JP2008519994A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2008519994A5 JP2008519994A5 JP2007540466A JP2007540466A JP2008519994A5 JP 2008519994 A5 JP2008519994 A5 JP 2008519994A5 JP 2007540466 A JP2007540466 A JP 2007540466A JP 2007540466 A JP2007540466 A JP 2007540466A JP 2008519994 A5 JP2008519994 A5 JP 2008519994A5
- Authority
- JP
- Japan
- Prior art keywords
- key operation
- message
- signature
- cryptographic
- self
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006870 function Effects 0.000 claims description 43
- 238000000034 method Methods 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 13
- 238000012795 verification Methods 0.000 claims description 7
- 230000000295 complement effect Effects 0.000 claims 4
- 238000012892 rational function Methods 0.000 description 17
- 238000013507 mapping Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000000996 additive effect Effects 0.000 description 5
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 239000000654 additive Substances 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 125000004122 cyclic group Chemical group 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000000926 separation method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012886 linear function Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IBPCT/IB2004/003700 | 2004-11-11 | ||
| IB2004003700 | 2004-11-11 | ||
| US62688404P | 2004-11-12 | 2004-11-12 | |
| US60/626,884 | 2004-11-12 | ||
| PCT/CA2005/001720 WO2006050605A1 (en) | 2004-11-11 | 2005-11-14 | New trapdoor one-way function on elliptic curves and their applications to shorter signatures and asymmetric encryption |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2011179245A Division JP5190142B2 (ja) | 2004-11-11 | 2011-08-18 | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2008519994A JP2008519994A (ja) | 2008-06-12 |
| JP2008519994A5 true JP2008519994A5 (enExample) | 2011-10-06 |
| JP4842276B2 JP4842276B2 (ja) | 2011-12-21 |
Family
ID=36336180
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2007540466A Expired - Lifetime JP4842276B2 (ja) | 2004-11-11 | 2005-11-14 | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
| JP2011179245A Expired - Lifetime JP5190142B2 (ja) | 2004-11-11 | 2011-08-18 | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2011179245A Expired - Lifetime JP5190142B2 (ja) | 2004-11-11 | 2011-08-18 | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
Country Status (7)
| Country | Link |
|---|---|
| US (3) | US7844051B2 (enExample) |
| EP (1) | EP1815636B1 (enExample) |
| JP (2) | JP4842276B2 (enExample) |
| CN (1) | CN101099329B (enExample) |
| AT (1) | ATE546909T1 (enExample) |
| CA (1) | CA2587474C (enExample) |
| WO (1) | WO2006050605A1 (enExample) |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8862866B2 (en) * | 2003-07-07 | 2014-10-14 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
| GB2406484B (en) | 2003-08-19 | 2007-01-31 | Certicom Corp | Method and apparatus for synchronizing an adaptable security level in an electronic communication |
| FR2877788B1 (fr) * | 2004-11-05 | 2007-01-05 | Gemplus Sa | Procede de generation de signature avec preuve de securite "tight", procede de verification et schema de signature associes bases sur le modele de diffie-hellman |
| JP4842276B2 (ja) * | 2004-11-11 | 2011-12-21 | サーティコム コーポレーション | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
| DE102005045733A1 (de) * | 2005-09-23 | 2007-04-05 | Nec Europe Ltd. | Verfahren zum Übermitteln von Nachrichten |
| EP1775880A1 (en) * | 2005-10-11 | 2007-04-18 | STMicroelectronics S.r.l. | Method of processing information to be confidentially transmitted |
| JP4911736B2 (ja) | 2006-04-13 | 2012-04-04 | サーティコム コーポレーション | 電子通信において適合可能なセキュリティレベルを提供する方法と装置 |
| US7885406B2 (en) * | 2006-10-10 | 2011-02-08 | Microsoft Corporation | Computing endomorphism rings of Abelian surfaces over finite fields |
| US9059838B2 (en) * | 2007-03-30 | 2015-06-16 | Verizon Patent And Licensing Inc. | Encryption algorithm with randomized buffer |
| US20090046849A1 (en) * | 2007-04-23 | 2009-02-19 | Bally Gaming, Inc. | Data integrity and non-repudiation method |
| FR2941115B1 (fr) * | 2009-01-14 | 2011-02-25 | Sagem Securite | Codage de points d'une courbe elliptique |
| US20100208884A1 (en) * | 2009-02-19 | 2010-08-19 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
| EP2222015A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
| US8787564B2 (en) | 2011-11-30 | 2014-07-22 | Certicom Corp. | Assessing cryptographic entropy |
| EP2798773B1 (en) | 2011-12-28 | 2020-08-26 | BlackBerry Limited | Generating digital signatures |
| WO2013153628A1 (ja) * | 2012-04-11 | 2013-10-17 | 株式会社日立製作所 | 演算処理システムおよび演算結果認証方法 |
| KR102238681B1 (ko) | 2013-07-01 | 2021-04-12 | 삼성전자주식회사 | 데이터 인증을 위한 서명 정보 생성 및 검증 방법과 이를 위한 시스템 |
| KR20150017844A (ko) * | 2013-08-08 | 2015-02-23 | 삼성전자주식회사 | 페이지 구성 방법 및 이를 지원하는 전자 장치 |
| CN103780382B (zh) * | 2014-01-13 | 2017-01-18 | 华南理工大学 | 一种基于超球面的多变量公钥加密/解密系统及方法 |
| CN103825743A (zh) * | 2014-02-13 | 2014-05-28 | 南京邮电大学 | 一种具有隐私保护功能的数据安全聚合方法 |
| CN105099693B (zh) * | 2014-05-23 | 2018-10-19 | 华为技术有限公司 | 一种传输方法及传输装置 |
| US10129026B2 (en) | 2016-05-03 | 2018-11-13 | Certicom Corp. | Method and system for cheon resistant static diffie-hellman security |
| US10320565B2 (en) * | 2017-02-28 | 2019-06-11 | Certicom Corp. | Generating an elliptic curve point in an elliptic curve cryptographic system |
| CN109714153B (zh) * | 2019-02-01 | 2022-04-08 | 铜陵学院 | 一种高效的聚合签名方法 |
| CN110363509B (zh) * | 2019-07-19 | 2022-03-29 | 华中师范大学 | 一种信息保护方法及装置 |
| KR102568418B1 (ko) * | 2021-08-26 | 2023-08-18 | 하이파이브랩 주식회사 | 다중 서명을 지원하는 전자 인증 시스템 및 방법 |
| CN116170147A (zh) * | 2023-02-01 | 2023-05-26 | 上海金仕达软件科技股份有限公司 | 一种用于国密sm2的获得不存在私钥的非对称加密公钥方法 |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0503119B1 (en) * | 1991-03-14 | 1995-09-20 | Omnisec Ag | Public key cryptographic system using elliptic curves over rings |
| US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
| US5159632A (en) * | 1991-09-17 | 1992-10-27 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
| US5577124A (en) * | 1995-03-09 | 1996-11-19 | Arithmetica, Inc. | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions |
| EP0924895B1 (en) * | 1997-12-17 | 2009-07-08 | Nippon Telegraph and Telephone Corporation | Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon |
| CA2257008C (en) * | 1998-12-24 | 2007-12-11 | Certicom Corp. | A method for accelerating cryptographic operations on elliptic curves |
| FR2788650B1 (fr) * | 1999-01-14 | 2001-02-16 | Gemplus Card Int | Procede cryptographique a cles publique et privee |
| US6507907B1 (en) * | 1999-02-26 | 2003-01-14 | Intel Corporation | Protecting information in a system |
| US6959085B1 (en) * | 1999-05-03 | 2005-10-25 | Ntru Cryptosystems, Inc. | Secure user identification based on ring homomorphisms |
| US20020199001A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for conducting a secure response communication session |
| US20020194501A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for conducting a secure interactive communication session |
| WO2003017559A2 (en) * | 2001-08-13 | 2003-02-27 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
| JP4752176B2 (ja) * | 2003-09-11 | 2011-08-17 | 日本電信電話株式会社 | 一方向性関数演算方法及び装置及びプログラム |
| US7499544B2 (en) * | 2003-11-03 | 2009-03-03 | Microsoft Corporation | Use of isogenies for design of cryptosystems |
| US7587605B1 (en) * | 2004-03-19 | 2009-09-08 | Microsoft Corporation | Cryptographic pairing-based short signature generation and verification |
| JP4842276B2 (ja) * | 2004-11-11 | 2011-12-21 | サーティコム コーポレーション | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
-
2005
- 2005-11-14 JP JP2007540466A patent/JP4842276B2/ja not_active Expired - Lifetime
- 2005-11-14 AT AT05803301T patent/ATE546909T1/de active
- 2005-11-14 CA CA2587474A patent/CA2587474C/en not_active Expired - Lifetime
- 2005-11-14 US US11/272,152 patent/US7844051B2/en active Active
- 2005-11-14 CN CN 200580046426 patent/CN101099329B/zh not_active Expired - Lifetime
- 2005-11-14 EP EP05803301A patent/EP1815636B1/en not_active Expired - Lifetime
- 2005-11-14 WO PCT/CA2005/001720 patent/WO2006050605A1/en not_active Ceased
-
2010
- 2010-11-12 US US12/945,234 patent/US8213605B2/en not_active Expired - Lifetime
-
2011
- 2011-08-18 JP JP2011179245A patent/JP5190142B2/ja not_active Expired - Lifetime
-
2012
- 2012-06-13 US US13/495,307 patent/US8782400B2/en not_active Expired - Lifetime
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5190142B2 (ja) | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 | |
| JP2008519994A5 (enExample) | ||
| Galbraith | Elliptic curve Paillier schemes | |
| Paar et al. | Introduction to public-key cryptography | |
| US7961873B2 (en) | Password protocols using XZ-elliptic curve cryptography | |
| RU2376651C2 (ru) | Использование изогений для разработки криптосистем | |
| US7961874B2 (en) | XZ-elliptic curve cryptography with secret key embedding | |
| US8111826B2 (en) | Apparatus for generating elliptic curve cryptographic parameter, apparatus for processing elliptic curve cryptograph, program for generating elliptic curve cryptographic parameter, and program for processing elliptic cyptograph | |
| US6898284B2 (en) | Cryptographic identification and digital signature method using efficient elliptic curve | |
| US20100166175A1 (en) | Cryptographic hash functions using elliptic polynomial cryptography | |
| US20050195973A1 (en) | Method for XZ-elliptic curve cryptography | |
| US8351601B2 (en) | Elliptic polynomial cryptography with secret key embedding | |
| Semmouni et al. | Bitcoin security with a twisted Edwards curve | |
| Easttom | More approaches to quantum-resistant cryptography | |
| US20120140921A1 (en) | Rsa-analogous xz-elliptic curve cryptography system and method | |
| JP2007041461A (ja) | 楕円曲線暗号におけるスカラー倍計算方法およびスカラー倍計算装置 | |
| Mohapatra | Signcryption schemes with forward secrecy based on elliptic curve cryptography | |
| JPH0798563A (ja) | 楕円曲線による署名、認証及び秘密通信方式 | |
| Dusane | Generation, Verification, and Attacks on Elliptic Curves and Their Applications in Signal Protocol | |
| Ahlqvist | Elliptic Curves and Cryptography | |
| Hasan | Elliptic Curves: A journey through theory and its applications | |
| Kultinov | Software Implementations and Applications of Elliptic Curve Cryptography | |
| Meng | Curves For the Elliptic Curve Cryptosystem | |
| McCullagh | Crytographic applications of bilinear maps | |
| DJEBAILI et al. | CRYPTANALYSIS OF DISCRETE LOGARITHMS BASED CRYPTOSYSTEMS USING CONTINUED FRACTION AND THE LEGENDRE’S RESULT |