JP2009526411A - 装置またはネットワークによって相互接続された2当事者間の交換の方法、信号伝送媒体、および装置(チャレンジ・レスポンス署名および高性能で安全なDiffie−Hellmanプロトコルに関する方法および構造) - Google Patents
装置またはネットワークによって相互接続された2当事者間の交換の方法、信号伝送媒体、および装置(チャレンジ・レスポンス署名および高性能で安全なDiffie−Hellmanプロトコルに関する方法および構造) Download PDFInfo
- Publication number
- JP2009526411A JP2009526411A JP2007554563A JP2007554563A JP2009526411A JP 2009526411 A JP2009526411 A JP 2009526411A JP 2007554563 A JP2007554563 A JP 2007554563A JP 2007554563 A JP2007554563 A JP 2007554563A JP 2009526411 A JP2009526411 A JP 2009526411A
- Authority
- JP
- Japan
- Prior art keywords
- value
- key
- hat
- function
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Strategic Management (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- General Business, Economics & Management (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US65179805P | 2005-02-10 | 2005-02-10 | |
| US11/348,304 US7747865B2 (en) | 2005-02-10 | 2006-02-07 | Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols |
| PCT/EP2006/050841 WO2006084896A1 (en) | 2005-02-10 | 2006-02-10 | Challenge-response signatures and secure diffie-hellman protocols |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2009526411A true JP2009526411A (ja) | 2009-07-16 |
| JP2009526411A5 JP2009526411A5 (enExample) | 2010-09-02 |
Family
ID=36781288
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2007554563A Withdrawn JP2009526411A (ja) | 2005-02-10 | 2006-02-10 | 装置またはネットワークによって相互接続された2当事者間の交換の方法、信号伝送媒体、および装置(チャレンジ・レスポンス署名および高性能で安全なDiffie−Hellmanプロトコルに関する方法および構造) |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US7747865B2 (enExample) |
| EP (1) | EP1847062B1 (enExample) |
| JP (1) | JP2009526411A (enExample) |
| AT (1) | ATE403297T1 (enExample) |
| CA (1) | CA2596500C (enExample) |
| DE (1) | DE602006002025D1 (enExample) |
| ES (1) | ES2308725T3 (enExample) |
| WO (1) | WO2006084896A1 (enExample) |
Cited By (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009130872A (ja) * | 2007-11-28 | 2009-06-11 | Nippon Telegr & Teleph Corp <Ntt> | 鍵共有方法、第1装置、第2装置、及び、それらのプログラム |
| JP2011061306A (ja) * | 2009-09-07 | 2011-03-24 | Nippon Telegr & Teleph Corp <Ntt> | 情報共有システム、方法及びプログラム |
| JP2012151648A (ja) * | 2011-01-19 | 2012-08-09 | Nippon Telegr & Teleph Corp <Ntt> | 情報共有方法、情報共有システム、情報共有装置、及びプログラム |
| JP2014050084A (ja) * | 2012-09-04 | 2014-03-17 | Nippon Telegr & Teleph Corp <Ntt> | 鍵交換システム、要求装置、応答装置、鍵交換方法、およびプログラム |
| JP2017501637A (ja) * | 2014-01-02 | 2017-01-12 | テンセント・テクノロジー・(シェンジェン)・カンパニー・リミテッド | 署名検証方法、装置、およびシステム |
| JP2019507510A (ja) * | 2016-02-23 | 2019-03-14 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 情報及び階層的で決定性の暗号化鍵のセキュアな交換のための共通秘密の決定 |
| JP2019511035A (ja) * | 2016-02-23 | 2019-04-18 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | スマートコントラクトに基づく自動給与支払方法及びシステムをもたらす、ブロックチェーン上の給与支払に関連付けられた暗号通貨の効率的な転送のための方法及びシステム |
| US10659223B2 (en) | 2016-02-23 | 2020-05-19 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| US10715336B2 (en) | 2016-02-23 | 2020-07-14 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
| US11120437B2 (en) | 2016-02-23 | 2021-09-14 | nChain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
| US11182782B2 (en) | 2016-02-23 | 2021-11-23 | nChain Holdings Limited | Tokenisation method and system for implementing exchanges on a blockchain |
| US11194898B2 (en) | 2016-02-23 | 2021-12-07 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
| JP2022037089A (ja) * | 2016-02-23 | 2022-03-08 | エヌチェーン ホールディングス リミテッド | ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム |
| US11308486B2 (en) | 2016-02-23 | 2022-04-19 | nChain Holdings Limited | Method and system for the secure transfer of entities on a blockchain |
| US11373152B2 (en) | 2016-02-23 | 2022-06-28 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
| US11410145B2 (en) | 2016-02-23 | 2022-08-09 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
| US11455378B2 (en) | 2016-02-23 | 2022-09-27 | nChain Holdings Limited | Method and system for securing computer software using a distributed hash table and a blockchain |
| US11606219B2 (en) | 2016-02-23 | 2023-03-14 | Nchain Licensing Ag | System and method for controlling asset-related actions via a block chain |
| US11625694B2 (en) | 2016-02-23 | 2023-04-11 | Nchain Licensing Ag | Blockchain-based exchange with tokenisation |
| US12107952B2 (en) | 2016-02-23 | 2024-10-01 | Nchain Licensing Ag | Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain |
| US12505435B2 (en) | 2016-02-23 | 2025-12-23 | Nchain Licensing Ag | Registry and automated management method for blockchain-enforced smart contracts |
Families Citing this family (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9054861B2 (en) * | 2005-06-14 | 2015-06-09 | Certicom Corp. | Enhanced key agreement and transport protocol |
| DE102007001070B3 (de) * | 2006-09-29 | 2008-04-30 | Siemens Ag | Verfahren zum verschlüsselten Datenausgleich eines Systems mit mindestens einem Datenträger und einem Lesegerät |
| KR100753843B1 (ko) | 2006-09-29 | 2007-08-31 | 한국전자통신연구원 | 양 방향 채널 환경에서의 키 교환 프로토콜을 단 방향 채널환경에서의 키 교환 프로토콜로 변환하는 방법 |
| KR101356736B1 (ko) * | 2007-01-19 | 2014-02-06 | 삼성전자주식회사 | 콘텐츠의 무결성을 확인하기 위한 콘텐츠 제공 장치 및방법 및 콘텐츠 사용 장치 및 방법, 및 콘텐츠 사용 장치를폐지하는 콘텐츠 제공 장치 및 방법 |
| US8190883B2 (en) * | 2007-02-26 | 2012-05-29 | Picup, Llc | Network identity management system and method |
| CN101175076B (zh) * | 2007-10-23 | 2012-01-11 | 赵运磊 | 在线计算高效、可抵赖、不可锻造安全的密钥交换方法 |
| US8533474B2 (en) * | 2008-02-27 | 2013-09-10 | Red Hat, Inc. | Generating session keys |
| EP2124382A1 (de) * | 2008-05-20 | 2009-11-25 | Siemens Aktiengesellschaft | Verfahren zum verschlüsselten Datenaustausch und Kommunikationssystem |
| CA2746830C (en) | 2008-12-16 | 2016-06-07 | Daniel R. L. Brown | Acceleration of key agreement protocols |
| US10068282B2 (en) * | 2009-06-24 | 2018-09-04 | Uniloc 2017 Llc | System and method for preventing multiple online purchases |
| EP2334008A1 (en) * | 2009-12-10 | 2011-06-15 | Tata Consultancy Services Limited | A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure |
| US9439067B2 (en) | 2011-09-12 | 2016-09-06 | George Cherian | Systems and methods of performing link setup and authentication |
| US8837741B2 (en) | 2011-09-12 | 2014-09-16 | Qualcomm Incorporated | Systems and methods for encoding exchanges with a set of shared ephemeral key data |
| US9143937B2 (en) | 2011-09-12 | 2015-09-22 | Qualcomm Incorporated | Wireless communication using concurrent re-authentication and connection setup |
| CN104396181B (zh) * | 2012-02-09 | 2018-02-23 | 爱迪德技术有限公司 | 用于生成和保护密码密钥的系统和方法 |
| EP2677681A1 (de) * | 2012-06-19 | 2013-12-25 | Bundesrepublik Deutschland, vertreten durch das Bundesministerium des Innern, vertreten durch das Bundesamt für Sicherheit | Verfahren zur zumindest einseitig authentisierten, sicheren Kommunikation zwischen zwei Kommunikationspartnern |
| EP2974129B1 (en) * | 2013-03-15 | 2020-03-11 | Assa Abloy AB | Non-repudiation of electronic transactions |
| US9294503B2 (en) | 2013-08-26 | 2016-03-22 | A10 Networks, Inc. | Health monitor based distributed denial of service attack mitigation |
| EP3158680B1 (en) * | 2014-06-18 | 2021-02-24 | Visa International Service Association | Efficient methods for authenticated communication |
| US9756071B1 (en) | 2014-09-16 | 2017-09-05 | A10 Networks, Inc. | DNS denial of service attack protection |
| US9537886B1 (en) | 2014-10-23 | 2017-01-03 | A10 Networks, Inc. | Flagging security threats in web service requests |
| US9584318B1 (en) | 2014-12-30 | 2017-02-28 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack defense |
| US9900343B1 (en) | 2015-01-05 | 2018-02-20 | A10 Networks, Inc. | Distributed denial of service cellular signaling |
| US9848013B1 (en) * | 2015-02-05 | 2017-12-19 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack detection |
| US10063591B1 (en) | 2015-02-14 | 2018-08-28 | A10 Networks, Inc. | Implementing and optimizing secure socket layer intercept |
| KR102033465B1 (ko) | 2015-02-27 | 2019-10-17 | 텔레호낙티에볼라게트 엘엠 에릭슨(피유비엘) | 통신 디바이스와 네트워크 디바이스 사이의 통신에서의 보안 설비 |
| US20170063853A1 (en) * | 2015-07-10 | 2017-03-02 | Infineon Technologies Ag | Data cipher and decipher based on device and data authentication |
| US10505984B2 (en) | 2015-12-08 | 2019-12-10 | A10 Networks, Inc. | Exchange of control information between secure socket layer gateways |
| US10469594B2 (en) | 2015-12-08 | 2019-11-05 | A10 Networks, Inc. | Implementation of secure socket layer intercept |
| US11184168B2 (en) * | 2016-02-19 | 2021-11-23 | Nec Corporation | Method for storing data on a storage entity |
| US10116634B2 (en) | 2016-06-28 | 2018-10-30 | A10 Networks, Inc. | Intercepting secure session upon receipt of untrusted certificate |
| SG10201606164TA (en) * | 2016-07-26 | 2018-02-27 | Huawei Int Pte Ltd | System and method for obtaining a common session key between devices |
| US10158666B2 (en) | 2016-07-26 | 2018-12-18 | A10 Networks, Inc. | Mitigating TCP SYN DDoS attacks using TCP reset |
| US11012435B2 (en) | 2017-12-19 | 2021-05-18 | International Business Machines Corporation | Multi factor authentication |
| US11122033B2 (en) * | 2017-12-19 | 2021-09-14 | International Business Machines Corporation | Multi factor authentication |
| CN109995509B (zh) * | 2019-05-08 | 2021-07-06 | 西安电子科技大学 | 基于消息恢复签名的认证密钥交换方法 |
| WO2023011702A1 (en) * | 2021-08-03 | 2023-02-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Establishment of forward secrecy during digest authentication |
| CN114154200B (zh) * | 2021-12-09 | 2024-05-24 | 山东大学 | 基于可交换弱伪随机函数的隐私集合求并方法及系统 |
| US11973861B2 (en) * | 2022-02-09 | 2024-04-30 | Northrop Grumman Systems Corporation | Secure key generation |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
| US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
| US6487661B2 (en) * | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
| US5761305A (en) | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US6226383B1 (en) * | 1996-04-17 | 2001-05-01 | Integrity Sciences, Inc. | Cryptographic methods for remote authentication |
| GB9621274D0 (en) * | 1996-10-11 | 1996-11-27 | Certicom Corp | Signature protocol for mail delivery |
| CA2369540C (en) * | 2001-12-31 | 2013-10-01 | Certicom Corp. | Method and apparatus for computing a shared secret key |
| US7073068B2 (en) * | 2002-05-24 | 2006-07-04 | Lucent Technologies Inc. | Method and apparatus for distributing shares of a password for use in multi-server password authentication |
-
2006
- 2006-02-07 US US11/348,304 patent/US7747865B2/en not_active Expired - Fee Related
- 2006-02-10 AT AT06708184T patent/ATE403297T1/de not_active IP Right Cessation
- 2006-02-10 CA CA2596500A patent/CA2596500C/en active Active
- 2006-02-10 EP EP06708184A patent/EP1847062B1/en active Active
- 2006-02-10 ES ES06708184T patent/ES2308725T3/es active Active
- 2006-02-10 WO PCT/EP2006/050841 patent/WO2006084896A1/en not_active Ceased
- 2006-02-10 DE DE602006002025T patent/DE602006002025D1/de active Active
- 2006-02-10 JP JP2007554563A patent/JP2009526411A/ja not_active Withdrawn
Non-Patent Citations (1)
| Title |
|---|
| JPN6010044353, Hugo Krawczyk, "HMQV:A High−Performance Secure Diffie−Hellman Protocol", Cryptology ePrint Archive, 20050706, Report 2005/176, p.1−62 * |
Cited By (52)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009130872A (ja) * | 2007-11-28 | 2009-06-11 | Nippon Telegr & Teleph Corp <Ntt> | 鍵共有方法、第1装置、第2装置、及び、それらのプログラム |
| JP2011061306A (ja) * | 2009-09-07 | 2011-03-24 | Nippon Telegr & Teleph Corp <Ntt> | 情報共有システム、方法及びプログラム |
| JP2012151648A (ja) * | 2011-01-19 | 2012-08-09 | Nippon Telegr & Teleph Corp <Ntt> | 情報共有方法、情報共有システム、情報共有装置、及びプログラム |
| JP2014050084A (ja) * | 2012-09-04 | 2014-03-17 | Nippon Telegr & Teleph Corp <Ntt> | 鍵交換システム、要求装置、応答装置、鍵交換方法、およびプログラム |
| JP2017501637A (ja) * | 2014-01-02 | 2017-01-12 | テンセント・テクノロジー・(シェンジェン)・カンパニー・リミテッド | 署名検証方法、装置、およびシステム |
| US10915896B2 (en) | 2014-01-02 | 2021-02-09 | Tencent Technology (Shenzhen) Company Limited | Signature verification method, apparatus, and system |
| US11854003B2 (en) | 2014-01-02 | 2023-12-26 | Tencent Technology (Shenzhen) Company Limited | Signature verification method, apparatus, and system |
| JP2019507510A (ja) * | 2016-02-23 | 2019-03-14 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 情報及び階層的で決定性の暗号化鍵のセキュアな交換のための共通秘密の決定 |
| JP2019511035A (ja) * | 2016-02-23 | 2019-04-18 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | スマートコントラクトに基づく自動給与支払方法及びシステムをもたらす、ブロックチェーン上の給与支払に関連付けられた暗号通貨の効率的な転送のための方法及びシステム |
| US10652014B2 (en) | 2016-02-23 | 2020-05-12 | nChain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| US10659223B2 (en) | 2016-02-23 | 2020-05-19 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| US10715336B2 (en) | 2016-02-23 | 2020-07-14 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
| JP2021044828A (ja) * | 2016-02-23 | 2021-03-18 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送 |
| US11120437B2 (en) | 2016-02-23 | 2021-09-14 | nChain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
| US11126976B2 (en) | 2016-02-23 | 2021-09-21 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
| US11182782B2 (en) | 2016-02-23 | 2021-11-23 | nChain Holdings Limited | Tokenisation method and system for implementing exchanges on a blockchain |
| US11194898B2 (en) | 2016-02-23 | 2021-12-07 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
| JP2022037089A (ja) * | 2016-02-23 | 2022-03-08 | エヌチェーン ホールディングス リミテッド | ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム |
| US11308486B2 (en) | 2016-02-23 | 2022-04-19 | nChain Holdings Limited | Method and system for the secure transfer of entities on a blockchain |
| US11347838B2 (en) | 2016-02-23 | 2022-05-31 | Nchain Holdings Ltd. | Blockchain implemented counting system and method for use in secure voting and distribution |
| US11349645B2 (en) | 2016-02-23 | 2022-05-31 | Nchain Holdings Ltd. | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| US11356280B2 (en) | 2016-02-23 | 2022-06-07 | Nchain Holdings Ltd | Personal device security using cryptocurrency wallets |
| JP7083754B2 (ja) | 2016-02-23 | 2022-06-13 | エヌチェーン ホールディングス リミテッド | スマートコントラクトに基づく自動給与支払方法及びシステムをもたらす、ブロックチェーン上の給与支払に関連付けられた暗号通貨の効率的な転送のための方法及びシステム |
| US11373152B2 (en) | 2016-02-23 | 2022-06-28 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
| US11410145B2 (en) | 2016-02-23 | 2022-08-09 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
| US11455378B2 (en) | 2016-02-23 | 2022-09-27 | nChain Holdings Limited | Method and system for securing computer software using a distributed hash table and a blockchain |
| JP7164580B2 (ja) | 2016-02-23 | 2022-11-01 | エヌチェーン ホールディングス リミテッド | ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送 |
| JP7164580B6 (ja) | 2016-02-23 | 2022-11-28 | エヌチェーン ライセンシング アーゲー | ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送 |
| US11606219B2 (en) | 2016-02-23 | 2023-03-14 | Nchain Licensing Ag | System and method for controlling asset-related actions via a block chain |
| US11621833B2 (en) | 2016-02-23 | 2023-04-04 | Nchain Licensing Ag | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| US11625694B2 (en) | 2016-02-23 | 2023-04-11 | Nchain Licensing Ag | Blockchain-based exchange with tokenisation |
| JP7292365B2 (ja) | 2016-02-23 | 2023-06-16 | エヌチェーン ライセンシング アーゲー | ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム |
| US11727501B2 (en) | 2016-02-23 | 2023-08-15 | Nchain Licensing Ag | Cryptographic method and system for secure extraction of data from a blockchain |
| US11755718B2 (en) | 2016-02-23 | 2023-09-12 | Nchain Licensing Ag | Blockchain implemented counting system and method for use in secure voting and distribution |
| US11936774B2 (en) | 2016-02-23 | 2024-03-19 | Nchain Licensing Ag | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| US11972422B2 (en) | 2016-02-23 | 2024-04-30 | Nchain Licensing Ag | Registry and automated management method for blockchain-enforced smart contracts |
| US12032677B2 (en) | 2016-02-23 | 2024-07-09 | Nchain Licensing Ag | Agent-based turing complete transactions integrating feedback within a blockchain system |
| US12107952B2 (en) | 2016-02-23 | 2024-10-01 | Nchain Licensing Ag | Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain |
| US12182805B2 (en) | 2016-02-23 | 2024-12-31 | Nchain Licensing Ag | Tokenisation method and system for implementing exchanges on a blockchain |
| US12217224B2 (en) | 2016-02-23 | 2025-02-04 | Nchain Licensing Ag | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
| US12248539B2 (en) | 2016-02-23 | 2025-03-11 | Nchain Licensing Ag | Method and system for securing computer software using a distributed hash table and a blockchain |
| US12254452B2 (en) | 2016-02-23 | 2025-03-18 | Nchain Licensing Ag | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
| US12271466B2 (en) | 2016-02-23 | 2025-04-08 | Nchain Licensing Ag | Blockchain implemented counting system and method for use in secure voting and distribution |
| US12294661B2 (en) | 2016-02-23 | 2025-05-06 | Nchain Licensing Ag | Personal device security using cryptocurrency wallets |
| US12314379B2 (en) | 2016-02-23 | 2025-05-27 | Nchain Licensing Ag | Agent-based turing complete transactions integrating feedback within a blockchain system |
| US12321930B2 (en) | 2016-02-23 | 2025-06-03 | Nchain Licensing Ag | Method and system for the secure transfer of entities on a blockchain |
| US12367468B2 (en) | 2016-02-23 | 2025-07-22 | Nchain Licensing Ag | Blockchain-implemented method for control and distribution of digital content |
| US12406237B2 (en) | 2016-02-23 | 2025-09-02 | Nchain Licensing Ag | Universal tokenisation system for blockchain-based cryptocurrencies |
| US12470369B2 (en) | 2016-02-23 | 2025-11-11 | Nchain Licensing Ag | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| US12470371B2 (en) | 2016-02-23 | 2025-11-11 | Nchain Licensing Ag | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| US12499424B2 (en) | 2016-02-23 | 2025-12-16 | Nchain Licensing Ag | Blockchain-based exchange with tokenisation |
| US12505435B2 (en) | 2016-02-23 | 2025-12-23 | Nchain Licensing Ag | Registry and automated management method for blockchain-enforced smart contracts |
Also Published As
| Publication number | Publication date |
|---|---|
| ES2308725T3 (es) | 2008-12-01 |
| EP1847062B1 (en) | 2008-07-30 |
| DE602006002025D1 (de) | 2008-09-11 |
| CA2596500A1 (en) | 2006-08-17 |
| US7747865B2 (en) | 2010-06-29 |
| EP1847062A1 (en) | 2007-10-24 |
| WO2006084896A1 (en) | 2006-08-17 |
| CA2596500C (en) | 2014-03-25 |
| ATE403297T1 (de) | 2008-08-15 |
| US20060179319A1 (en) | 2006-08-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2009526411A (ja) | 装置またはネットワークによって相互接続された2当事者間の交換の方法、信号伝送媒体、および装置(チャレンジ・レスポンス署名および高性能で安全なDiffie−Hellmanプロトコルに関する方法および構造) | |
| Krawczyk | HMQV: A high-performance secure Diffie-Hellman protocol | |
| JP4384728B2 (ja) | 内在的署名を用いた鍵一致及び輸送プロトコル | |
| US7139917B2 (en) | Systems, methods and software for remote password authentication using multiple servers | |
| JP2001313634A (ja) | 通信方法 | |
| CN103155480B (zh) | 认证装置和认证方法 | |
| Cremers et al. | One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. | |
| US20160352689A1 (en) | Key agreement protocol | |
| Yoon et al. | A new authentication scheme for session initiation protocol | |
| Abusukhon et al. | An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm | |
| CN101116281A (zh) | 询问-应答签名和安全迪菲-海尔曼协议 | |
| Farash et al. | A provably secure and efficient two‐party password‐based explicit authenticated key exchange protocol resistance to password guessing attacks | |
| Zhao et al. | sHMQV: An efficient key exchange protocol for power-limited devices | |
| Damgård et al. | On the theory and practice of personal digital signatures | |
| Ogata et al. | How to use your brain for cryptography without trustworthy machines | |
| Vesterås | Analysis of key agreement protocols | |
| Yeun | Design, analysis and applications of cryptographic techniques | |
| Asbullah et al. | A proposed CCA-secure encryption on an ElGamal variant | |
| Krzywiecki et al. | Deniable key establishment resistance against eKCI attacks | |
| Shim | The risks of compromising secret information | |
| Glushachenko | Public key cryptosystems and their application in digital signature algorithms | |
| Mendrofa et al. | Unlocking the Future of Digital Currency: A Comparative Study of ECDSA vs. EdDSA Signatures with Oblivious Transfer Protocol | |
| Luo et al. | Secure authentication protocols resistant to guessing attacks | |
| Mangipudi | New authentication and key agreement protocols for wireless applications | |
| Farash et al. | Security of multiple-key agreement protocols and propose an enhanced protocol |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100712 |
|
| A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20100712 |
|
| A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20100727 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100803 |
|
| A761 | Written withdrawal of application |
Free format text: JAPANESE INTERMEDIATE CODE: A761 Effective date: 20100902 |