JP4405810B2 - 階層型の同一性に基づく暗号化および署名スキーム - Google Patents
階層型の同一性に基づく暗号化および署名スキーム Download PDFInfo
- Publication number
- JP4405810B2 JP4405810B2 JP2003579369A JP2003579369A JP4405810B2 JP 4405810 B2 JP4405810 B2 JP 4405810B2 JP 2003579369 A JP2003579369 A JP 2003579369A JP 2003579369 A JP2003579369 A JP 2003579369A JP 4405810 B2 JP4405810 B2 JP 4405810B2
- Authority
- JP
- Japan
- Prior art keywords
- secret
- level
- key generator
- root
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 claims abstract description 129
- 230000008569 process Effects 0.000 claims description 20
- 125000004122 cyclic group Chemical group 0.000 claims description 17
- 230000005540 biological transmission Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 30
- 230000009977 dual effect Effects 0.000 description 27
- 238000000605 extraction Methods 0.000 description 24
- 208000018208 Hyperimmunoglobulinemia D with periodic fever Diseases 0.000 description 12
- 206010072219 Mevalonic aciduria Diseases 0.000 description 12
- DTXLBRAVKYTGFE-UHFFFAOYSA-J tetrasodium;2-(1,2-dicarboxylatoethylamino)-3-hydroxybutanedioate Chemical compound [Na+].[Na+].[Na+].[Na+].[O-]C(=O)C(O)C(C([O-])=O)NC(C([O-])=O)CC([O-])=O DTXLBRAVKYTGFE-UHFFFAOYSA-J 0.000 description 12
- 230000008901 benefit Effects 0.000 description 9
- 238000012795 verification Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 230000001010 compromised effect Effects 0.000 description 4
- 230000003044 adaptive effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000002829 reductive effect Effects 0.000 description 3
- 230000036961 partial effect Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
- H04L9/007—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models involving hierarchical structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Mobile Radio Communication Systems (AREA)
- Amplifiers (AREA)
- Credit Cards Or The Like (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US36629202P | 2002-03-21 | 2002-03-21 | |
US36619602P | 2002-03-21 | 2002-03-21 | |
US10/384,328 US7349538B2 (en) | 2002-03-21 | 2003-03-07 | Hierarchical identity-based encryption and signature schemes |
PCT/US2003/008010 WO2003081780A2 (en) | 2002-03-21 | 2003-03-18 | Hierarchical identity-based encryption and signature schemes |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2005521323A JP2005521323A (ja) | 2005-07-14 |
JP2005521323A5 JP2005521323A5 (US07443980-20081028-P00096.png) | 2007-07-12 |
JP4405810B2 true JP4405810B2 (ja) | 2010-01-27 |
Family
ID=28046523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2003579369A Expired - Lifetime JP4405810B2 (ja) | 2002-03-21 | 2003-03-18 | 階層型の同一性に基づく暗号化および署名スキーム |
Country Status (8)
Families Citing this family (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
US7533270B2 (en) * | 2002-04-15 | 2009-05-12 | Ntt Docomo, Inc. | Signature schemes using bilinear mappings |
US20050089173A1 (en) * | 2002-07-05 | 2005-04-28 | Harrison Keith A. | Trusted authority for identifier-based cryptography |
GB0215524D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
GB0215590D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
CN1679271A (zh) * | 2002-08-28 | 2005-10-05 | 美国多科摩通讯研究所股份有限公司 | 基于认证的加密和公共密钥基础结构 |
US6886096B2 (en) * | 2002-11-14 | 2005-04-26 | Voltage Security, Inc. | Identity-based encryption system |
US7003117B2 (en) * | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
US8108678B1 (en) * | 2003-02-10 | 2012-01-31 | Voltage Security, Inc. | Identity-based signcryption system |
KR100507809B1 (ko) * | 2003-03-19 | 2005-08-17 | 학교법인 한국정보통신학원 | 네트워크상에서의 겹선형쌍 디피-헬만 문제를 이용한 익명핑거프린팅 방법 |
GB2400699B (en) * | 2003-04-17 | 2006-07-05 | Hewlett Packard Development Co | Security data provision method and apparatus and data recovery method and system |
US7580521B1 (en) * | 2003-06-25 | 2009-08-25 | Voltage Security, Inc. | Identity-based-encryption system with hidden public key attributes |
US7017181B2 (en) * | 2003-06-25 | 2006-03-21 | Voltage Security, Inc. | Identity-based-encryption messaging system with public parameter host servers |
US7103911B2 (en) * | 2003-10-17 | 2006-09-05 | Voltage Security, Inc. | Identity-based-encryption system with district policy information |
CN102868528B (zh) * | 2003-10-28 | 2015-09-09 | 塞尔蒂卡姆公司 | 一种公开密钥的可验证生成的设备和对应认证中心 |
US20050135610A1 (en) * | 2003-11-01 | 2005-06-23 | Liqun Chen | Identifier-based signcryption |
GB2416282B (en) | 2004-07-15 | 2007-05-16 | Hewlett Packard Development Co | Identifier-based signcryption with two trusted authorities |
US7657037B2 (en) * | 2004-09-20 | 2010-02-02 | Pgp Corporation | Apparatus and method for identity-based encryption within a conventional public-key infrastructure |
US20060078790A1 (en) * | 2004-10-05 | 2006-04-13 | Polyplus Battery Company | Solid electrolytes based on lithium hafnium phosphate for active metal anode protection |
EP1847093A1 (en) * | 2005-02-04 | 2007-10-24 | Nokia Corporation | Apparatus, method and computer program product to reduce tcp flooding attacks while conserving wireless network bandwidth |
JP2007004461A (ja) * | 2005-06-23 | 2007-01-11 | Nec Corp | サービス提供システム、アウトソーシング業者装置、サービス提供方法およびプログラム |
US20070050303A1 (en) * | 2005-08-24 | 2007-03-01 | Schroeder Dale W | Biometric identification device |
US7788484B2 (en) * | 2005-11-30 | 2010-08-31 | Microsoft Corporation | Using hierarchical identity based cryptography for authenticating outbound mail |
CN1859086B (zh) * | 2005-12-31 | 2010-06-09 | 华为技术有限公司 | 一种内容分级访问控制系统和方法 |
GB2434947B (en) * | 2006-02-02 | 2011-01-26 | Identum Ltd | Electronic data communication system |
CN100542091C (zh) * | 2006-07-07 | 2009-09-16 | 上海交通大学 | 一种基于身份的密钥生成方法及系统 |
US8670564B1 (en) | 2006-08-14 | 2014-03-11 | Key Holdings, LLC | Data encryption system and method |
US7900252B2 (en) * | 2006-08-28 | 2011-03-01 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for managing shared passwords on a multi-user computer |
US20080133905A1 (en) * | 2006-11-30 | 2008-06-05 | David Carroll Challener | Apparatus, system, and method for remotely accessing a shared password |
JP5245835B2 (ja) * | 2007-02-13 | 2013-07-24 | 日本電気株式会社 | 鍵生成装置、鍵導出装置、暗号化装置、復号化装置、方法、及び、プログラム |
EP1986146A1 (en) * | 2007-04-27 | 2008-10-29 | Gemplus | Transaction method between two entities providing anonymity revocation for tree-based schemes without trusted party |
US7890763B1 (en) * | 2007-09-14 | 2011-02-15 | The United States Of America As Represented By The Director, National Security Agency | Method of identifying invalid digital signatures involving batch verification |
WO2009110055A1 (ja) * | 2008-03-03 | 2009-09-11 | 株式会社Pfu | 画像処理システム、方法およびプログラム |
CN101567784B (zh) * | 2008-04-21 | 2016-03-30 | 华为数字技术(成都)有限公司 | 一种获取密钥的方法、系统和设备 |
US8656177B2 (en) * | 2008-06-23 | 2014-02-18 | Voltage Security, Inc. | Identity-based-encryption system |
US9425960B2 (en) * | 2008-10-17 | 2016-08-23 | Sap Se | Searchable encryption for outsourcing data analytics |
US8315395B2 (en) * | 2008-12-10 | 2012-11-20 | Oracle America, Inc. | Nearly-stateless key escrow service |
US9165154B2 (en) * | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
US8341427B2 (en) * | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
US8837718B2 (en) * | 2009-03-27 | 2014-09-16 | Microsoft Corporation | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store |
EP2424155B1 (en) * | 2009-04-24 | 2014-09-03 | Nippon Telegraph And Telephone Corporation | Information generating device, information generating method, and information generating program and storage medium thereof |
DE102009027268B3 (de) * | 2009-06-29 | 2010-12-02 | Bundesdruckerei Gmbh | Verfahren zur Erzeugung eines Identifikators |
JP5285778B2 (ja) * | 2009-08-03 | 2013-09-11 | 日本電信電話株式会社 | 関数暗号応用システム及び方法 |
JP2011082662A (ja) * | 2009-10-05 | 2011-04-21 | Mitsubishi Electric Corp | 通信装置及び情報処理方法及びプログラム |
CN101820626B (zh) * | 2009-10-19 | 2013-04-10 | 兰州理工大学 | 基于无线mesh网络身份的无可信pkg的部分盲签名方法 |
US8488783B2 (en) * | 2010-02-19 | 2013-07-16 | Nokia | Method and apparatus for applying recipient criteria in identity-based encryption |
WO2011147092A1 (zh) * | 2010-05-27 | 2011-12-01 | 华南理工大学 | 一种基于线性几何的等级群组密钥管理方法 |
US20120069995A1 (en) * | 2010-09-22 | 2012-03-22 | Seagate Technology Llc | Controller chip with zeroizable root key |
JP5693206B2 (ja) * | 2010-12-22 | 2015-04-01 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
CN102123138B (zh) * | 2011-01-04 | 2014-12-10 | 南京邮电大学 | 物联网中基于ons的安全加密方法 |
CN103329478B (zh) * | 2011-01-18 | 2015-11-25 | 三菱电机株式会社 | 密码系统以及密码系统的密码处理方法 |
JP5606351B2 (ja) * | 2011-02-09 | 2014-10-15 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、鍵委譲装置、暗号処理方法及び暗号処理プログラム |
EP2697933A4 (en) * | 2011-04-15 | 2014-09-24 | Samsung Electronics Co Ltd | METHOD AND DEVICE FOR PROVIDING A MACHINE TO MACHINE SERVICE |
KR101301609B1 (ko) * | 2012-05-31 | 2013-08-29 | 서울대학교산학협력단 | 비밀키 생성 장치 및 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체 |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
WO2014112170A1 (ja) * | 2013-01-16 | 2014-07-24 | 三菱電機株式会社 | 情報処理装置及び情報処理方法及びプログラム |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US9692759B1 (en) | 2014-04-14 | 2017-06-27 | Trend Micro Incorporated | Control of cloud application access for enterprise customers |
CN105207969A (zh) * | 2014-06-10 | 2015-12-30 | 江苏大泰信息技术有限公司 | 一种应用于物联网低功耗环境下的轻量级流式加密方法 |
DE102014213454A1 (de) * | 2014-07-10 | 2016-01-14 | Siemens Aktiengesellschaft | Verfahren und System zur Erkennung einer Manipulation von Datensätzen |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
EP3248360B1 (en) | 2015-01-19 | 2020-05-06 | Inauth, Inc. | Systems and methods for trusted path secure communication |
FR3033466B1 (fr) * | 2015-03-04 | 2017-02-17 | Inria Inst Nat De Rech En Informatique Et En Automatique | Dispositif et procede d'administration d'un serveur de sequestres numeriques |
CN105049211B (zh) * | 2015-07-13 | 2018-11-27 | 深圳康元智能科技有限公司 | 格上基于累积器的可撤销的基于身份的加密方法 |
CN105024822B (zh) * | 2015-07-13 | 2018-11-13 | 上海星地通讯工程研究所 | 来自多线性映射的基于身份加密方法 |
CN105187202B (zh) * | 2015-07-13 | 2018-12-21 | 重庆涔信科技有限公司 | 基于完全二叉树的可撤销的属性加密方法 |
CN105024821B (zh) * | 2015-07-13 | 2018-10-30 | 广东恒睿科技有限公司 | 格上可撤销的基于身份的加密方法 |
FR3043482B1 (fr) * | 2015-11-06 | 2018-09-21 | Ingenico Group | Procede d'enregistrement securise de donnees, dispositif et programme correspondants |
CN105553654B (zh) * | 2015-12-31 | 2019-09-03 | 广东信鉴信息科技有限公司 | 密钥信息处理方法和装置、密钥信息管理系统 |
CN105743646B (zh) * | 2016-02-03 | 2019-05-10 | 四川长虹电器股份有限公司 | 一种基于身份的加密方法及系统 |
US10050946B2 (en) * | 2016-06-17 | 2018-08-14 | The Boeing Company | Secured data transmission using identity-based cryptography |
JP6721832B2 (ja) * | 2016-08-24 | 2020-07-15 | 富士通株式会社 | データ変換プログラム、データ変換装置及びデータ変換方法 |
CN106453052B (zh) * | 2016-10-14 | 2020-06-19 | 北京小米移动软件有限公司 | 消息交互方法及装置 |
CN108011715B (zh) * | 2016-10-31 | 2021-03-23 | 华为技术有限公司 | 一种密钥的分发方法、相关设备和系统 |
CN106911704B (zh) * | 2017-03-13 | 2020-10-09 | 北京轻信科技有限公司 | 一种基于区块链的加密解密方法 |
US11128452B2 (en) * | 2017-03-25 | 2021-09-21 | AVAST Software s.r.o. | Encrypted data sharing with a hierarchical key structure |
US10411891B2 (en) * | 2017-06-28 | 2019-09-10 | Nxp B.V. | Distance-revealing encryption |
CN109218016B (zh) * | 2017-07-06 | 2020-05-26 | 北京嘀嘀无限科技发展有限公司 | 数据传输方法及装置、服务器、计算机设备和存储介质 |
CN107679262B (zh) * | 2017-08-11 | 2021-03-26 | 上海集成电路研发中心有限公司 | 一种mos器件衬底外围寄生电阻的建模方法 |
US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
EP3824609A1 (en) | 2018-07-17 | 2021-05-26 | Telefonaktiebolaget LM Ericsson (publ) | Multi-x key chaining for generic bootstrapping architecture (gba) |
JP2020068437A (ja) * | 2018-10-23 | 2020-04-30 | 株式会社アメニディ | アクセス管理装置、及びプログラム |
US11128454B2 (en) | 2019-05-30 | 2021-09-21 | Bong Mann Kim | Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange |
CN110266492B (zh) * | 2019-05-31 | 2023-06-09 | 中国能源建设集团甘肃省电力设计院有限公司 | 一种可追踪的泛在电力物联网身份认证方法 |
CA3146035A1 (en) | 2019-08-12 | 2021-02-18 | Audio Visual Preservation Solutions, Inc. | Source identifying forensics system, device, and method for multimedia files |
JP7444378B2 (ja) | 2021-01-08 | 2024-03-06 | 日本電信電話株式会社 | 鍵交換システム、通信端末、情報処理装置、鍵交換方法、及びプログラム |
CN113259093B (zh) * | 2021-04-21 | 2022-03-25 | 山东大学 | 基于身份基加密的层级签名加密系统与构建方法 |
CN113297630B (zh) * | 2021-05-27 | 2022-09-30 | 河南科技大学 | 一种前向安全群签名管理方法 |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4309569A (en) | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
US5432852A (en) * | 1993-09-29 | 1995-07-11 | Leighton; Frank T. | Large provably fast and secure digital signature schemes based on secure hash functions |
DE69534192T2 (de) * | 1994-07-29 | 2006-02-16 | Canon K.K. | Verfahren zur gemeinsamen Nutzung einer geheimen Information, zur Erzeugung einer digitalen Unterschrift und zur Ausführung einer Beglaubigung in einem Kommunikationssystem mit mehreren Informationsverarbeitungseinrichtungen und Kommunikationssystem zur Anwendung dieses Verfahrens |
DE69534603T2 (de) * | 1994-07-29 | 2006-08-03 | Certicom Corp., Mississauga | Verschlüsselungssystem für elliptische kurve |
US5590197A (en) | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
CA2223305A1 (en) | 1995-06-05 | 1996-12-12 | Certco Llc | Multi-step digital signature method and system |
US5774552A (en) | 1995-12-13 | 1998-06-30 | Ncr Corporation | Method and apparatus for retrieving X.509 certificates from an X.500 directory |
US5638447A (en) * | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
US6212637B1 (en) | 1997-07-04 | 2001-04-03 | Nippon Telegraph And Telephone Corporation | Method and apparatus for en-bloc verification of plural digital signatures and recording medium with the method recorded thereon |
US6298153B1 (en) * | 1998-01-16 | 2001-10-02 | Canon Kabushiki Kaisha | Digital signature method and information communication system and apparatus using such method |
US6754820B1 (en) | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
US6826687B1 (en) * | 1999-05-07 | 2004-11-30 | International Business Machines Corporation | Commitments in signatures |
US6735313B1 (en) | 1999-05-07 | 2004-05-11 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers |
US6760441B1 (en) | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
JP4622064B2 (ja) | 2000-04-06 | 2011-02-02 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
JP4660899B2 (ja) * | 2000-07-24 | 2011-03-30 | ソニー株式会社 | データ処理装置およびデータ処理方法、並びにプログラム提供媒体 |
EP1316171A4 (en) | 2000-08-04 | 2006-05-03 | First Data Corp | PERSONNEL AND CONTOUR DIGITAL SIGNATURE SYSTEM |
US6886296B1 (en) * | 2000-08-14 | 2005-05-03 | Michael John | Wooden post protective sleeve |
US20020025034A1 (en) * | 2000-08-18 | 2002-02-28 | Solinas Jerome Anthony | Cryptographic encryption method using efficient elliptic curve |
JP4622087B2 (ja) | 2000-11-09 | 2011-02-02 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにプログラム記憶媒体 |
US7088822B2 (en) | 2001-02-13 | 2006-08-08 | Sony Corporation | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith |
US20020154782A1 (en) | 2001-03-23 | 2002-10-24 | Chow Richard T. | System and method for key distribution to maintain secure communication |
US7113594B2 (en) | 2001-08-13 | 2006-09-26 | The Board Of Trustees Of The Leland Stanford University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7093133B2 (en) * | 2001-12-20 | 2006-08-15 | Hewlett-Packard Development Company, L.P. | Group signature generation system using multiple primes |
US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
US7533270B2 (en) | 2002-04-15 | 2009-05-12 | Ntt Docomo, Inc. | Signature schemes using bilinear mappings |
CN1679271A (zh) | 2002-08-28 | 2005-10-05 | 美国多科摩通讯研究所股份有限公司 | 基于认证的加密和公共密钥基础结构 |
CN100499450C (zh) * | 2003-04-22 | 2009-06-10 | 国际商业机器公司 | 数字资源的分层密钥生成方法及其设备 |
FR2855343B1 (fr) * | 2003-05-20 | 2005-10-07 | France Telecom | Procede de signature electronique de groupe avec anonymat revocable, equipements et programmes pour la mise en oeuvre du procede |
KR100537514B1 (ko) * | 2003-11-01 | 2005-12-19 | 삼성전자주식회사 | 그룹 구성원의 신원 정보를 기반으로 한 전자 서명 방법및 전자 서명을 수행한 그룹 구성원의 신원 정보를획득하기 위한 방법 및 그룹 구성원의 신원 정보를기반으로 한 전자 서명 시스템 |
DE60315853D1 (de) * | 2003-12-24 | 2007-10-04 | St Microelectronics Srl | Verfahren zur Entschlüsselung einer Nachricht |
JP4692284B2 (ja) * | 2004-01-23 | 2011-06-01 | 日本電気株式会社 | グループ署名システム、方法、装置、およびプログラム |
JP4546231B2 (ja) * | 2004-12-09 | 2010-09-15 | 株式会社日立製作所 | Idベース署名及び暗号化システムおよび方法 |
EP2634958A1 (en) * | 2005-01-21 | 2013-09-04 | Nec Corporation | Group Signature Scheme |
KR100737876B1 (ko) * | 2005-02-25 | 2007-07-12 | 삼성전자주식회사 | 계층적 문턱 트리에 기반한 브로드캐스트 암호화 방법 |
EP1921791A1 (en) * | 2005-07-19 | 2008-05-14 | NEC Corporation | Key issuing method and group signature system |
US8060741B2 (en) * | 2006-12-29 | 2011-11-15 | Industrial Technology Research Institute | System and method for wireless mobile network authentication |
-
2003
- 2003-03-07 US US10/384,328 patent/US7349538B2/en active Active
- 2003-03-18 JP JP2003579369A patent/JP4405810B2/ja not_active Expired - Lifetime
- 2003-03-18 EP EP10184410.8A patent/EP2309671A3/en not_active Withdrawn
- 2003-03-18 CN CN038039109A patent/CN1633774B/zh not_active Expired - Lifetime
- 2003-03-18 EP EP08154836A patent/EP2012459A1/en not_active Withdrawn
- 2003-03-18 AT AT03711597T patent/ATE419690T1/de not_active IP Right Cessation
- 2003-03-18 AU AU2003214189A patent/AU2003214189A1/en not_active Abandoned
- 2003-03-18 DE DE60325575T patent/DE60325575D1/de not_active Expired - Lifetime
- 2003-03-18 EP EP03711597A patent/EP1495573B1/en not_active Expired - Lifetime
- 2003-03-18 WO PCT/US2003/008010 patent/WO2003081780A2/en active Application Filing
-
2006
- 2006-10-23 US US11/552,076 patent/US7337322B2/en not_active Expired - Lifetime
-
2007
- 2007-07-19 US US11/780,114 patent/US7443980B2/en not_active Expired - Lifetime
- 2007-10-24 US US11/923,148 patent/US7590854B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
US20070050629A1 (en) | 2007-03-01 |
EP2012459A1 (en) | 2009-01-07 |
AU2003214189A8 (en) | 2003-10-08 |
US7337322B2 (en) | 2008-02-26 |
JP2005521323A (ja) | 2005-07-14 |
US7590854B2 (en) | 2009-09-15 |
WO2003081780A2 (en) | 2003-10-02 |
EP2309671A2 (en) | 2011-04-13 |
US7349538B2 (en) | 2008-03-25 |
CN1633774A (zh) | 2005-06-29 |
AU2003214189A1 (en) | 2003-10-08 |
CN1633774B (zh) | 2011-12-07 |
ATE419690T1 (de) | 2009-01-15 |
WO2003081780A3 (en) | 2004-02-19 |
EP1495573B1 (en) | 2008-12-31 |
EP1495573A2 (en) | 2005-01-12 |
DE60325575D1 (de) | 2009-02-12 |
EP2309671A3 (en) | 2013-08-28 |
EP1495573A4 (en) | 2006-10-11 |
US7443980B2 (en) | 2008-10-28 |
US20080052521A1 (en) | 2008-02-28 |
US20030179885A1 (en) | 2003-09-25 |
US20080013722A1 (en) | 2008-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4405810B2 (ja) | 階層型の同一性に基づく暗号化および署名スキーム | |
JP4712017B2 (ja) | ストリーム暗号を利用したメッセージ認証コード生成方法とストリーム暗号を利用した認証暗号化方法及びストリーム暗号を利用した認証復号化方法 | |
US7653817B2 (en) | Signature schemes using bilinear mappings | |
JP4546231B2 (ja) | Idベース署名及び暗号化システムおよび方法 | |
US7221758B2 (en) | Practical non-malleable public-key cryptosystem | |
CN110138543A (zh) | 格公钥密码体制下的盲签密方法 | |
Lai et al. | Self-generated-certificate public key encryption without pairing | |
McCullagh et al. | Efficient and forward-secure identity-based signcryption | |
KR100396740B1 (ko) | 계산적 디피-헬만 가정에 기반하는 안전성 증명 가능한공개키 암호화 방법 | |
Khullar et al. | An efficient identity based multi-receiver signcryption scheme using ECC | |
JP4563037B2 (ja) | 暗号化装置および復号化装置、並びにこれらを備えた暗号システム、暗号化方法および復号化方法 | |
CN103684764B (zh) | 一种具有前向安全的高效公钥加密方法 | |
Backes et al. | Fully secure inner-product proxy re-encryption with constant size ciphertext | |
US20130058483A1 (en) | Public key cryptosystem and technique | |
CN111447064B (zh) | 一种适用于无证书加密的密码逆向防火墙方法 | |
Krishna | A randomized cloud library security environment | |
CN116886290A (zh) | 一种后量子安全的身份基匹配加密方法 | |
Abbood et al. | Proposal of New Block Cipher Algorithm Depend on Public Key Algorithms | |
Hu et al. | Fully secure identity based proxy re-encryption schemes in the standard model | |
CN116074016A (zh) | 一种基于门限机制的保护密钥的签密方法 | |
Aman et al. | Secure message authentication using true random number generator based on Signcryption scheme using ECC | |
Patil et al. | A review on digital signature schemes | |
Abidin et al. | An Approach to Cryptosystem through a Proposed and Secured Protocol | |
Sarlabous | Introduction to cryptography | |
JP2000298432A (ja) | 暗号化方法及び復号方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20051115 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20060120 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20060223 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20070525 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20090721 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090915 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20091020 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20091105 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20121113 Year of fee payment: 3 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4405810 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20121113 Year of fee payment: 3 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20131113 Year of fee payment: 4 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
EXPY | Cancellation because of completion of term |