JP3485221B2 - Computer system authentication method - Google Patents

Computer system authentication method

Info

Publication number
JP3485221B2
JP3485221B2 JP07203596A JP7203596A JP3485221B2 JP 3485221 B2 JP3485221 B2 JP 3485221B2 JP 07203596 A JP07203596 A JP 07203596A JP 7203596 A JP7203596 A JP 7203596A JP 3485221 B2 JP3485221 B2 JP 3485221B2
Authority
JP
Japan
Prior art keywords
public key
computer
information
authentication
authentication center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP07203596A
Other languages
Japanese (ja)
Other versions
JPH09261218A (en
Inventor
誠一郎 林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP07203596A priority Critical patent/JP3485221B2/en
Publication of JPH09261218A publication Critical patent/JPH09261218A/en
Application granted granted Critical
Publication of JP3485221B2 publication Critical patent/JP3485221B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【発明の属する技術分野】本発明は、複数の電子計算機
と各電子計算機を認定するオーソリティ機能を有する電
子計算機(認証センタ)がネットワークで接続された計
算機システムにおける通信相手を保証する情報の認証方
法に係り、詳しくは、電子計算機が認証情報を新たに作
成した場合、再度、認証センタから証明情報を得ること
なく認証する方法に関する。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method of authenticating information that guarantees a communication partner in a computer system in which a plurality of computers and an electronic computer (authentication center) having an authority function of certifying each computer are connected by a network. More specifically, the present invention relates to a method of authenticating again when an electronic computer newly creates authentication information without obtaining certification information from the authentication center.

【0002】[0002]

【従来の技術】従来、公開鍵暗号方式でディジタル署名
通信を行うシステムにおいて、ある電子計算機が公開鍵
を追加・変更する場合には、認証センタから追加・変更
する公開鍵に対して、新たにディジタル署名等の証明情
報をもらっていた。すなわち、認証センタのディジタル
署名により、公開鍵が本人のものであることの証明情報
(印鑑証明に相当)を、認証センタがその都度生成して
いた。
2. Description of the Related Art Conventionally, in a system for performing digital signature communication by a public key cryptosystem, when a computer adds or changes a public key, the public key newly added or changed by an authentication center is newly added. I received proof information such as a digital signature. That is, the authentication center generates the proof information (corresponding to the seal stamp proof) that the public key belongs to the person each time by the digital signature of the authentication center.

【0003】[0003]

【発明が解決しようとする課題】従来の方法では、電子
計算機が公開鍵等を追加・変更する都度、認証センタに
接続してディジタル署名を生成することになってしま
う。すなわち、従来は認証センタが生成した過去のディ
ジタル署名が他の公開鍵等の認証に有効利用されていな
いため、電子計算機は新たな公開鍵等を作成する都度、
認証センタに依頼してディジタル署名を受ける必要があ
り、認証センタと認証を受ける電子計算機の負担及び通
信量が増大する問題があった。
In the conventional method, each time the electronic computer adds or changes the public key or the like, the computer is connected to the authentication center to generate a digital signature. That is, in the past, since the past digital signature generated by the authentication center has not been effectively used for authentication of other public keys, etc., the computer creates a new public key every time.
Since it is necessary to request the authentication center to receive a digital signature, there is a problem that the burden on the authentication center and the computer to be authenticated and the communication amount increase.

【0004】本発明の目的は、一度認証センタによって
認証された事実である証明情報を基に、新たな公開鍵等
の認証情報について、認証センタを介さずに該認証セン
タから認証されたと同様の保証を与えようとするもので
ある。
The object of the present invention is based on the certification information which is the fact that the authentication center has once authenticated, and the authentication information such as a new public key is the same as that authenticated by the authentication center without going through the authentication center. It is intended to give a guarantee.

【0005】[0005]

【課題を解決するための手段】本発明の認証方法は、一
度認証センタによって認証された証明情報を使い、ある
電子計算機2が、新たに作成した認証情報に該認証セン
タによって認証された証明情報を付加して他の電子計算
機3に送信し、該他の電子計算機3にて、受信した新た
な認証情報に付加されている証明情報を基に、該新たな
認証情報が電子計算機2のものであることを認証できる
ようにしたことである。
According to the authentication method of the present invention, the certification information once authenticated by the authentication center is used, and a certain computer 2 adds the newly created authentication information to the certification information authenticated by the authentication center. Is sent to another computer 3 and the new authentication information is added to the computer 2 based on the certification information added to the new authentication information received by the other computer 3. That is, it is possible to authenticate that

【0006】電子計算機2は、認証センタからすでに認
証された証明として認証センタのディジタル署名付き公
開鍵Aを保有しているとする。該電子計算機2は、認証
センタのディジタル署名付き公開鍵Aおよび新たに追加
もしくは変更する公開鍵B、さらに公開鍵Bが変更か追
加なのか示す情報の全体を、公開鍵Aの秘密鍵Aで暗号
化もしくはディジタル署名し、他の電子計算機3に送信
する。電子計算機3では、受信した情報が、認証センタ
から保証された公開鍵Aに対応する秘密鍵Aで暗号化も
しくはディジタル署名されていることから、該受信した
情報を公開鍵Aで復号化もしくはディジタル署名するこ
とにより、情報の中身である公開鍵Bも公開鍵Aと同様
に電子計算機2本人の公開鍵であることが認証できる。
It is assumed that the electronic computer 2 has a public key A with a digital signature of the authentication center as a proof that has already been authenticated by the authentication center. The electronic computer 2 uses the private key A of the public key A as the whole of the public key A with a digital signature of the authentication center, the public key B newly added or changed, and the entire information indicating whether the public key B is changed or added. The data is encrypted or digitally signed and transmitted to another electronic computer 3. In the electronic computer 3, the received information is encrypted or digitally signed by the secret key A corresponding to the public key A guaranteed by the authentication center. Therefore, the received information is decrypted or digitally signed by the public key A. By signing, it is possible to authenticate that the public key B, which is the content of the information, is the public key of the two electronic computers as well as the public key A.

【0007】[0007]

【発明の実施の形態】以下、図面を用いて本発明の実施
の形態について説明する。図1は、本発明で対象とする
システムのブロック図を示したもので、認証センタ1と
複数の電子計算機2,3,4が通信路(ネットワーク)
5で接続されている。ここで、各電子計算機2,3,4
は公開鍵暗号方式でディジタル署名通信を行うとする。
BEST MODE FOR CARRYING OUT THE INVENTION Embodiments of the present invention will be described below with reference to the drawings. FIG. 1 is a block diagram of a system targeted by the present invention, in which an authentication center 1 and a plurality of computers 2, 3 and 4 are communication channels (network).
Connected with 5. Here, each computer 2, 3, 4
Assume that public key cryptography is used for digital signature communication.

【0008】 図2は、本発明による公開鍵の認証手順
を示したものである。ここでは、電子計算機2が新たに
変更・追加する公開鍵を、電子計算機3が該電子計算機
2のものであることを認証するものとする。
FIG. 2 shows a public key authentication procedure according to the present invention. Here, it is assumed that the public key newly changed / added by the electronic computer 2 authenticates that the electronic computer 3 belongs to the electronic computer 2 .

【0009】〈実施例1〉これは、電子計算機2が、認
証センタ1のディジタル署名付き公開鍵Aと、新たに追
加もしくは変更する公開鍵Bと、該公開鍵Bが変更か追
加かを示す情報とを認証準備情報として、該認証準備情
報を公開鍵Aの秘密鍵Aで暗号化して電子計算機3に送
信し、電子計算機3が、該暗号化された認証準備情報を
公開鍵Aで復号し、公開鍵Bを電子計算機2のものであ
ると認証する実施例である。以下、本実施例を図2に基
づいて説明する。
<Embodiment 1> This shows that the electronic computer 2 has a public key A with a digital signature of the authentication center 1, a public key B to be newly added or changed, and whether the public key B is changed or added. The information and the authentication preparation information are encrypted with the secret key A of the public key A and transmitted to the computer 3, and the computer 3 decrypts the encrypted authentication preparation information with the public key A. In this embodiment, the public key B is authenticated to belong to the electronic computer 2. Hereinafter, this embodiment will be described with reference to FIG.

【0010】ステップ1:認証センタによる公開鍵Aの
認証 電子計算機2は、処理11により作成した公開鍵A〈K
pA〉について、処理12により認証情報を認証センタ
1に送信する。ここで、処理12で認証センタ1に送信
される認証情報には、公開鍵A〈KpA〉の他に電子計
算機2の身元を保証する情報〈ID〉を含む。認証セン
タ1では、処理12で送信された認証情報を基に、処理
13にて確かに公開鍵Aは電子計算機2本人のものであ
ることを確認する。その上で、処理14にて公開鍵A
〈KpA〉と電子計算機2の認証情報〈ID〉と認証セ
ンタ1が付与する期限情報〈TIME〉等を結合した情
報〈KpA|TIME|ID〉に対して、該認証センタ
1の秘密鍵〈KsCA〉でディジタル署名して、署名情
報〈SKsCA(KpA|TIME|ID)〉を生成
し、処理15により電子計算機2に送信する。 SY(XXX):秘密鍵YのXXXに対するディジタル
署名 a|b :aとbを連結。
Step 1: Authentication of the public key A by the authentication center The computer 2 creates the public key A <K created by the process 11.
With regard to pA>, the authentication information is transmitted to the authentication center 1 by the process 12. Here, the authentication information transmitted to the authentication center 1 in the process 12 includes the public key A <KpA> and the information <ID> for guaranteeing the identity of the computer 2. In the authentication center 1, based on the authentication information transmitted in the process 12, it is confirmed in the process 13 that the public key A surely belongs to the two electronic computers. Then, in process 14, the public key A
<KpA>, the authentication information <ID> of the computer 2, and the information <KpA | TIME | ID> obtained by combining the time limit information <TIME> and the like given by the authentication center 1 with respect to the secret key <KsCA of the authentication center 1 >, The signature information <SKsCA (KpA | TIME | ID)> is generated, and the signature information <SKsCA (KpA | TIME | ID)> is transmitted to the computer 2 by the process 15. SY (XXX): Digital signature a | b for XXX of secret key Y: concatenates a and b.

【0011】ステップ2:新たな公開鍵Bを保証する情
報の作成 電子計算機2が、処理16により公開鍵B〈KpB〉を
作成し、さらに公開鍵Bが追加か変更かを示すフラグ情
報を作成する。処理17では、処理16で作成した情報
に認証情報〈ID〉を結合し、さらにステップ11で生
成した公開鍵Aの認証センタ1によるディジタル署名
〈SKsCA(KpA|TIME|ID)〉を加えて認
証準備情報〈KpB|ID,SKsCA(KpA|TI
ME|ID)〉を作成する。電子計算機2は、この認証
準備情報に対して、公開鍵Aの秘密鍵A〈KsA〉で暗
号化し、暗号化情報〈EKsA(KpB|ID,SKs
CA(KpA|TIME|ID))〉を処理18により
電子計算機3に送信する。 EY(XXX):秘密鍵YでXXXを暗号化。
Step 2: Creation of Information Guaranteeing New Public Key B The computer 2 creates the public key B <KpB> by the processing 16, and creates flag information indicating whether the public key B is added or changed. To do. In process 17, the authentication information <ID> is combined with the information created in process 16, and the digital signature <SKsCA (KpA | TIME | ID)> of the public key A generated in step 11 by the authentication center 1 is added to perform authentication. Preparation information <KpB | ID, SKsCA (KpA | TI
ME | ID)>. The computer 2 encrypts this authentication preparation information with the secret key A <KsA> of the public key A, and the encrypted information <EKsA (KpB | ID, SKs
CA (KpA | TIME | ID))> is transmitted to the electronic computer 3 by the process 18. EY (XXX): XXX is encrypted with the secret key Y.

【0012】ステップ3:新たな公開鍵Bの他電子計算
機による認証 電子計算機3では、処理19により、処理18で電子計
算機2により送信された暗号化情報を電子計算機2の公
開鍵A〈KpA〉で復号化する。即ち、〈DKpA(E
KsA(KpB|ID,SKsCA(KpA|TIME
|ID)))=KpB|ID,SKsCA(KpA|T
IME|ID)。復号化した情報のうち、公開鍵Aに対
する認証センタ1のディジタル署名〈SKsCA(Kp
A|TIME|ID)〉を認証センタ1の公開鍵〈Kp
CA〉で署名検証し、検証が合格し、さらに認証情報
〈ID〉が電子計算機2と一致した場合に、公開鍵Bが
電子計算機2の公開鍵として認証する。 DY(XXX):公開鍵YでXXXを復号化。
Step 3: Authentication of the new public key B by another computer In the computer 3, the encrypted information transmitted by the computer 2 in the process 18 is processed by the process 19 and the public key A <KpA> of the computer 2 is processed. Decrypt with. That is, <DKpA (E
KsA (KpB | ID, SKsCA (KpA | TIME
| ID))) = KpB | ID, SKsCA (KpA | T
IME | ID). Of the decrypted information, the digital signature of the authentication center 1 for the public key A <SKsCA (Kp
A | TIME | ID)> is the public key of the authentication center 1 <Kp
If the signature is verified with CA>, the verification is successful, and the authentication information <ID> matches the computer 2, the public key B is authenticated as the public key of the computer 2. DY (XXX): Decrypt XXX with public key Y.

【0013】〈実施例2〉これは、電子計算機2が、認
証センタ1のディジタル署名付き公開鍵Aと、新たに追
加もしくは変更する公開鍵Bと、該公開鍵Bが変更か追
加かを示す情報とを認証準備情報とし、該認証準備情報
を秘密鍵Aでディジタル署名した署名情報を認証準備情
報とともに電子計算機3に送信し、電子計算機3が、認
証準備情報のディジタル署名を電子計算機2の公開鍵A
で検証し、公開鍵Bを電子計算機2のものであると認証
する実施例である。
<Embodiment 2> This shows that the electronic computer 2 has a public key A with a digital signature of the authentication center 1, a public key B to be newly added or changed, and whether the public key B is changed or added. Information is used as authentication preparation information, and the signature information obtained by digitally signing the authentication preparation information with the secret key A is sent together with the authentication preparation information to the computer 3, and the computer 3 sends the digital signature of the authentication preparation information to the computer 2. Public key A
In this embodiment, the public key B is verified to belong to the electronic computer 2.

【0014】ステップ1:認証センタによる公開鍵Aの
認証 これは実施例1と同様である。
Step 1: Authentication of Public Key A by Authentication Center This is the same as in the first embodiment.

【0015】ステップ2:新たな公開鍵を保証する情報
の作成 電子計算機2が処理17にて認証準備情報を作成すると
ころまでは実施例1と同様である。電子計算機2は、作
成した認証準備情報〈KpB|ID,SKsCA(Kp
A|TIME|ID)〉を秘密鍵A〈KsA〉でディジ
タル署名した署名情報〈SKsA(KpB|ID,SK
sCA(KpA|TIME|ID))〉と認証準備情報
〈KpB|ID,SKsCA(KpA|TIME|I
D)〉を、処理18により電子計算機3に送信する。
Step 2: Creation of Information for Guaranteeing New Public Key Up to the point where the computer 2 creates the authentication preparation information in the process 17, it is the same as in the first embodiment. The computer 2 creates the prepared authentication preparation information <KpB | ID, SKsCA (KpB
Signature information <SKsA (KpB | ID, SK) obtained by digitally signing A | TIME | ID)> with the secret key A <KsA>.
sCA (KpA | TIME | ID))> and authentication preparation information <KpB | ID, SKsCA (KpA | TIME | I)
D)> is transmitted to the electronic computer 3 by the process 18.

【0016】ステップ3:新たな公開鍵の他電子計算機
による認証 電子計算機3では、処理19により、処理18で電子計
算機2より送信された認証準備情報のディジタル署名
〈SKsA(KpB|ID,SKsCA(KpA|TI
ME|ID))〉を電子計算機2の公開鍵A〈KpA〉
で検証する。さらに、公開鍵Aに対する認証センタ1の
ディジタル署名〈SKsCA(KpA|TIME|I
D)〉を認証センタ1の公開鍵〈KpCA〉で署名検証
し、検証が合格し、さらに認証情報〈ID〉が電子計算
機2と一致した場合に、公開鍵B〈KpB〉が電子計算
機2の公開鍵として認証する。
Step 3: Authentication by other computer with new public key In the computer 3, the digital signature <SKsA (KpB | ID, SKsCA (KpB | ID, SKsCA ( KpA | TI
ME | ID))> is the public key A <KpA> of the computer 2.
Verify with. Furthermore, the digital signature of the authentication center 1 for the public key A <SKsCA (KpA | TIME | I
D)> is signature-verified with the public key <KpCA> of the authentication center 1, and if the verification is successful and the authentication information <ID> matches the computer 2, the public key B <KpB> is stored in the computer 2. Authenticate as a public key.

【0017】[0017]

【発明の効果】以上説明したように、本発明の認証方法
によれば、一度認証センタからの認証を受ければ、その
後の公開鍵の変更や追加の度に認証センタから新しい公
開鍵の認証を受けずに新しい公開鍵の保証が可能にな
る。このため、認証センタと新たな公開鍵を作成し認証
を受ける電子計算機の負担と通信量の負担が軽減され
る。
As described above, according to the authentication method of the present invention, once the authentication center receives the authentication, a new public key is authenticated from the authentication center every time the public key is changed or added. It is possible to guarantee a new public key without receiving it. Therefore, the burden on the authentication center and the computer that creates a new public key and is authenticated and the burden on the communication amount are reduced.

【図面の簡単な説明】[Brief description of drawings]

【図1】本発明で対象とするシステムの概略ブロック図
である。
FIG. 1 is a schematic block diagram of a system targeted by the present invention.

【図2】本発明による公開鍵の認証手順を示す図であ
る。
FIG. 2 is a diagram showing a public key authentication procedure according to the present invention.

【符号の説明】[Explanation of symbols]

1 認証センタ 2〜4 電子計算機 5 通信路(ネットワーク) 1 authentication center 2-4 Computer 5 communication channels (network)

───────────────────────────────────────────────────── フロントページの続き (56)参考文献 特開 平3−82237(JP,A) 特開 平7−50664(JP,A) 特開 平2−184882(JP,A) 特開 平4−191787(JP,A) 特開 平4−117826(JP,A) 特開 平3−82240(JP,A) 特開 平3−82239(JP,A) (58)調査した分野(Int.Cl.7,DB名) H04L 9/32 G09C 1/00 ─────────────────────────────────────────────────── ─── Continuation of the front page (56) Reference JP-A-3-82237 (JP, A) JP-A-7-50664 (JP, A) JP-A-2-184882 (JP, A) JP-A-4- 191787 (JP, A) JP-A-4-117826 (JP, A) JP-A-3-82240 (JP, A) JP-A-3-82239 (JP, A) (58) Fields investigated (Int. Cl. 7 , DB name) H04L 9/32 G09C 1/00

Claims (2)

(57)【特許請求の範囲】(57) [Claims] 【請求項1】 計算機(以下、計算機3)が、他の計算
機(以下、計算機2)で発行した公開鍵の認証を行う認
証方法であって、 計算機2から、該計算機2が以前に発行した公開鍵Aと
該計算機2の身元保証情報とが認証センタの秘密鍵にて
署名された公開鍵Aに対する認証センタの署名情報と、
該計算機2が新たに発行する公開鍵Bと、該計算機2の
身元保証情報とが、前記公開鍵Aに対応する秘密鍵によ
り暗号化された暗号化情報を受信し、 前記暗号化情報を、前記計算機2が以前に発行した公開
鍵Aで復号して、公開鍵Bと、身元保証情報と、公開鍵
Aに対する認証センタの署名情報とを取り出し、 前記公開鍵Aに対する認証センタの署名情報を該認証セ
ンタの秘密鍵に対応する公開鍵で署名検証し、検証が合
格し、さらに身元保証情報が計算機2と一致した場合
に、前記公開鍵Bを計算機2の公開鍵として認証する、 ことを特徴とする計算機システムの認証方法。
1. A computer (hereinafter, computer 3) is used for other calculations.
Authentication that authenticates the public key issued by the machine (hereinafter, computer 2)
This is a verification method, in which the computer 2 uses the public key A previously issued by the computer 2.
The identity guarantee information of the computer 2 is the secret key of the authentication center.
The signature information of the authentication center for the signed public key A,
The public key B newly issued by the computer 2 and the public key B of the computer 2
The identity guarantee information is based on the private key corresponding to the public key A.
Received encrypted information and published the encrypted information previously issued by the computer 2.
Decrypt with key A, public key B, identity assurance information, public key
The signature information of the authentication center for A is taken out, and the signature information of the authentication center for the public key A is obtained.
Signature verification with the public key corresponding to the private key of the
And the identity guarantee information matches that of Calculator 2
In addition, the public key B is authenticated as a public key of the computer 2, and the computer system authentication method.
【請求項2】 計算機(以下、計算機3)が、他の計算
機(以下、計算機2)で発行した公開鍵の認証を行う認
証方法であって、 計算機2から、該計算機2が以前に発行した公開鍵Aと
該計算機2の身元保証情報とが認証センタの秘密鍵にて
署名された公開鍵Aに対する認証センタの署名情報と、
該計算機2が新たに発行する公開鍵Bと、該計算機2の
身元保証情報とからなる認証準備情報、及び、前記認証
準備情報を前記公開鍵Aに対応する秘密鍵にて署名した
署名情報を受信し、 前記認証準備情報の署名情報を、前記計算機2が以前に
発行した公開鍵Aで検証し、さらに、前記公開鍵Aに対
する認証センタの署名情報を該認証センタの秘密鍵に対
応する公開鍵で署名検証し、検証が合格し、さらに身元
保証情報が計算機2と一致した場合に、前記公開鍵Bを
計算機2の公開鍵として認証する、 ことを特徴とする計算機システムの認証方法。
2. A computer (hereinafter, computer 3) is used for other calculations.
Authentication that authenticates the public key issued by the machine (hereinafter, computer 2)
This is a verification method, in which the computer 2 uses the public key A previously issued by the computer 2.
The identity guarantee information of the computer 2 is the secret key of the authentication center.
The signature information of the authentication center for the signed public key A,
The public key B newly issued by the computer 2 and the public key B of the computer 2
Authentication preparation information consisting of identity assurance information and the authentication
The preparation information is signed with the private key corresponding to the public key A.
The computer 2 previously receives the signature information and receives the signature information of the authentication preparation information.
Verify with the issued public key A, and
The authentication center's signature information to the authentication center's private key.
The signature is verified with the corresponding public key, the verification is passed, and
If the guarantee information matches the computer 2, the public key B is used.
An authentication method for a computer system, characterized by authenticating as a public key of a computer 2 .
JP07203596A 1996-03-27 1996-03-27 Computer system authentication method Expired - Fee Related JP3485221B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP07203596A JP3485221B2 (en) 1996-03-27 1996-03-27 Computer system authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP07203596A JP3485221B2 (en) 1996-03-27 1996-03-27 Computer system authentication method

Publications (2)

Publication Number Publication Date
JPH09261218A JPH09261218A (en) 1997-10-03
JP3485221B2 true JP3485221B2 (en) 2004-01-13

Family

ID=13477755

Family Applications (1)

Application Number Title Priority Date Filing Date
JP07203596A Expired - Fee Related JP3485221B2 (en) 1996-03-27 1996-03-27 Computer system authentication method

Country Status (1)

Country Link
JP (1) JP3485221B2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111538A (en) * 1999-10-05 2001-04-20 Dainippon Printing Co Ltd Communication system, method therefor, communication equipment and ic card
JP4626001B2 (en) * 1999-10-19 2011-02-02 ソニー株式会社 Encrypted communication system and encrypted communication method
US7412524B1 (en) 2000-07-27 2008-08-12 International Business Machines Corporation Method and system for authentication when certification authority public and private keys expire
US7366905B2 (en) * 2002-02-28 2008-04-29 Nokia Corporation Method and system for user generated keys and certificates

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02184882A (en) * 1989-01-11 1990-07-19 Hitachi Ltd Method for administrating public key of public key cipher
JP2904819B2 (en) * 1989-08-25 1999-06-14 日本電信電話株式会社 Digital signature method
JP2904818B2 (en) * 1989-08-25 1999-06-14 日本電信電話株式会社 Public key encryption / authentication method
JPH0382239A (en) * 1989-08-25 1991-04-08 Nippon Telegr & Teleph Corp <Ntt> Cryptographic key delivering system
JP2870163B2 (en) * 1990-09-07 1999-03-10 松下電器産業株式会社 Key distribution method with authentication function
JP2956709B2 (en) * 1990-11-26 1999-10-04 松下電器産業 株式会社 Public key generation method and apparatus
JPH0750664A (en) * 1993-08-04 1995-02-21 Matsushita Electric Ind Co Ltd Encipherment system based on identification information

Also Published As

Publication number Publication date
JPH09261218A (en) 1997-10-03

Similar Documents

Publication Publication Date Title
CN109600233B (en) Group signature label issuing method based on SM2 digital signature algorithm
US7366905B2 (en) Method and system for user generated keys and certificates
US7461250B1 (en) System and method for certificate exchange
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
RU2213367C2 (en) Method for controlling cryptographic keys during communication between first and second computer units
CN101212293B (en) Identity authentication method and system
US20030204732A1 (en) System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
US6952475B1 (en) Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit
US20030081774A1 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
CN110020524B (en) Bidirectional authentication method based on smart card
CN112104453B (en) Anti-quantum computation digital signature system and signature method based on digital certificate
CN114726546B (en) Digital identity authentication method, device, equipment and storage medium
CN111614621A (en) Internet of things communication method and system
CN113868684A (en) Signature method, device, server, medium and signature system
US7360238B2 (en) Method and system for authentication of a user
CN113411801B (en) Mobile terminal authentication method based on identity signcryption
CN114826659A (en) Encryption communication method and system
US8452966B1 (en) Methods and apparatus for verifying a purported user identity
JP3485221B2 (en) Computer system authentication method
CN114189338B (en) SM9 key secure distribution and management system and method based on homomorphic encryption technology
JP3864656B2 (en) Data transmission method
GB2407236A (en) Diffie-Hellman exchange of a session key
JPH11231776A (en) Method and device for issuing certificate
JPH07118709B2 (en) Confidential information communication method
RU2278477C2 (en) Authentication method for stationary regional wireless broadband access systems

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20071024

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20081024

Year of fee payment: 5

LAPS Cancellation because of no payment of annual fees