific keys for executable code | |
BR112013021704A2 (pt) | gerenciamento e personalização segura de chaves de assinatura de código únicas | |
EP3704829B8 (en) | Cryptographic key generation system and method | |
WO2014164180A3 (en) | Decoy bits method for direct encryption and key generation | |
WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
NZ603822A (en) | Permutation data transform to enhance security | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
FR2974924B1 (fr) | Procedes d'enrolement et de verification biometrique, systemes et dispositifs associes. | |
GB201210004D0 (en) | Random number distruibution | |
GB2500557A (en) | Data encryption | |
WO2012051076A3 (en) | A method for securing credentials in a remote repository |