IN2014CN04372A - - Google Patents

Info

Publication number
IN2014CN04372A
IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
Authority
IN
India
Prior art keywords
template
random number
public key
storage portion
stores
Prior art date
Application number
Other languages
English (en)
Inventor
Mitsuhiro Hattori
Takato Hirano
Takumi Mori
Takashi Ito
Nori Matsuda
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of IN2014CN04372A publication Critical patent/IN2014CN04372A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)
IN4372CHN2014 2011-11-30 2011-11-30 IN2014CN04372A (enExample)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/077623 WO2013080320A1 (ja) 2011-11-30 2011-11-30 データ処理装置及びデータ処理方法及びプログラム

Publications (1)

Publication Number Publication Date
IN2014CN04372A true IN2014CN04372A (enExample) 2015-09-04

Family

ID=48534844

Family Applications (1)

Application Number Title Priority Date Filing Date
IN4372CHN2014 IN2014CN04372A (enExample) 2011-11-30 2011-11-30

Country Status (6)

Country Link
US (1) US20140247939A1 (enExample)
EP (1) EP2787681B1 (enExample)
JP (1) JP5586795B2 (enExample)
CN (1) CN103975553B (enExample)
IN (1) IN2014CN04372A (enExample)
WO (1) WO2013080320A1 (enExample)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013111284A1 (ja) 2012-01-25 2013-08-01 三菱電機株式会社 データ検索装置、データ検索方法、データ検索プログラム、データ登録装置、データ登録方法、データ登録プログラムおよび情報処理装置
WO2014128958A1 (ja) 2013-02-25 2014-08-28 三菱電機株式会社 サーバ装置、秘匿検索プログラム,記録媒体及び秘匿検索システム
US8966277B2 (en) * 2013-03-15 2015-02-24 Mitsubishi Electric Research Laboratories, Inc. Method for authenticating an encryption of biometric data
DE102015205428A1 (de) * 2014-03-26 2015-10-01 Continental Teves Ag & Co. Ohg Verfahren und System zur Verbesserung der Datensicherheit bei einem Kommunikationsvorgang
WO2016132546A1 (ja) * 2015-02-20 2016-08-25 三菱電機株式会社 データ保管装置及びデータ処理方法及びデータ処理プログラム
WO2019014425A1 (en) * 2017-07-13 2019-01-17 Pindrop Security, Inc. SAFE PARTY WITH SEVERAL PARTIES KNOWING NO VOICE IMPRESSIONS
WO2019160472A1 (en) 2018-02-13 2019-08-22 Fingerprint Cards Ab Updating biometric template protection keys
US10665244B1 (en) 2018-03-22 2020-05-26 Pindrop Security, Inc. Leveraging multiple audio channels for authentication
US11354422B2 (en) * 2018-11-02 2022-06-07 Rank One Computing Corporation Optimizations for privacy-preserving distance metric computation
US12063293B2 (en) * 2018-12-12 2024-08-13 Nec Corporation Collation system, client and server
JPWO2020121458A1 (ja) * 2018-12-12 2021-10-21 日本電気株式会社 照合システム、クライアントおよびサーバ
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
WO2022162884A1 (ja) * 2021-01-29 2022-08-04 日本電気株式会社 生体認証システム、そのテンプレート更新方法、記録媒体、生体認証クライアント装置及び生体認証サーバ装置
US20230396431A1 (en) * 2022-06-02 2023-12-07 Micron Technology, Inc. Error reduction during cryptographic key updates in secure memory devices
US12493417B2 (en) * 2022-06-02 2025-12-09 Micron Technology, Inc. Verified key replacement in secure memory devices

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991414A (en) * 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
US8281148B2 (en) * 2004-11-16 2012-10-02 Koninklijke Philips Electronics N.V. Securely computing a similarity measure
JP4961214B2 (ja) 2006-03-29 2012-06-27 株式会社日立情報制御ソリューションズ 生体認証方法およびシステム
US8995665B1 (en) * 2008-08-20 2015-03-31 Symantec Corporation Role based encryption without key management system
US8958552B2 (en) * 2009-10-29 2015-02-17 Mitsubishi Electric Corporation Data processing device
JP5573293B2 (ja) * 2010-03-30 2014-08-20 富士通株式会社 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム

Also Published As

Publication number Publication date
JPWO2013080320A1 (ja) 2015-04-27
EP2787681A4 (en) 2015-10-14
CN103975553B (zh) 2016-10-12
EP2787681B1 (en) 2016-10-12
WO2013080320A1 (ja) 2013-06-06
CN103975553A (zh) 2014-08-06
US20140247939A1 (en) 2014-09-04
JP5586795B2 (ja) 2014-09-10
EP2787681A1 (en) 2014-10-08

Similar Documents

Publication Publication Date Title
IN2014CN04372A (enExample)
IN2015DN04037A (enExample)
MX2016001900A (es) Criptografia nado utilizando funciones unidireccionales.
MX2014002142A (es) Cifrado y descifrado basados en atributos jerarquicos.
BR112017017425A2 (pt) meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador
IN2014CN04110A (enExample)
MX2014004838A (es) Sistema y metodo para gestion de claves para dominio de seguridad del emisor utilizando especificaciones de plataformas globales.
ATE496500T1 (de) Verfahren zum individuellen anpassen eines hörgeräts oder einer hörhilfe
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
GB2490407B (en) Joint encryption of data
UA122327C2 (uk) Nado- криптографія з генераторами ключів
BR112013001728A2 (pt) métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador.
WO2008099831A1 (ja) 鍵生成装置、鍵導出装置、暗号化装置、復号化装置、方法、及び、プログラム
WO2014164180A3 (en) Decoy bits method for direct encryption and key generation
GB201210004D0 (en) Random number distruibution
EP3704829B8 (en) Cryptographic key generation system and method
WO2015023368A3 (en) Apparatus and method for key update for use in a block cipher algorithm
NZ603822A (en) Permutation data transform to enhance security
SG10201606165SA (en) A key generation and distribution method based on identity-based cryptography
GB2500557A (en) Data encryption
WO2012051076A3 (en) A method for securing credentials in a remote repository
WO2012106466A3 (en) Data encryption method
MY153911A (en) Dual coding coherent phase protocol
WO2013024230A3 (fr) Dispositif et procédé de compression de clés publiques pour algorithme de chiffrement pleinement homomorphique