JP4932168B2 - 新しいフェア・ブラインド署名プロセス - Google Patents
新しいフェア・ブラインド署名プロセス Download PDFInfo
- Publication number
- JP4932168B2 JP4932168B2 JP2005058204A JP2005058204A JP4932168B2 JP 4932168 B2 JP4932168 B2 JP 4932168B2 JP 2005058204 A JP2005058204 A JP 2005058204A JP 2005058204 A JP2005058204 A JP 2005058204A JP 4932168 B2 JP4932168 B2 JP 4932168B2
- Authority
- JP
- Japan
- Prior art keywords
- signature
- signer
- user
- parameter
- user device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000014509 gene expression Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 4
- 230000003993 interaction Effects 0.000 claims description 2
- 238000004364 calculation method Methods 0.000 claims 6
- 238000004590 computer program Methods 0.000 claims 4
- 230000000153 supplemental effect Effects 0.000 claims 3
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 201000004569 Blindness Diseases 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 210000001072 colon Anatomy 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004900 laundering Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B26—HAND CUTTING TOOLS; CUTTING; SEVERING
- B26B—HAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
- B26B11/00—Hand knives combined with other implements, e.g. with corkscrew, with scissors, with writing implement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B26—HAND CUTTING TOOLS; CUTTING; SEVERING
- B26B—HAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
- B26B5/00—Hand knives with one or more detachable blades
- B26B5/001—Hand knives with one or more detachable blades with blades being slid out of handle immediately prior to use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B26—HAND CUTTING TOOLS; CUTTING; SEVERING
- B26B—HAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
- B26B1/00—Hand knives with adjustable blade; Pocket knives
- B26B1/08—Hand knives with adjustable blade; Pocket knives with sliding blade
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Life Sciences & Earth Sciences (AREA)
- Forests & Forestry (AREA)
- Mechanical Engineering (AREA)
- Storage Device Security (AREA)
- Toys (AREA)
- Paper (AREA)
- Basic Packing Technique (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP04290558.8 | 2004-03-02 | ||
| EP04290558A EP1571778B1 (en) | 2004-03-02 | 2004-03-02 | Method and apparatuses for generating fair blind signatures |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2005253083A JP2005253083A (ja) | 2005-09-15 |
| JP2005253083A5 JP2005253083A5 (enExample) | 2008-04-10 |
| JP4932168B2 true JP4932168B2 (ja) | 2012-05-16 |
Family
ID=34746157
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2005058204A Expired - Fee Related JP4932168B2 (ja) | 2004-03-02 | 2005-03-02 | 新しいフェア・ブラインド署名プロセス |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7584363B2 (enExample) |
| EP (1) | EP1571778B1 (enExample) |
| JP (1) | JP4932168B2 (enExample) |
| KR (1) | KR100718489B1 (enExample) |
| AT (1) | ATE362249T1 (enExample) |
| DE (1) | DE602004006373T2 (enExample) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4367938B2 (ja) * | 2002-07-29 | 2009-11-18 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 細粒度フォワード・セキュア署名の方法、コンピュータ・プログラム要素、コンピュータ・プログラムおよびネットワーク・デバイス |
| WO2006024042A2 (en) * | 2004-08-27 | 2006-03-02 | Ntt Docomo, Inc. | Provisional signature schemes |
| JP2007004461A (ja) * | 2005-06-23 | 2007-01-11 | Nec Corp | サービス提供システム、アウトソーシング業者装置、サービス提供方法およびプログラム |
| JP4218760B2 (ja) * | 2005-07-01 | 2009-02-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | トレーサビリティ検証システム、方法、プログラム |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| US7860244B2 (en) * | 2006-12-18 | 2010-12-28 | Sap Ag | Secure computation of private values |
| EP2116000B1 (fr) * | 2007-02-28 | 2017-05-17 | Orange | Procéée d'authentification unique d'un utilisateur auprès de fournisseurs de service |
| RU2452111C1 (ru) * | 2010-11-17 | 2012-05-27 | ЗАО Институт инфокоммуникационных технологий | Способ пороговой генерации ключей для системы защиты информации на основе идентификационных данных |
| US10841080B2 (en) * | 2018-03-20 | 2020-11-17 | International Business Machines Corporation | Oblivious pseudorandom function in a key management system |
| US10887088B2 (en) * | 2018-03-20 | 2021-01-05 | International Business Machines Corporation | Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) |
| US10887293B2 (en) | 2018-03-20 | 2021-01-05 | International Business Machines Corporation | Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) |
| US11115206B2 (en) | 2018-08-23 | 2021-09-07 | International Business Machines Corporation | Assymetric structured key recovering using oblivious pseudorandom function |
| US10924267B2 (en) | 2018-08-24 | 2021-02-16 | International Business Machines Corporation | Validating keys derived from an oblivious pseudorandom function |
| FR3091107A1 (fr) * | 2018-12-24 | 2020-06-26 | Orange | Procédé et système de génération de clés pour un schéma de signatures anonymes |
| US12375478B2 (en) * | 2022-07-01 | 2025-07-29 | Thales Dis Cpl Usa, Inc. | Quorum-based authorization to secure sensitive cloud assets |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4926480A (en) * | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
| US4759063A (en) | 1983-08-22 | 1988-07-19 | Chaum David L | Blind signature systems |
| US4914698A (en) * | 1988-03-16 | 1990-04-03 | David Chaum | One-show blind signature systems |
| US4949380A (en) * | 1988-10-20 | 1990-08-14 | David Chaum | Returned-value blind signature systems |
| NL9301348A (nl) * | 1993-08-02 | 1995-03-01 | Stefanus Alfonsus Brands | Elektronisch betalingssysteem. |
| US5832089A (en) * | 1995-06-07 | 1998-11-03 | Sandia Corporation | Off-line compatible electronic cash method and system |
| KR19990053065A (ko) * | 1997-12-23 | 1999-07-15 | 정선종 | 이산대수 문제에 근거한 디지탈 다중서명 방법 |
| KR100309560B1 (ko) * | 1998-11-23 | 2001-12-17 | 오길록 | 네트워크시스템에서의내용은닉서명방법 |
| JP2000235341A (ja) | 1999-02-16 | 2000-08-29 | Nippon Telegr & Teleph Corp <Ntt> | 公開検証可能依頼復元ブラインド署名方法、その装置およびプログラム記録媒体 |
| JP3331329B2 (ja) | 1999-02-23 | 2002-10-07 | 日本電信電話株式会社 | 公開検証可依頼復元ブラインド署名方法、その装置及びプログラム記録媒体 |
| KR100349418B1 (ko) * | 1999-08-10 | 2002-08-19 | 학교법인 한국정보통신학원 | 은닉서명의 남용 방지방법 |
| KR100377352B1 (ko) * | 2000-06-01 | 2003-03-26 | 이임영 | 은닉성의 제어가 가능한 전자 서명 방법 |
| KR20020003059A (ko) * | 2000-07-01 | 2002-01-10 | 배민관 | 정수 또는 다항식 행열을 이용한 공개키 암호시스템 |
| KR100466827B1 (ko) * | 2002-06-14 | 2005-01-17 | 이임영 | 키 복구를 지원하는 신원 위탁 방법 |
-
2004
- 2004-03-02 AT AT04290558T patent/ATE362249T1/de not_active IP Right Cessation
- 2004-03-02 DE DE602004006373T patent/DE602004006373T2/de not_active Expired - Lifetime
- 2004-03-02 EP EP04290558A patent/EP1571778B1/en not_active Expired - Lifetime
-
2005
- 2005-03-02 KR KR1020050017472A patent/KR100718489B1/ko not_active Expired - Fee Related
- 2005-03-02 US US11/070,033 patent/US7584363B2/en not_active Expired - Fee Related
- 2005-03-02 JP JP2005058204A patent/JP4932168B2/ja not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US7584363B2 (en) | 2009-09-01 |
| EP1571778A1 (en) | 2005-09-07 |
| ATE362249T1 (de) | 2007-06-15 |
| US20050278536A1 (en) | 2005-12-15 |
| DE602004006373D1 (de) | 2007-06-21 |
| KR100718489B1 (ko) | 2007-05-16 |
| JP2005253083A (ja) | 2005-09-15 |
| DE602004006373T2 (de) | 2008-01-17 |
| KR20060043347A (ko) | 2006-05-15 |
| EP1571778B1 (en) | 2007-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Song | Practical forward secure group signature schemes | |
| US8245047B2 (en) | Group signature scheme with improved efficiency, in particular in a join procedure | |
| US20090217042A1 (en) | Provisional signature schemes | |
| CN110545279A (zh) | 兼具隐私和监管功能的区块链交易方法、装置及系统 | |
| US6473508B1 (en) | Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys | |
| JP4932168B2 (ja) | 新しいフェア・ブラインド署名プロセス | |
| JPWO2008146667A1 (ja) | 匿名認証システムおよび匿名認証方法 | |
| CN1241353C (zh) | 自动可恢复自动可认证密码系统 | |
| Camenisch et al. | An identity escrow scheme with appointed verifiers | |
| Kiayias et al. | Concurrent blind signatures without random oracles | |
| Lee et al. | Self-certified signatures | |
| Lin et al. | An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. | |
| CN113112268A (zh) | 匿名多重签名方法、计算机设备和存储介质 | |
| CN111224783B (zh) | 一种支持密钥刷新的两方椭圆曲线数字签名方法 | |
| CN116318736B (zh) | 一种用于分级管理的二级门限签名方法及装置 | |
| JP4533636B2 (ja) | デジタル署名システム、デジタル署名管理装置、デジタル署名管理方法及びプログラム | |
| KR20240046201A (ko) | 디지털 서명들의 생성 | |
| CN117837127A (zh) | 生成数字签名 | |
| JP4791828B2 (ja) | グループ署名システム、装置、プログラム及び方法 | |
| JP3302335B2 (ja) | 暗号文検証方法、そのプログラム記録媒体、及びその装置 | |
| Ng et al. | ECDSA-compatible privacy preserving signature with designated verifier | |
| Lin et al. | A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification | |
| Nakanishi et al. | Anonymous statistical survey of attributes | |
| Lin | RPCAE: a novel revocable proxy convertible authenticated encryption scheme | |
| Bhardwaj et al. | A Gentle Introduction to Blind signatures: From RSA to Lattice-based Cryptography |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20080222 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20080222 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110405 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110629 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110704 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110804 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110830 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111130 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20111220 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111227 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120124 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120215 |
|
| R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150224 Year of fee payment: 3 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |