JP2015521003A - 暗号鍵の決定 - Google Patents
暗号鍵の決定 Download PDFInfo
- Publication number
- JP2015521003A JP2015521003A JP2015513298A JP2015513298A JP2015521003A JP 2015521003 A JP2015521003 A JP 2015521003A JP 2015513298 A JP2015513298 A JP 2015513298A JP 2015513298 A JP2015513298 A JP 2015513298A JP 2015521003 A JP2015521003 A JP 2015521003A
- Authority
- JP
- Japan
- Prior art keywords
- key
- communication unit
- identifier
- cryptographic
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 461
- 238000000034 method Methods 0.000 claims description 47
- 238000009826 distribution Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 7
- 230000001419 dependent effect Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 202
- 238000013459 approach Methods 0.000 description 27
- 238000012790 confirmation Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 9
- 230000009467 reduction Effects 0.000 description 9
- 230000008520 organization Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 5
- 238000009827 uniform distribution Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000009021 linear effect Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009022 nonlinear effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- VIEYMVWPECAOCY-UHFFFAOYSA-N 7-amino-4-(chloromethyl)chromen-2-one Chemical compound ClCC1=CC(=O)OC2=CC(N)=CC=C21 VIEYMVWPECAOCY-UHFFFAOYSA-N 0.000 description 1
- 238000012935 Averaging Methods 0.000 description 1
- 101100203322 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) SKS1 gene Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (7)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261649464P | 2012-05-21 | 2012-05-21 | |
| US61/649,464 | 2012-05-21 | ||
| EP12196092.6 | 2012-07-12 | ||
| US201261732997P | 2012-12-04 | 2012-12-04 | |
| US61/732,997 | 2012-12-04 | ||
| EP12196092 | 2012-12-07 | ||
| PCT/IB2013/053224 WO2013175324A1 (en) | 2012-05-21 | 2013-04-24 | Determination of cryptographic keys |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2015521003A true JP2015521003A (ja) | 2015-07-23 |
| JP2015521003A5 JP2015521003A5 (enExample) | 2016-06-16 |
Family
ID=47435744
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015513298A Pending JP2015521003A (ja) | 2012-05-21 | 2013-04-24 | 暗号鍵の決定 |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20150134960A1 (enExample) |
| EP (1) | EP2853058A1 (enExample) |
| JP (1) | JP2015521003A (enExample) |
| CN (1) | CN104303450A (enExample) |
| BR (1) | BR112014028757A2 (enExample) |
| MX (1) | MX340269B (enExample) |
| RU (1) | RU2014151791A (enExample) |
| WO (1) | WO2013175324A1 (enExample) |
| ZA (1) | ZA201409419B (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2023539152A (ja) * | 2020-08-19 | 2023-09-13 | エスエヌツーエヌ,エルエルシー | 既知のユーザ間のセキュアな通信 |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| RU2661564C2 (ru) * | 2013-02-28 | 2018-07-19 | Конинклейке Филипс Н.В. | Генератор случайных чисел и поточный шифр |
| SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
| SE540133C2 (en) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
| SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
| SE542460C2 (en) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
| SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
| US11088834B2 (en) * | 2015-04-28 | 2021-08-10 | Palo Alto Research Center Incorporated | System for privacy-preserving monetization of big data and method for using the same |
| JP2022091498A (ja) * | 2020-12-09 | 2022-06-21 | セイコーエプソン株式会社 | 暗号通信システム、暗号通信方法および暗号通信装置 |
| CN113965325B (zh) * | 2021-10-20 | 2023-07-25 | 成都卫士通信息产业股份有限公司 | 数据传输认证方法、装置、电子设备及计算机存储介质 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10164047A (ja) * | 1996-11-29 | 1998-06-19 | Oki Electric Ind Co Ltd | 暗号通信システム |
| JP2000092038A (ja) * | 1998-09-16 | 2000-03-31 | Murata Mach Ltd | 暗号通信方法及び暗号化方法並びに暗号通信システム |
| JP2012504888A (ja) * | 2008-10-06 | 2012-02-23 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | ネットワークを動作する方法、システム管理装置、ネットワーク及びコンピュータプログラム |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6754820B1 (en) * | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
| KR20040093128A (ko) * | 2002-03-13 | 2004-11-04 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 다항식을 기반으로 한 다수-사용자 키 생성 및 인증 방법및 시스템 |
| US8379867B2 (en) * | 2007-09-24 | 2013-02-19 | Mymail Technology, Llc | Secure email communication system |
| CN101977198B (zh) * | 2010-10-29 | 2013-09-25 | 西安电子科技大学 | 域间认证及密钥协商方法 |
| FR3015080B1 (fr) * | 2013-12-17 | 2016-01-22 | Oberthur Technologies | Verification d'integrite de paire de cles cryptographiques |
-
2013
- 2013-04-24 WO PCT/IB2013/053224 patent/WO2013175324A1/en not_active Ceased
- 2013-04-24 EP EP13727992.3A patent/EP2853058A1/en not_active Withdrawn
- 2013-04-24 MX MX2014014004A patent/MX340269B/es active IP Right Grant
- 2013-04-24 JP JP2015513298A patent/JP2015521003A/ja active Pending
- 2013-04-24 BR BR112014028757A patent/BR112014028757A2/pt not_active IP Right Cessation
- 2013-04-24 CN CN201380026604.7A patent/CN104303450A/zh active Pending
- 2013-04-24 US US14/400,572 patent/US20150134960A1/en not_active Abandoned
- 2013-04-24 RU RU2014151791A patent/RU2014151791A/ru not_active Application Discontinuation
-
2014
- 2014-12-19 ZA ZA2014/09419A patent/ZA201409419B/en unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10164047A (ja) * | 1996-11-29 | 1998-06-19 | Oki Electric Ind Co Ltd | 暗号通信システム |
| JP2000092038A (ja) * | 1998-09-16 | 2000-03-31 | Murata Mach Ltd | 暗号通信方法及び暗号化方法並びに暗号通信システム |
| JP2012504888A (ja) * | 2008-10-06 | 2012-02-23 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | ネットワークを動作する方法、システム管理装置、ネットワーク及びコンピュータプログラム |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2023539152A (ja) * | 2020-08-19 | 2023-09-13 | エスエヌツーエヌ,エルエルシー | 既知のユーザ間のセキュアな通信 |
Also Published As
| Publication number | Publication date |
|---|---|
| RU2014151791A (ru) | 2016-07-20 |
| MX340269B (es) | 2016-07-04 |
| CN104303450A (zh) | 2015-01-21 |
| ZA201409419B (en) | 2016-09-28 |
| WO2013175324A1 (en) | 2013-11-28 |
| BR112014028757A2 (pt) | 2017-06-27 |
| US20150134960A1 (en) | 2015-05-14 |
| MX2014014004A (es) | 2015-02-10 |
| EP2853058A1 (en) | 2015-04-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11229023B2 (en) | Secure communication in network access points | |
| JP7649460B2 (ja) | 追跡に対するプライバシーを維持しながら無線セキュアリンクを確立する方法および装置 | |
| JP2015521003A (ja) | 暗号鍵の決定 | |
| US20220385644A1 (en) | Sharing encrypted items with participants verification | |
| CN106411521B (zh) | 用于量子密钥分发过程的身份认证方法、装置及系统 | |
| CN104303451B (zh) | 密钥共享设备以及用于其配置的系统 | |
| CN112566119B (zh) | 终端认证方法、装置、计算机设备及存储介质 | |
| CN110192381B (zh) | 密钥的传输方法及设备 | |
| EP3051744A1 (en) | Key configuration method and apparatus | |
| US20200195446A1 (en) | System and method for ensuring forward & backward secrecy using physically unclonable functions | |
| JP2004030611A (ja) | 通信パスワードをリモートで変更するための方法 | |
| WO2017167771A1 (en) | Handshake protocols for identity-based key material and certificates | |
| CN110087240B (zh) | 基于wpa2-psk模式的无线网络安全数据传输方法及系统 | |
| CN110868294A (zh) | 一种密钥更新方法、装置及设备 | |
| Noh et al. | Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks | |
| Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
| WO2015075012A1 (en) | System for sharing a cryptographic key | |
| JP2020507243A (ja) | ネットワークデバイス及び信頼できるサードパーティデバイス | |
| Castiglione et al. | An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update | |
| CN116458173B (zh) | 应用于WiFi的安全认证的方法和装置 | |
| Daddala et al. | Design and implementation of a customized encryption algorithm for authentication and secure communication between devices | |
| EP4462731A1 (en) | Cryptographic system for securing connections between a server and a client and method thereof | |
| JP2023138927A (ja) | データファイル送信及びデータファイルへのアクセス権を管理するためのシステム及び方法 | |
| CN108429717B (zh) | 一种身份认证方法及装置 | |
| CN114040387A (zh) | 一种攻击消息的确定方法、装置及设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160422 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160422 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20170222 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20170328 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20171108 |