JP2002527992A - n人の加入者用の共通の暗号用の鍵の確立方法 - Google Patents
n人の加入者用の共通の暗号用の鍵の確立方法Info
- Publication number
- JP2002527992A JP2002527992A JP2000576579A JP2000576579A JP2002527992A JP 2002527992 A JP2002527992 A JP 2002527992A JP 2000576579 A JP2000576579 A JP 2000576579A JP 2000576579 A JP2000576579 A JP 2000576579A JP 2002527992 A JP2002527992 A JP 2002527992A
- Authority
- JP
- Japan
- Prior art keywords
- tree
- subscribers
- subscriber
- new
- leaves
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19847941.7 | 1998-10-09 | ||
| DE19847941A DE19847941A1 (de) | 1998-10-09 | 1998-10-09 | Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer |
| PCT/EP1999/007051 WO2000022775A1 (de) | 1998-10-09 | 1999-09-22 | Verfahren zum etablieren eines gemeinsamen kryptografischen schüssels für n teilnehmer |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2002527992A true JP2002527992A (ja) | 2002-08-27 |
| JP2002527992A5 JP2002527992A5 (enExample) | 2006-11-09 |
Family
ID=7884814
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2000576579A Pending JP2002527992A (ja) | 1998-10-09 | 1999-09-22 | n人の加入者用の共通の暗号用の鍵の確立方法 |
Country Status (7)
| Country | Link |
|---|---|
| US (2) | US7606369B1 (enExample) |
| EP (1) | EP1119942B1 (enExample) |
| JP (1) | JP2002527992A (enExample) |
| AT (1) | ATE247349T1 (enExample) |
| DE (2) | DE19847941A1 (enExample) |
| HU (1) | HU223920B1 (enExample) |
| WO (1) | WO2000022775A1 (enExample) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006262230A (ja) * | 2005-03-18 | 2006-09-28 | Sony Corp | 情報処理システム、情報解析装置および方法、情報処理装置および方法、並びにプログラム |
| JP2011223544A (ja) * | 2010-04-08 | 2011-11-04 | Industry & Academic Cooperation In Chungnam National Univer (Iac) | 強力なscadaシステムのハイブリッドキー管理方法及びセッションキー生成方法 |
| WO2018216749A1 (ja) * | 2017-05-25 | 2018-11-29 | Necネットワーク・センサ株式会社 | 暗号通信方法、情報処理装置及びプログラム |
| JP2020005079A (ja) * | 2018-06-27 | 2020-01-09 | Kddi株式会社 | 鍵合意システム及び鍵生成装置 |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4622064B2 (ja) | 2000-04-06 | 2011-02-02 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
| WO2004102871A1 (en) * | 2003-05-13 | 2004-11-25 | Telecom Italia S.P.A. | A process for secure communication over a wireless network, related network and computer program product |
| JP2006135840A (ja) * | 2004-11-09 | 2006-05-25 | Sony Corp | 鍵共有状態移行方法、システム、並びに情報記憶媒体 |
| WO2008026184A2 (en) * | 2006-08-31 | 2008-03-06 | Koninklijke Philips Electronics N.V. | Method of key management |
| FR2922392B1 (fr) * | 2007-10-12 | 2011-03-04 | Thales Sa | Dispositif et procede pour aiguiller des flux d'echange de valeurs publiques (ou non sensibles) permettant de creer des cles secretes communes entre plusieurs zones. |
| US20150036820A1 (en) * | 2013-07-30 | 2015-02-05 | Gideon Samid | Probability Durable Entropic Advantage |
| CN112422276B (zh) * | 2020-11-04 | 2022-03-25 | 郑州信大捷安信息技术股份有限公司 | 一种多方密钥协商的实现方法及系统 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0389737A (ja) * | 1989-08-25 | 1991-04-15 | Motorola Inc | 階層型キー管理システム |
| JPH05327748A (ja) * | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | 同報通信システム |
| JPH0738555A (ja) * | 1993-06-25 | 1995-02-07 | Sony Corp | 公開鍵暗号処理システムと方法 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
| US4661658A (en) * | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
| US4914569A (en) * | 1987-10-30 | 1990-04-03 | International Business Machines Corporation | Method for concurrent record access, insertion, deletion and alteration using an index tree |
| US5315658B1 (en) * | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use |
| IL106796A (en) * | 1993-08-25 | 1997-11-20 | Algorithmic Res Ltd | Broadcast encryption |
| DE19511298B4 (de) * | 1995-03-28 | 2005-08-18 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
| DE19538385A1 (de) * | 1995-10-14 | 1997-04-17 | Deutsche Telekom Ag | Verfahren zur Etablierung eines gemeinsamen Schlüssels für autorisierte Personen durch eine Zentrale |
| DE19649292A1 (de) * | 1996-11-28 | 1998-06-04 | Deutsche Telekom Ag | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
| US6049878A (en) * | 1998-01-20 | 2000-04-11 | Sun Microsystems, Inc. | Efficient, secure multicasting with global knowledge |
| US6041122A (en) * | 1998-02-27 | 2000-03-21 | Intel Corporation | Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation |
-
1998
- 1998-10-09 DE DE19847941A patent/DE19847941A1/de not_active Withdrawn
-
1999
- 1999-09-22 US US09/807,181 patent/US7606369B1/en not_active Expired - Fee Related
- 1999-09-22 HU HU0104054A patent/HU223920B1/hu not_active IP Right Cessation
- 1999-09-22 WO PCT/EP1999/007051 patent/WO2000022775A1/de not_active Ceased
- 1999-09-22 EP EP99970528A patent/EP1119942B1/de not_active Expired - Lifetime
- 1999-09-22 JP JP2000576579A patent/JP2002527992A/ja active Pending
- 1999-09-22 DE DE59906607T patent/DE59906607D1/de not_active Expired - Lifetime
- 1999-09-22 AT AT99970528T patent/ATE247349T1/de active
-
2009
- 2009-10-20 US US12/582,651 patent/US20100054464A1/en not_active Abandoned
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0389737A (ja) * | 1989-08-25 | 1991-04-15 | Motorola Inc | 階層型キー管理システム |
| JPH05327748A (ja) * | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | 同報通信システム |
| JPH0738555A (ja) * | 1993-06-25 | 1995-02-07 | Sony Corp | 公開鍵暗号処理システムと方法 |
Non-Patent Citations (4)
| Title |
|---|
| JPN6010009852, J. Schwenk, ""Establishing a key hierarchy for Conditional Access without encryption"", Communications and Multimedia Security II, 1996, p.176−182, GB, CHAPMAN & HALL * |
| JPN7010000554, David A. McGrew and Alan T. Sherman, ""Key Establishment in Large Dynamic Groups Using One−Way Function Trees"", インターネット, 19980520, p.1−13 * |
| JPN7010000555, Michael Steiner, Gene Tsudik, Michael Waidner, ""Diffie−Hellman Key Distribution Extended to Group Communication"", Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996, p.31−37 * |
| JPN7010000556, Michael Steiner, Gene Tsudik, Michael Waidner, ""CLIQUES: A New Approach to Group Key Agreement"", 18th IEEE International Conference on Distributed Computing Systems (ICDCS’98), 19980526, p.380−387 * |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2006262230A (ja) * | 2005-03-18 | 2006-09-28 | Sony Corp | 情報処理システム、情報解析装置および方法、情報処理装置および方法、並びにプログラム |
| JP2011223544A (ja) * | 2010-04-08 | 2011-11-04 | Industry & Academic Cooperation In Chungnam National Univer (Iac) | 強力なscadaシステムのハイブリッドキー管理方法及びセッションキー生成方法 |
| WO2018216749A1 (ja) * | 2017-05-25 | 2018-11-29 | Necネットワーク・センサ株式会社 | 暗号通信方法、情報処理装置及びプログラム |
| JPWO2018216749A1 (ja) * | 2017-05-25 | 2020-03-26 | Necネットワーク・センサ株式会社 | 暗号通信方法、情報処理装置及びプログラム |
| US11411744B2 (en) | 2017-05-25 | 2022-08-09 | Nec Network And Sensor Systems, Ltd. | Encryption communication method, information processing apparatus, and program |
| JP2020005079A (ja) * | 2018-06-27 | 2020-01-09 | Kddi株式会社 | 鍵合意システム及び鍵生成装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| HU223920B1 (hu) | 2005-03-29 |
| WO2000022775A1 (de) | 2000-04-20 |
| ATE247349T1 (de) | 2003-08-15 |
| DE19847941A1 (de) | 2000-04-13 |
| EP1119942A1 (de) | 2001-08-01 |
| DE59906607D1 (de) | 2003-09-18 |
| HUP0104054A2 (hu) | 2002-03-28 |
| US20100054464A1 (en) | 2010-03-04 |
| HUP0104054A3 (en) | 2003-05-28 |
| US7606369B1 (en) | 2009-10-20 |
| EP1119942B1 (de) | 2003-08-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MacKenzie et al. | Threshold password-authenticated key exchange | |
| CN108352015B (zh) | 用于基于区块链的系统结合钱包管理系统的安全多方防遗失存储和加密密钥转移 | |
| TWI821248B (zh) | 用以移轉數位資產支配權之電腦實施方法及系統 | |
| Mandt et al. | Certificateless authenticated two-party key agreement protocols | |
| JP4527358B2 (ja) | 鍵供託を使用しない、認証された個別暗号システム | |
| US9166778B2 (en) | Secure group messaging | |
| US9106410B2 (en) | Identity based authenticated key agreement protocol | |
| JP2599871B2 (ja) | 暗号鍵を生成する方法 | |
| JP5171991B2 (ja) | 鍵合意および移送プロトコル | |
| US7716482B2 (en) | Conference session key distribution method in an ID-based cryptographic system | |
| US6987855B1 (en) | Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups | |
| CN111404950B (zh) | 一种基于区块链网络的信息共享方法、装置和相关设备 | |
| US20120257745A1 (en) | Split-Key Key-Agreement Protocol | |
| US20100054464A1 (en) | Process for establishing a common cryptographic key for n subscribers | |
| CN102017510A (zh) | 自封闭联合知识证明和Diffie-Hellman密钥交换方法与结构 | |
| Steiner et al. | Secure password-based cipher suite for TLS | |
| Kumar et al. | Anonymous ID-based Group Key Agreement Protocol without Pairing. | |
| Elashry et al. | A resilient identity‐based authenticated key exchange protocol | |
| Zhu et al. | Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. | |
| US7035405B1 (en) | Method for establishing a common key between a central station and a group of subscribers | |
| Duits | The post-quantum Signal protocol: Secure chat in a quantum world | |
| WO2022185328A1 (en) | System and method for identity-based key agreement for secure communication | |
| Yoneyama | Efficient and strongly secure password-based server aided key exchange | |
| Aggarwal | Survey and taxonomy of key management protocols for wired and wireless networks | |
| JP3699618B2 (ja) | 暗号鍵取得方法及び暗号鍵交換装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20060920 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20060920 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100224 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20100712 |