JP2021524944A - マルチパーティ計算(mpc)による物のインターネット・セキュリティ - Google Patents
マルチパーティ計算(mpc)による物のインターネット・セキュリティ Download PDFInfo
- Publication number
- JP2021524944A JP2021524944A JP2021514484A JP2021514484A JP2021524944A JP 2021524944 A JP2021524944 A JP 2021524944A JP 2021514484 A JP2021514484 A JP 2021514484A JP 2021514484 A JP2021514484 A JP 2021514484A JP 2021524944 A JP2021524944 A JP 2021524944A
- Authority
- JP
- Japan
- Prior art keywords
- devices
- sas
- key
- communication channel
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 121
- 238000000034 method Methods 0.000 claims abstract description 102
- 238000004364 calculation method Methods 0.000 claims description 12
- 238000012790 confirmation Methods 0.000 claims description 8
- 238000010200 validation analysis Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 description 17
- 101000759879 Homo sapiens Tetraspanin-10 Proteins 0.000 description 7
- 102100024990 Tetraspanin-10 Human genes 0.000 description 7
- 230000001010 compromised effect Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000007689 inspection Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 238000002474 experimental method Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 241000282412 Homo Species 0.000 description 3
- 208000011338 SATB2 associated disease Diseases 0.000 description 3
- 208000013959 SATB2-associated syndrome Diseases 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 235000011034 Rubus glaucus Nutrition 0.000 description 2
- 244000235659 Rubus idaeus Species 0.000 description 2
- 235000009122 Rubus idaeus Nutrition 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 235000011127 sodium aluminium sulphate Nutrition 0.000 description 2
- 238000001808 supercritical antisolvent technique Methods 0.000 description 2
- 102100032392 Circadian-associated transcriptional repressor Human genes 0.000 description 1
- 101710130150 Circadian-associated transcriptional repressor Proteins 0.000 description 1
- 206010000210 abortion Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000003339 best practice Methods 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 239000006071 cream Substances 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 208000035475 disorder Diseases 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000003116 impacting effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
- G16Y30/10—Security thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/582—Pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
本出願は、2018年5月16日に出願されたポルトガル特許出願第20181000034529号および2018年5月25日に出願されたヨーロッパ特許出願第18174412.9号の優先権および利益を主張する。
EQ f(t\s\do5(1)\,...\,t\s\do5(N))=S (式1)
を計算したいとする。
$out=bc−>PutGTGate(s_alice, s_bob):$
のコールの代わりに、
以下の関数により、いわゆる等価問題回路を作成した。
$out=bc−>PutEQGate(s_alice, s_bob);$
1. Yang, Yuchen, et al.“A Survey on Security and Privacy Issues in Internet−of−Things.”IEEE Internet of Things Journal (2017).
2. H. Sundmaeker, P. Guillemin, P. Friess and S. Woelffle, “Vision and Challenges for Realising the Internet of Things,”Cluster of European Research Projects on the Internet of Things, 2010.
3. Aman, Muhammad, Kee Chaing Chua, and Biplab Sikdar. “Mutual Authentication in IoT Systems using Physical Unclonable Functions.” IEEE Internet of Things Journal(2017).
4. Umar,Amjad. Information Security and Auditing in the Digital Age. nge solutions, inc, 2003.
5. Hao, Feng, and Peter YA Ryan. “Password authenticated key exchange by juggling.” International Workshop on Security Protocols. Springer Berlin Heidelberg, 2008.
6. Lancrenon, Jean, Marjan Å krobot, and Qiang Tang. “Two More Efficient Variants of the J−PAKE Protocol.” International Conference on Applied Cryptography and Network Security. Springer International Publishing, 2016.
7. Hao, Feng. “J−pake:Password authenticated key exchange by juggling.”(2016).
8. Hao, Feng., Ed. “Schnorr NIZK Proof:Non−interactive Zero Knowledge Proof for Discrete Logarithm”(2013).
9. Zimmermann, Phil, Alan Johnston, and Jon Callas. ZRTP:Media path key agreement for unicast secure RTP. No.RFC6189.2011.
10. Seo, Dong Hwi, and P.Sweeney. “Simple authenticated key agreement algorithm.” Electronics Letters 35.13(1999):1073−1074.
11. Goldreich, Oded. “Secure multi−party computation.” Manuscript. Preliminary version(1998):86−97.
12. Toorani, Mohsen. “Security analysis of J−PAKE.” Computers and Communication (ISCC), 2014 IEEE Symposium on. IEEE, 2014.
13. Yao, Andrew C. “Protocols for secure computations.” Foundations of Computer Science, 1982. SFCS’08. 23rd Annual Symposium on. IEEE, 1982.
14. Hirt, Martin, Ueli Maurer, and Bartosz Przydatek. “Efficient secure multi−party computation.” International Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg, 2000.
15. C++ Implementation of ZRTP protocol − GNU ZRTP C++ − https://github.com/wernerd/ZRTPCPP [オンライン、2017年3月30日アクセス].
16. Petraschek, Martin, et al. “Security and Usability Aspects of Man−in−the−Middle Attacks on ZRTP.” J.UCS 14.5(2008):673−692.
17. ABY − A Framework for Efficient Mixed−protocol Secure Two−party Computation https://github.com/encryptogroup/ABY [オンライン、2017年9月15日アクセス].
18. Keller, Marcel, Emmanuela Orsini, and Peter Scholl. “MASCOT:faster malicious arithmetic secure computation with oblivious transfer.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016.
19. Huang, Yan, Jonathan Katz, and David Evans. “Quid−pro−quo−tocols: Strengthening semi−honest protocols with dual execution.” Security and Privacy(SP), 2012 IEEE Symposium on. IEEE, 2012.
20. Sakarindr, Pitipatana, and Nirwan Ansari. “Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. ”IEEE Wireless Communications 14.5 (2007).
21. Laud, Peeter, and Liina Kamm, eds. Applications of Secure Multiparty Computation. Vol.13. IOS Press, 2015.
22. Device Pairing Using Short Authentication Strings (2016) https://tools.ietf.org/id/draft−ietf−dnssd−pairing−01.html [オンライン、2017年4月21日アクセス]
23.TLS Handshaking With Certificates and Keys(2017) https://mcuoneclipse.files.wordpress.com/2017/04/tls−handshaking−with−certificates−and−keys.png [オンライン、2017年4月25日アクセス]
24. Lyrebird claims it can recreate any voice using just one minute of sample audio. (2017) http://www.theverge.com/2017/4/24/15406882/ai−voice−synthesis−copy−human−speech−lyrebird [オンライン、2017年4月25日アクセス]
25. Martini, S.: Session Key Retrieval in J−PAKE Implementations of OpenSSL and OpenSSH. (2010) http://seb.dbzteam.org/crypto/jpake−session−key−retrieval.pdf [オンライン、2017年4月3日アクセス]
26. Thermos, Peter, and Ari Takanen. Securing VoIP Networks。 Pearson Education, 2007.
27.Canetti, Ran.“Obtaining universally composable security:Towards the bare bones of trust.” International Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg, 2007.
28.Let’s Encrypt issues certs to ’PayPal’ phishing sites:how to protect yourself (2017) http://bit.ly/2i7Z4bT [オンライン、2017年5月19日アクセス]
29. Demmler, Daniel, Thomas Schneider, and Michael Zohner.“ABY−A Framework for Efficient Mixed−Protocol Secure Two−Party Computation.” NDSS.2015.
30. Yao, Andrew Chi−Chih. “How to generate and exchange secrets.” Foundations of Computer Science, 1986., 27th Annual Symposium on. IEEE, 1986.
31. Yao, Andrew C. “Theory and application of trapdoor functions.” Foundations of Computer Science, 1982. SFCS’08. 23rd Annual Symposium on. IEEE, 1982.
32. Lindell, Yehuda, and Benny Pinkas. “Secure Multiparty computation for privacy−preserving data mining.” Journal of Privacy and Confidentiality 1.1 (2009):5.APA
33. McGrew, D., et al.“RFC 3711:The secure real−time transport protocol(SRTP).” Cisco Systems, Inc and Ericsson Research, Tech. Rep(2004).
34. Zimmermann, P., J. Callas, and A. Johnston. “ZRTP: Media Path Key Agreement for Unicast Secure RTP(RFC6189).”(2011):2070−1721.
35. Sisalem, Dorgham, et al. SIP security. John Wiley & Sons, 2009.
36. Hlavacs, Helmut, et al. “Enhancing ZRTP by using Computational Puzzles.” J.UCS 14.5(2008):693−716.
37. Petraschek, Martin, et al.“Security and Usability Aspects of Man−in−the−Middle Attacks on ZRTP.” J.UCS 14.5(2008):673−692.
38. Afifi, M.H., et al.“Dynamic Authentication Protocol Using Self−Powered Timers for Passive Internet of Things.”IEEE Internet of Things Journal(2017).
39. Pass, Rafael.“Bounded−concurrent secure multi−party computation with a dishonest majority.” Proceedings of the thirty−sixth annual ACM symposium on Theory of computing. ACM, 2004.
Claims (18)
- 第1のデバイス(200A)と第2のデバイス(200B)との間の通信チャネルを介して暗号化メッセージを使用する通信を確立する方法であって、
前記第1のデバイス(200A)と前記第2のデバイス(200B)とを相互に発見することと、
前記第1のデバイス(200A)と前記第2のデバイス(200B)との間の前記通信チャネルのための秘密セッション鍵を確立することによって前記通信チャネルの正当性確認をすることと(F5、F6、F7)、
前記第1のデバイス(200A)における第1の認証文字列(SAS)と前記第2のデバイス(200B)における第2の認証文字列(SA)とを計算することと、
計算された前記第1のSASを前記第1のデバイス(200A)の第1のMPCモジュール(210A)に、計算された前記第2のSASを前記第2のデバイス(200B)の第2のMPCモジュール(201B)に挿入し、前記第2のデバイス(200B)の前記第2のMPCモジュール(210B)における前記第1のSASと、前記第1のデバイス(200A)の前記第1のMPCモジュール(201A)における第2のSASとを評価することによって前記通信チャネルのセキュリティを確認することと、
前記通信チャネルの前記セキュリティの前記確認がなされた場合に、交換された前記秘密セッション鍵を使用して前記第1のデバイス(200A)と前記第2のデバイス(200B)との間に共有秘密を確立することと、
前記通信チャネルを介して前記暗号化されたメッセージを交換することとを含む、方法。 - 前記相互の発見は、前記第1のデバイス(200A)と前記第2のデバイス(200B)との間の識別子を提供することを含む、請求項1に記載の方法。
- 前記第1のデバイス(200A)と前記第2のデバイス(200B)との間の識別子を提供することは、前記第1のデバイス(200A)と前記第2のデバイス(200B)との間で開始メッセージおよび肯定応答メッセージを交換すること(F1、F2、F3、F4)を含み、前記開始メッセージおよび前記肯定応答メッセージは前記識別子を含む、請求項2に記載の方法。
- 前記識別子は、前記第1のデバイス(200A)と前記第2のデバイス(200B)とのうちの少なくとも一方の乱数識別情報を生成することによって提供される、請求項2または3に記載の方法。
- 前記識別子の提供は、サーバから前記第1のデバイス(200A)と前記第2のデバイス(200B)の識別子を受信することを含む、請求項2に記載の方法。
- 前記正当性確認(F5、F6、F7)は、前記第1のデバイス(200A)から前記第2のデバイス(200B)への第1の鍵交換と、前記第2のデバイス(200B)から前記第1のデバイス(200A)への第2の鍵交換とを含む、請求項1から5のいずれか一項に記載の方法。
- 交換された前記メッセージの比較の成功後に、前記第1のデバイス(200A)から前記第2のデバイス(200B)に確認メッセージを送信し、前記第2のデバイス(200B)から前記第1のデバイス(200A)に確認メッセージを送信することをさらに含む、請求項1から6のいずれか一項に記載の方法。
- 前記第1の鍵交換における第1の秘密鍵が前の第1の秘密鍵から生成され、前記第2の鍵交換における第2の秘密鍵が前の第2の秘密鍵から生成される、請求項7に記載の方法。
- 前記通信チャネルの前記正当性確認は、前記通信チャネルを介したすべてのメッセージの交換前に実施される、請求項1から8のいずれか一項に記載の方法。
- 前記通信チャネルの前記正当性確認は、前記通信チャネルを介したいくつかのメッセージの交換後にのみ実施される、請求項1から9のいずれか一項に記載の方法。
- 前記第1のデバイス(200A)と前記第2のデバイス(200B)との前記相互発見は、直接通信またはサーバの使用のうちの一方により前記第1のデバイス(200A)と前記第2のデバイス(200B)との間のメッセージの自動交換によって実施される、請求項1から10のいずれか一項に記載の方法。
- 移動車両上のIoTデバイスを含む複数のIoTデバイス、または複数のVoIPデバイスを含む、ネットワークにおける、請求項1から11のうちのいずれか一項に記載の方法の使用。
- 複数のデバイス(200A、200B)を含むネットワークであって、前記複数のデバイス(200A、200B)は、
通信チャネル(202、203、204)を介して前記複数のデバイス(200A、200B)のうちの他のデバイスのうちの1つまたは複数のデバイスにメッセージを送信するための送信器(240)と、
前記複数のデバイス(200A、200B)のうちの他のデバイスのうちの1つまたは複数のデバイスから前記通信チャネル(202、203、204)よりメッセージを受信するための受信器(230)と、
セッション鍵を記憶するための識別子ファイル(220)と、
前記複数のデバイス(200A、200B)のうちの1つのデバイスから通信チャネル(202、203、24)を介して認証文字列(SAS)を受信し、前記通信チャネル(202、203、204)のセキュリティを確認するマルチパーティ計算モジュール(210)と、
前記セッション鍵を使用して前記通信チャネル(202、203、204)との間でのメッセージを暗号化および復号するための通信モジュール(220)とを含む、ネットワーク。 - 前記マルチパーティ計算モジュール(210)は、第1の認証文字列を有し、前記複数のデバイス(200A、200B)のうちの他のデバイスのうちの1つから第2の認証文字列を受信し、それによって前記通信チャネル(202、203、204)の前記セキュリティを確認するように適合されている、請求項13に記載のネットワーク。
- 前記デバイス(200A、200B)は、複数のセッション鍵を記憶するためのストレージをさらに含む、請求項13または14に記載のネットワーク。
- 前記デバイス(200A、200B)は、前記デバイス(200A、200B)を識別する識別子を生成するための擬似乱数生成器をさらに含む、請求項13から15のうちのいずれか一項に記載のネットワーク。
- 前記デバイス(200A、200B)に前記デバイス(200A、200B)のうちの他の1つのデバイスの識別子を提供するためのサーバをさらに含む、請求項13から16のうちのいずれか一項に記載のネットワーク。
- 前記複数のデバイス(200A、200B)は、IoTネットワーク、自律的車両ネットワークにおけるデバイス、またはVoIデバイスである、請求項13から17のうちのいずれか一項に記載のネットワーク。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PT11074118 | 2018-05-16 | ||
PT20181000034529 | 2018-05-16 | ||
EP18174412.9 | 2018-05-25 | ||
EP18174412.9A EP3570575A1 (en) | 2018-05-16 | 2018-05-25 | Internet of things security with multi-party computation (mpc) |
PCT/EP2019/062713 WO2019219862A1 (en) | 2018-05-16 | 2019-05-16 | Internet of things security with multi-party computation (mpc) |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2021524944A true JP2021524944A (ja) | 2021-09-16 |
Family
ID=62620623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021514484A Pending JP2021524944A (ja) | 2018-05-16 | 2019-05-16 | マルチパーティ計算(mpc)による物のインターネット・セキュリティ |
Country Status (5)
Country | Link |
---|---|
US (2) | US20210203492A1 (ja) |
EP (2) | EP3570575A1 (ja) |
JP (1) | JP2021524944A (ja) |
CN (1) | CN112425136B (ja) |
WO (1) | WO2019219862A1 (ja) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10601823B2 (en) * | 2015-04-07 | 2020-03-24 | Tyco Fire & Security Gmbh | Machine to-machine and machine to cloud end-to-end authentication and security |
CN109255247B (zh) * | 2018-08-14 | 2020-08-14 | 阿里巴巴集团控股有限公司 | 多方安全计算方法及装置、电子设备 |
CN114124423B (zh) * | 2020-08-31 | 2023-04-07 | Oppo广东移动通信有限公司 | 一种认证方法、客户端、服务端及存储介质 |
US20220078184A1 (en) * | 2020-09-09 | 2022-03-10 | University Of Florida Research Foundation, Incorporated | Method, apparatus, and computer program product for secure two-factor authentication |
CN112989368B (zh) * | 2021-02-07 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | 多方联合进行隐私数据处理的方法及装置 |
CN112800479B (zh) * | 2021-04-07 | 2021-07-06 | 支付宝(杭州)信息技术有限公司 | 利用可信第三方的多方联合数据处理方法及装置 |
CN113177212B (zh) * | 2021-04-25 | 2022-07-19 | 支付宝(杭州)信息技术有限公司 | 联合预测方法和装置 |
CN113612821A (zh) * | 2021-07-14 | 2021-11-05 | 支付宝(杭州)信息技术有限公司 | 多方安全计算中的数据交互方法和装置 |
CN114553397B (zh) * | 2022-02-14 | 2024-04-12 | 山东大学 | 一种国密sm4分组密码算法的加密优化方法及装置 |
CN114697113A (zh) * | 2022-03-30 | 2022-07-01 | 医渡云(北京)技术有限公司 | 一种基于硬件加速卡的多方隐私计算方法、装置及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000354031A (ja) * | 1999-04-06 | 2000-12-19 | Mitsubishi Electric Corp | 共通鍵共有方法 |
JP2004529595A (ja) * | 2001-06-08 | 2004-09-24 | ノキア コーポレイション | データ伝送のセキュリティを確保する方法、通信システム及び通信装置 |
JP2005099980A (ja) * | 2003-09-24 | 2005-04-14 | Nippon Telegr & Teleph Corp <Ntt> | サービス提供方法、サービス提供プログラム、ホスト装置、および、サービス提供装置 |
JP2005354556A (ja) * | 2004-06-14 | 2005-12-22 | Matsushita Electric Ind Co Ltd | 鍵交換装置、鍵交換システム、鍵交換方法、および暗号通信システム |
JP2006332903A (ja) * | 2005-05-24 | 2006-12-07 | Ntt Docomo Inc | 鍵取得機器、鍵提供機器、鍵交換システム及び鍵交換方法 |
US20070157026A1 (en) * | 2005-07-27 | 2007-07-05 | Zimmermann Philip R | Method and system for key management in voice over internet protocol |
US20090158039A1 (en) * | 2007-11-09 | 2009-06-18 | Ramnath Prasad | Device pairing using "human-comparable" synchronized audible and/or visual patterns |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2384403B (en) * | 2002-01-17 | 2004-04-28 | Toshiba Res Europ Ltd | Data transmission links |
US7646872B2 (en) * | 2004-04-02 | 2010-01-12 | Research In Motion Limited | Systems and methods to securely generate shared keys |
US9350708B2 (en) * | 2010-06-01 | 2016-05-24 | Good Technology Corporation | System and method for providing secured access to services |
US9467425B2 (en) * | 2013-03-18 | 2016-10-11 | Intel Corporation | Key refresh between trusted units |
US9112840B2 (en) * | 2013-07-17 | 2015-08-18 | Avaya Inc. | Verifying privacy of web real-time communications (WebRTC) media channels via corresponding WebRTC data channels, and related methods, systems, and computer-readable media |
US20150288667A1 (en) * | 2014-04-08 | 2015-10-08 | Samsung Electronics Co., Ltd. | Apparatus for sharing a session key between devices and method thereof |
US9621547B2 (en) * | 2014-12-22 | 2017-04-11 | Mcafee, Inc. | Trust establishment between a trusted execution environment and peripheral devices |
US20170230383A1 (en) * | 2016-02-10 | 2017-08-10 | Silent Circle, SA | Inter-communication unit message routing and verification of connections |
-
2018
- 2018-05-25 EP EP18174412.9A patent/EP3570575A1/en not_active Withdrawn
-
2019
- 2019-05-16 WO PCT/EP2019/062713 patent/WO2019219862A1/en unknown
- 2019-05-16 CN CN201980047325.6A patent/CN112425136B/zh active Active
- 2019-05-16 EP EP19728890.5A patent/EP3794856A1/en active Pending
- 2019-05-16 JP JP2021514484A patent/JP2021524944A/ja active Pending
- 2019-05-16 US US17/055,671 patent/US20210203492A1/en not_active Abandoned
-
2023
- 2023-01-19 US US18/099,156 patent/US20230155816A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000354031A (ja) * | 1999-04-06 | 2000-12-19 | Mitsubishi Electric Corp | 共通鍵共有方法 |
JP2004529595A (ja) * | 2001-06-08 | 2004-09-24 | ノキア コーポレイション | データ伝送のセキュリティを確保する方法、通信システム及び通信装置 |
JP2005099980A (ja) * | 2003-09-24 | 2005-04-14 | Nippon Telegr & Teleph Corp <Ntt> | サービス提供方法、サービス提供プログラム、ホスト装置、および、サービス提供装置 |
JP2005354556A (ja) * | 2004-06-14 | 2005-12-22 | Matsushita Electric Ind Co Ltd | 鍵交換装置、鍵交換システム、鍵交換方法、および暗号通信システム |
JP2006332903A (ja) * | 2005-05-24 | 2006-12-07 | Ntt Docomo Inc | 鍵取得機器、鍵提供機器、鍵交換システム及び鍵交換方法 |
US20070157026A1 (en) * | 2005-07-27 | 2007-07-05 | Zimmermann Philip R | Method and system for key management in voice over internet protocol |
US20090158039A1 (en) * | 2007-11-09 | 2009-06-18 | Ramnath Prasad | Device pairing using "human-comparable" synchronized audible and/or visual patterns |
Non-Patent Citations (5)
Title |
---|
BRESCIANI, R.: "The ZRTP Protocol Analysis on the Diffie-Hellman Mode", COMPUTER SCIENCE DEPARTMENT TECHNICAL REPORT, vol. TCD-CS-2009-13, JPN6023022729, 12 June 2009 (2009-06-12), pages 1 - 21, ISSN: 0005077361 * |
HOEPMAN, JAAP-HENK, THE EPHEMERAL PAIRING PROBLEM, vol. arXiv:0802.0834v1, JPN6023022730, 6 February 2008 (2008-02-06), pages 1 - 15, ISSN: 0005077360 * |
PASINI, S. AND VAUDENAY, S.: "SAS-Based Authenticated Key Agreement", PUBLIC KEY CRYPTOGRAPHY - PKC 2006, vol. 3958, JPN6023022727, 2006, pages 395 - 409, XP047030188, ISSN: 0005077363, DOI: 10.1007/11745853_26 * |
ZIMMERMANN, P.: "ZRTP: Media Path Key Agreement for Unicast Secure RTP", REQUEST FOR COMMENTS: 6189, JPN6023022728, April 2011 (2011-04-01), pages 1 - 115, XP015075963, ISSN: 0005077362 * |
齋藤 恒和: "認証鍵交換プロトコルZRTPの盗聴確率の評価", 2016 SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SEURITY, JPN6023022726, 19 January 2016 (2016-01-19), JP, pages 1 - 7, ISSN: 0005077364 * |
Also Published As
Publication number | Publication date |
---|---|
US20210203492A1 (en) | 2021-07-01 |
CN112425136B (zh) | 2023-10-10 |
EP3570575A1 (en) | 2019-11-20 |
CN112425136A (zh) | 2021-02-26 |
EP3794856A1 (en) | 2021-03-24 |
WO2019219862A1 (en) | 2019-11-21 |
US20230155816A1 (en) | 2023-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112425136B (zh) | 采用多方计算(mpc)的物联网安全性 | |
CN108599925B (zh) | 一种基于量子通信网络的改进型aka身份认证系统和方法 | |
KR101343248B1 (ko) | 교환 세션의 총체적 보안 | |
CN102164033B (zh) | 防止服务被攻击的方法、设备及系统 | |
Chattaraj et al. | A new two-server authentication and key agreement protocol for accessing secure cloud services | |
US20140164768A1 (en) | Detecting matched cloud infrastructure connections for secure off-channel secret generation | |
Gaba et al. | Robust and lightweight mutual authentication scheme in distributed smart environments | |
US8683194B2 (en) | Method and devices for secure communications in a telecommunications network | |
US9787651B2 (en) | Method and device for establishing session keys | |
CN110635901B (zh) | 用于物联网设备的本地蓝牙动态认证方法和系统 | |
Nikooghadam et al. | A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol | |
CN110493367B (zh) | 无地址的IPv6非公开服务器、客户机与通信方法 | |
CN108599926B (zh) | 一种基于对称密钥池的HTTP-Digest改进型AKA身份认证系统和方法 | |
Sureshkumar et al. | A robust mutual authentication scheme for session initiation protocol with key establishment | |
Kfoury et al. | Secure End-to-End VoIP System Based on Ethereum Blockchain. | |
Peeters et al. | SMS OTP security (SOS) hardening SMS-based two factor authentication | |
Jander et al. | Practical Defense-in-depth Solution for Microservice Systems. | |
Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
KR20210126319A (ko) | 키 관리 장치 및 방법 | |
Jurcut et al. | Design requirements to counter parallel session attacks in security protocols | |
Krasnowski et al. | Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication. | |
Shehada et al. | Performance evaluation of a lightweight iot authentication protocol | |
Hsu et al. | SGD 2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G | |
Gurbani et al. | A secure and lightweight scheme for media keying in the session initiation protocol (SIP) work in progress | |
Alshahrani et al. | Anonymous IoT mutual inter-device authentication scheme based on incremental counter (AIMIA-IC) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20201117 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210728 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20220407 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20230428 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20230606 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20230905 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20231106 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20231206 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20240306 |