JP5373026B2 - デジタル署名と公開鍵の促進された検証 - Google Patents
デジタル署名と公開鍵の促進された検証 Download PDFInfo
- Publication number
- JP5373026B2 JP5373026B2 JP2011230106A JP2011230106A JP5373026B2 JP 5373026 B2 JP5373026 B2 JP 5373026B2 JP 2011230106 A JP2011230106 A JP 2011230106A JP 2011230106 A JP2011230106 A JP 2011230106A JP 5373026 B2 JP5373026 B2 JP 5373026B2
- Authority
- JP
- Japan
- Prior art keywords
- signature
- verification
- public key
- item
- point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title abstract description 109
- 238000000034 method Methods 0.000 claims description 108
- 238000012545 processing Methods 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000004364 calculation method Methods 0.000 description 46
- 238000004891 communication Methods 0.000 description 45
- 238000004422 calculation algorithm Methods 0.000 description 39
- 238000007792 addition Methods 0.000 description 26
- 230000008901 benefit Effects 0.000 description 13
- 230000006870 function Effects 0.000 description 10
- 230000007774 longterm Effects 0.000 description 10
- 125000004122 cyclic group Chemical group 0.000 description 9
- 238000013459 approach Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 230000014509 gene expression Effects 0.000 description 5
- 238000010200 validation analysis Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006872 improvement Effects 0.000 description 3
- 230000001939 inductive effect Effects 0.000 description 3
- 125000002015 acyclic group Chemical group 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000004904 shortening Methods 0.000 description 2
- 239000013598 vector Substances 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000001994 activation Methods 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000012892 rational function Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- Algebra (AREA)
- General Engineering & Computer Science (AREA)
- Complex Calculations (AREA)
- Storage Device Security (AREA)
- Error Detection And Correction (AREA)
- Credit Cards Or The Like (AREA)
Description
例えば、本発明は以下の項目を提供する。
(項目1)
楕円曲線上の点対のスカラー倍の合計と、上記曲線上の第3点の間の関係の相等性を検証する方法であって、i)上記スカラーの1つよりも短く、その比は上記スカラーに相当するビット長の整数対を取得するステップと、ii)上記整数を、上記関係における上記スカラーに代入して、上記項の少なくとも1つが、縮小ビット長の上記点の1つのスカラー倍である等価関係を取得するステップと、iii)上記等価関係を計算して、上記相等性を検証するステップと、を含む方法。
(項目2)
一対の上記項は、縮小ビット長を有する項目1に記載の方法。
(項目3)
上記整数の他の1つは、上記第3点を修正して、縮小ビット長のスカラー倍を与える項目2に記載の方法。
(項目4)
上記等価関係の更なる項は、それぞれが縮小長のビット列により表現され、その1つは、固定値を有し、他の1つは可変である点の対に分離される項目3に記載の方法。
(項目5)
固定値の上記点の上記1つは、繰返しの使用のために前計算されて格納される項目4に記載の方法。
(項目6)
上記整数は、等しいビット長を有する項目3に記載の方法。
(項目7)
上記整数は、異なるビット長を有する項目3に記載の方法。
(項目8)
上記相等性は、上記点の合計を群の単位元に等しいと置き、少なくとも一対の上記点に対して、同時加算を行うことで検証される項目3に記載の方法。
(項目9)
少なくとも上記一対の点の加算計算は、同時倍加算アルゴリズムを使用して行われる項目8に記載の方法。
(項目10)
上記点は、上記点の1つが固定で上記点の他が可変で、上記可変の点は縮小ビット長の上記整数に関連付けられているシステムにおいて使用される項目3に記載の方法。
(項目11)
上記固定点のスカラー倍の少なくとも一部分は前計算される項目10に記載の方法。
(項目12)
上記固定点の上記スカラー倍は一対の点に分割され、上記点の1つは前計算される項目11に記載の方法。
(項目13)
上記点のそれぞれのスカラー倍は合計され、結果は相等性の検証のために群の単位元と比較される項目12に記載の方法。
(項目14)
上記整数は、必要なビット長の整数が得られたとき中断される反復アルゴリズムを使用して取得される項目1に記載の方法。
(項目15)
上記アルゴリズムは拡張ユークリッドアルゴリズムである項目14に記載の方法。
(項目16)
定義された最大ビット長のビット列により表現される元を有する有限体の群における暗号演算により行われる、メッセージのデジタル署名を検証する方法であって、上記署名は、一対の成分を備え、対の1つは署名者の一時的公開鍵から導出され、対の他方は、上記メッセージと、上記第1成分と上記署名者の上記一時的公開鍵および長期公開鍵とを結合し、上記方法は、上記第1成分から上記一時的公開鍵を取り出すステップと、検証の相等性を、上記一時的公開鍵と、上記長期公開鍵と、上記群の生成子に対する群演算の結合として確立するステップであって、上記群演算の少なくとも1つは、上記定義された最大ビット長より短い縮小ビット長を有するビット列により表現されるオペランドを含むステップと、上記結合を計算して、上記相等性が成立すれば上記署名を承認し、上記相等性が成立しないときは上記署名を拒絶するステップを備える方法。
(項目17)
縮小ビット長の上記群演算は、上記一時的公開鍵に対して行われる項目16に記載の方法。
(項目18)
上記一時的公開鍵と上記長期公開鍵に対する群演算はそれぞれ、縮小ビット長のオペランドを含む項目17に記載の方法。
(項目19)
上記群は楕円曲線群であり、群演算の上記結合は、上記曲線上の点のスカラー倍の合計である項目16に記載の方法。
(項目20)
上記検証の相等性は、−zR=(zu mod n)G+wQの形式であり、ここにおいて、
Rは一時的公開鍵であり、
Gは群の生成子であり
Qは長期公開鍵であり、
nはそれぞれ群の位数であり、
z、wはt<nのビット長を有する整数であり、
uは上記署名成分から導出された整数であり、
Oは群の単位元である、項目19に記載の方法。
(項目21)
上記第1署名成分r=x’は、kが一時的私的鍵であるときの、一時的公開鍵kGから導出された整数であり、上記第2署名成分はs=k−1(H(M)=dr)/であり、ここにおいて、H(M)は上記メッセージのセキュアハッシュ関数であり、dは上記署名者の長期私的鍵であり、上記整数uはH(M)/ s mod nに対応する項目20に記載の方法。
(項目22)
上記署名成分は、v−r/s mod nおよびv=w/z mod nであるときの関係uG+vQ=Rを満たす項目21に記載の方法。
(項目23)
上記整数w、zは、wとzのビット長が所定の値のときに中断される反復アルゴリズムの適用により得られる項目22に記載の方法。
(項目24)
上記所定ビット長は等しい項目23に記載の方法。
(項目25)
Gの前計算された値は、上記線形結合の計算中に利用される項目20に記載の方法。
(項目26)
同時倍加算演算は、上記線形結合の計算中に行われる項目25に記載の方法。
(項目27)
上記生成子から導出された上記点は、一対の点に分割され、上記点は前計算される項目27に記載の方法。
(項目28)
2 i Gの値の表は計算され、上記表からの値は上記計算で使用される項目25に記載の方法。
(項目29)
上記点の共線性は、上記相等性の正当性を判定するためにテストされる項目19に記載の方法。
(項目30)
上記署名は、上記一時的公開鍵の複数の可能な値の1つを特定するための指標を含む項目19に記載の方法。
(項目31)
有限体の楕円曲線群における暗号演算によりメッセージの署名を生成する方法であって、署名成分の対であって、上記成分の1つは一時的公開鍵を表現する点から導出される上記署名成分対を生成するステップと、上記1つの成分から取り出すことができる上記公開鍵の複数の可能な値の1つを特定するための指標を上記署名中に含めるステップを備える方法。
(項目32)
上記指標は、上記一時的公開鍵を表現する上記点の座標の1ビットである項目31に記載の方法。
(項目33)
楕円曲線暗号システムにおいて暗号演算を使用して得られるメッセージのデジタル署名であって、署名者の一時的公開鍵を表現する点から導出された第1成分と、上記第1成分から取り出すことができる上記公開鍵の複数の値の1つを特定するための指標を含む署名。
(項目34)
上記指標は、上記点の座標の1ビットである項目33に記載の署名。
(項目35)
楕円曲線暗号システムにおいて暗号演算を使用して得られるメッセージのデジタル署名を生成する方法であって、一時的公開鍵を表現する点を生成するステップと、上記点の座標が前もって調整された基準を満たしているかどうかを判定するステップと、上記基準が満たされないときは上記点の使用を禁止するステップを備える方法。
(項目36)
上記点は、上記前もって調整された基準が満たされないときは修正される項目35に記載の方法。
(項目37)
上記基準は、上記点の上記座標の第1ビットの値である項目36に記載の方法。
(項目38)
上記点は、上記基準が満たされないときは拒絶され、更なる点が生成される項目35に記載の方法。
r1=vおよびt1=1とする。
Claims (4)
- メッセージのデジタル署名を生成する方法であって、前記方法は、暗号演算を実行するように動作可能な暗号モジュールにおいて行われ、前記暗号モジュールは、演算処理装置を含み、
前記方法は、
前記暗号モジュールが、一対の署名成分を取得することであって、前記一対の署名成分のうちの1つは、一時的公開鍵を表す楕円曲線点から導出される、ことと、
前記演算処理装置が、前記一対の署名成分のうちの前記1つから取り出すことが可能な複数の可能な値のうちの1つを識別する指標を生成することと、
前記暗号モジュールが、前記指標を前記署名に組み込むことと
を含む、方法。 - 前記指標を生成することは、前記一時的公開鍵を表す前記楕円曲線点の座標の所定のビットを識別することを含む、請求項1に記載の方法。
- 演算処理装置を有する暗号モジュールであって、前記暗号モジュールは、メッセージのデジタル署名を生成するための演算を実行するように動作可能であり、前記演算は、
前記暗号モジュールが、一対の署名成分を取得することであって、前記一対の署名成分のうちの1つは、一時的公開鍵を表す楕円曲線点から導出される、ことと、
前記演算処理装置が、前記一対の署名成分のうちの前記1つから取り出すことが可能な複数の可能な値のうちの1つを識別する指標を生成することと、
前記暗号モジュールが、前記指標を前記署名に組み込むことと
を含む、暗号モジュール。 - 前記指標を生成することは、前記一時的公開鍵を表す前記楕円曲線点の座標の所定のビットを識別することを含む、請求項3に記載の暗号モジュール。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64403405P | 2005-01-18 | 2005-01-18 | |
US60/644,034 | 2005-01-18 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2007550647A Division JP5068176B2 (ja) | 2005-01-18 | 2006-01-18 | デジタル署名と公開鍵の促進された検証 |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2012014203A JP2012014203A (ja) | 2012-01-19 |
JP2012014203A5 JP2012014203A5 (ja) | 2012-08-09 |
JP5373026B2 true JP5373026B2 (ja) | 2013-12-18 |
Family
ID=36691948
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2007550647A Active JP5068176B2 (ja) | 2005-01-18 | 2006-01-18 | デジタル署名と公開鍵の促進された検証 |
JP2011230106A Active JP5373026B2 (ja) | 2005-01-18 | 2011-10-19 | デジタル署名と公開鍵の促進された検証 |
JP2012143272A Pending JP2012212164A (ja) | 2005-01-18 | 2012-06-26 | デジタル署名と公開鍵の促進された検証 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2007550647A Active JP5068176B2 (ja) | 2005-01-18 | 2006-01-18 | デジタル署名と公開鍵の促進された検証 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2012143272A Pending JP2012212164A (ja) | 2005-01-18 | 2012-06-26 | デジタル署名と公開鍵の促進された検証 |
Country Status (7)
Country | Link |
---|---|
US (4) | US8204232B2 (ja) |
EP (2) | EP2395424B1 (ja) |
JP (3) | JP5068176B2 (ja) |
AT (1) | ATE533103T1 (ja) |
CA (2) | CA2592875C (ja) |
HK (1) | HK1165053A1 (ja) |
WO (1) | WO2006076800A1 (ja) |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7693277B2 (en) * | 2005-01-07 | 2010-04-06 | First Data Corporation | Generating digital signatures using ephemeral cryptographic key |
CA2592875C (en) | 2005-01-18 | 2016-09-06 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
US8467535B2 (en) | 2005-01-18 | 2013-06-18 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
US7885406B2 (en) | 2006-10-10 | 2011-02-08 | Microsoft Corporation | Computing endomorphism rings of Abelian surfaces over finite fields |
CA2669472C (en) * | 2006-11-13 | 2015-11-24 | Certicom Corp. | Compressed ecdsa signatures |
SG174833A1 (en) * | 2006-11-15 | 2011-10-28 | Certicom Corp | Implicit certificate verification |
WO2008067646A1 (en) * | 2006-12-04 | 2008-06-12 | Sxip Identity Corp. | Method and system for trusted client bootstrapping |
US20080319811A1 (en) * | 2007-06-21 | 2008-12-25 | Audrey Lynn Casey | System and method for modeling an asset-based business |
EP2168299A4 (en) * | 2007-07-17 | 2011-10-05 | Certicom Corp | METHOD OF COMPRESSING CRYPTOGRAPHIC VALUE |
CA2698000C (en) * | 2007-09-04 | 2015-10-27 | Certicom Corp. | Signatures with confidential message recovery |
US8874920B2 (en) * | 2008-02-26 | 2014-10-28 | Texas Instruments Incorporated | Verifying cryptographic signature from stored primitives of previously received signature |
US8345864B1 (en) * | 2008-12-12 | 2013-01-01 | Emc Corporation | Elliptic curve cryptography scalar multiplication with on demand acceleration table generation |
US8639931B2 (en) | 2008-12-16 | 2014-01-28 | Certicom Corp. | Acceleration of key agreement protocols |
US8549299B2 (en) | 2011-02-28 | 2013-10-01 | Certicom Corp. | Accelerated key agreement with assisted computations |
EP2493112B1 (en) * | 2011-02-28 | 2018-02-28 | Certicom Corp. | Accelerated key agreement with assisted computations |
US8572367B2 (en) | 2011-02-28 | 2013-10-29 | Certicom Corp. | System and method for reducing computations in an implicit certificate scheme |
EP2495907A1 (en) * | 2011-02-28 | 2012-09-05 | Certicom Corp. | System and method for reducing computations in the derivation of a publick key corresponding to an implicit certificate |
CA2770001C (en) * | 2011-03-07 | 2014-08-19 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
CN103444128B (zh) * | 2011-03-18 | 2017-04-05 | 塞尔蒂卡姆公司 | 密钥pv签名 |
US9003181B2 (en) * | 2011-03-23 | 2015-04-07 | Certicom Corp. | Incorporating data into cryptographic components of an ECQV certificate |
US8675869B2 (en) * | 2011-03-23 | 2014-03-18 | Blackberry Limited | Incorporating data into an ECDSA signature component |
JP2012227901A (ja) * | 2011-04-22 | 2012-11-15 | Toshiba Corp | 認証コンポーネント、被認証コンポーネントおよびその認証方法 |
EP2705629A4 (en) | 2011-05-06 | 2015-07-29 | Certicom Corp | VALIDATION OF A LOT OF IMPLIED CERTIFICATES |
KR101166129B1 (ko) * | 2011-05-31 | 2012-07-23 | 서울대학교산학협력단 | 사전계산 테이블을 이용한 이산대수 계산 방법 및 그 장치 |
US8745376B2 (en) * | 2011-10-14 | 2014-06-03 | Certicom Corp. | Verifying implicit certificates and digital signatures |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US9705683B2 (en) * | 2014-04-04 | 2017-07-11 | Etas Embedded Systems Canada Inc. | Verifiable implicit certificates |
US9645794B2 (en) | 2014-09-23 | 2017-05-09 | Texas Instruments Incorporated | Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography |
US9679253B2 (en) | 2014-11-06 | 2017-06-13 | Copperleaf Technologies Inc. | Methods for maintaining infrastructure equipment and related apparatus |
GB201508278D0 (en) * | 2015-05-14 | 2015-06-24 | Hybond As | Filler material |
US10521775B2 (en) | 2016-04-18 | 2019-12-31 | R3 Ltd. | Secure processing of electronic transactions by a decentralized, distributed ledger system |
US10803537B2 (en) | 2016-04-18 | 2020-10-13 | R3 Ltd. | System and method for managing transactions in dynamic digital documents |
US9800411B1 (en) * | 2016-05-05 | 2017-10-24 | ISARA Corporation | Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme |
TW201810989A (zh) * | 2016-05-18 | 2018-03-16 | 納格維遜股份有限公司 | 用以保護密碼指數的方法及系統 |
EP3382932A1 (en) * | 2017-03-31 | 2018-10-03 | Nxp B.V. | Intelligent transportation system station, host processor, and method therefor |
EP3382930A1 (en) * | 2017-03-31 | 2018-10-03 | Nxp B.V. | Intelligent transportation system station, host processor, and method therefor |
GB201707168D0 (en) * | 2017-05-05 | 2017-06-21 | Nchain Holdings Ltd | Computer-implemented system and method |
GB201806112D0 (en) * | 2018-04-13 | 2018-05-30 | Nchain Holdings Ltd | Computer-implemented system and method |
US10873462B1 (en) * | 2018-06-21 | 2020-12-22 | Onu Technology, Inc. | Verification of computation by untrusted source |
CN111066285B (zh) | 2019-05-31 | 2023-06-30 | 创新先进技术有限公司 | 基于sm2签名恢复公钥的方法 |
US11546161B2 (en) * | 2020-02-21 | 2023-01-03 | Hong Kong Applied Science and Technology Research Institute Company Limited | Zero knowledge proof hardware accelerator and the method thereof |
CN111901102B (zh) * | 2020-06-28 | 2023-05-05 | 成都质数斯达克科技有限公司 | 数据传输方法、电子设备以及可读存储介质 |
CN117857050A (zh) * | 2023-12-12 | 2024-04-09 | 武汉大学 | 一种基于多标量点乘的sm2数字签名验证方法、系统及设备 |
Family Cites Families (108)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2536928B1 (fr) | 1982-11-30 | 1989-10-06 | France Etat | Systeme pour chiffrer et dechiffrer des informations, du type utilisant un systeme de dechiffrement a cle publique |
US4519036A (en) | 1983-01-05 | 1985-05-21 | Emi Limited | Program storage hardware with security scheme |
US4745568A (en) | 1986-12-16 | 1988-05-17 | Onyszchuk Ivan M | Computational method and apparatus for finite field multiplication |
EP0246823A3 (en) | 1986-05-22 | 1989-10-04 | Racal-Guardata Limited | Data communication systems and methods |
US4748668A (en) | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
US5218637A (en) | 1987-09-07 | 1993-06-08 | L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espace | Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization |
EP0364627B1 (en) | 1988-10-18 | 1996-08-28 | Koninklijke Philips Electronics N.V. | Data processing apparatus for calculating a multiplicatively inverted element of a finite field |
US5202995A (en) | 1989-10-12 | 1993-04-13 | International Business Machines Corporation | Method for removing invariant branches from instruction loops of a computer program |
GB9008362D0 (en) | 1990-04-12 | 1990-06-13 | Hackremco No 574 Limited | Banking computer system |
ATE119726T1 (de) | 1990-10-24 | 1995-03-15 | Omnisec Ag | Geheimübertragungssystem mit möglichkeit zur verschlüsselten kommunikation zwischen benutzern mit gesichertem schlüssel, welcher ohne benutzereinwirkung bestimmt wird. |
FR2672402B1 (fr) | 1991-02-05 | 1995-01-27 | Gemplus Card Int | Procede et dispositif pour la generation de nombres pseudo-aleatoires uniques. |
ATE128297T1 (de) | 1991-03-14 | 1995-10-15 | Omnisec Ag | Verschlüsselungssystem mit öffentlichem schlüssel unter verwendung elliptischer kurven über ringe. |
US5272755A (en) | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
US5351297A (en) | 1991-06-28 | 1994-09-27 | Matsushita Electric Industrial Co., Ltd. | Method of privacy communication using elliptic curves |
US5271061A (en) | 1991-09-17 | 1993-12-14 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
US5159632A (en) | 1991-09-17 | 1992-10-27 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
US6307935B1 (en) * | 1991-09-17 | 2001-10-23 | Apple Computer, Inc. | Method and apparatus for fast elliptic encryption with direct embedding |
US5373560A (en) | 1991-12-06 | 1994-12-13 | Schlafly; Roger | Partial modular reduction method |
US5666296A (en) | 1991-12-31 | 1997-09-09 | Texas Instruments Incorporated | Method and means for translating a data-dependent program to a data flow graph with conditional expression |
US5524222A (en) | 1992-03-27 | 1996-06-04 | Cyrix Corporation | Microsequencer allowing a sequence of conditional jumps without requiring the insertion of NOP or other instructions |
US5396558A (en) | 1992-09-18 | 1995-03-07 | Nippon Telegraph And Telephone Corporation | Method and apparatus for settlement of accounts by IC cards |
US5442707A (en) | 1992-09-28 | 1995-08-15 | Matsushita Electric Industrial Co., Ltd. | Method for generating and verifying electronic signatures and privacy communication using elliptic curves |
WO1994015423A1 (en) | 1992-12-22 | 1994-07-07 | Telstra Corporation Limited | A cryptographic method |
JPH06314203A (ja) | 1993-04-28 | 1994-11-08 | Fujitsu Ltd | コンパイラの最適化方法および装置 |
US5497423A (en) | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
US5825880A (en) | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
WO1996004602A1 (en) | 1994-07-29 | 1996-02-15 | Certicom Corp. | Elliptic curve encryption systems |
EP0723251A3 (en) | 1995-01-20 | 1998-12-30 | Tandem Computers Incorporated | Method and apparatus for user and security device authentication |
US5675645A (en) | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
AU5266596A (en) | 1995-04-21 | 1996-11-07 | Certicom Corp. | Method for signature and session key generation |
US5761305A (en) | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
CA2176972C (en) | 1995-05-17 | 2008-11-25 | Scott A. Vanstone | Key agreement and transport protocol with implicit signatures |
US5768389A (en) | 1995-06-21 | 1998-06-16 | Nippon Telegraph And Telephone Corporation | Method and system for generation and management of secret key of public key cryptosystem |
US5764772A (en) | 1995-12-15 | 1998-06-09 | Lotus Development Coporation | Differential work factor cryptography method and system |
US5778069A (en) | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
US5999626A (en) | 1996-04-16 | 1999-12-07 | Certicom Corp. | Digital signatures on a smartcard |
US5892899A (en) | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
US6526456B1 (en) | 1996-07-01 | 2003-02-25 | David Ian Allan | Distribution and controlled use of software products |
US6088798A (en) * | 1996-09-27 | 2000-07-11 | Kabushiki Kaisha Toshiba | Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein |
US5937066A (en) | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
CA2228185C (en) | 1997-01-31 | 2007-11-06 | Certicom Corp. | Verification protocol |
GB2321741B (en) * | 1997-02-03 | 2000-10-04 | Certicom Corp | Data card verification system |
GB9707861D0 (en) * | 1997-04-18 | 1997-06-04 | Certicom Corp | Arithmetic processor |
US5991415A (en) | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
EP1710951A3 (en) * | 1997-07-17 | 2006-10-25 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve calculation apparatus capable of calculating multiples at high speed |
US5987131A (en) | 1997-08-18 | 1999-11-16 | Picturetel Corporation | Cryptographic key exchange using pre-computation |
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
US6411715B1 (en) | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
US6279110B1 (en) | 1997-11-10 | 2001-08-21 | Certicom Corporation | Masked digital signatures |
US6334189B1 (en) | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US6304658B1 (en) | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
DE69930334T2 (de) * | 1998-01-28 | 2006-11-09 | Hitachi, Ltd. | IC-Karte ausgerüstet mit einer Verarbeitungsanlage für Elliptische-Kurven-Verschlüsselung |
US6404890B1 (en) | 1998-04-08 | 2002-06-11 | Citibank, Na | Generating RSA moduli including a predetermined portion |
EP1090480B1 (en) | 1998-06-03 | 2019-01-09 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
US6212279B1 (en) | 1998-06-26 | 2001-04-03 | The United States Of America As Represented By The United States National Security Agency | Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form |
US6243467B1 (en) * | 1998-07-23 | 2001-06-05 | The United States Of America As Represented By The National Security Agency | Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form |
DE69906897T2 (de) | 1998-09-03 | 2004-01-29 | Nippon Telegraph & Telephone | Gerät und Verfahren zur Elliptische-Kurven Multiplikation und Aufnahmemedium mitdarauf aufgenommen ein Program zur Ausführung des Verfahrens |
JP3796993B2 (ja) * | 1998-12-22 | 2006-07-12 | 株式会社日立製作所 | 楕円曲線暗号実行方法及び装置並びに記録媒体 |
US20020057796A1 (en) * | 1998-12-24 | 2002-05-16 | Lambert Robert J. | Method for accelerating cryptographic operations on elliptic curves |
CA2257008C (en) | 1998-12-24 | 2007-12-11 | Certicom Corp. | A method for accelerating cryptographic operations on elliptic curves |
CA2259089C (en) | 1999-01-15 | 2013-03-12 | Robert J. Lambert | Method and apparatus for masking cryptographic operations |
US7599491B2 (en) | 1999-01-11 | 2009-10-06 | Certicom Corp. | Method for strengthening the implementation of ECDSA against power analysis |
US6490352B1 (en) * | 1999-03-05 | 2002-12-03 | Richard Schroeppel | Cryptographic elliptic curve apparatus and method |
US6298135B1 (en) | 1999-04-29 | 2001-10-02 | Motorola, Inc. | Method of preventing power analysis attacks on microelectronic assemblies |
US6419159B1 (en) | 1999-06-14 | 2002-07-16 | Microsoft Corporation | Integrated circuit device with power analysis protection circuitry |
US6829356B1 (en) * | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
JP4354609B2 (ja) * | 1999-07-16 | 2009-10-28 | パナソニック株式会社 | 有限体上の連立方程式求解装置及び逆元演算装置 |
CN1276612C (zh) * | 1999-09-07 | 2006-09-20 | 索尼公司 | 信息发送系统、设备、方法和信息接收设备、方法 |
US6816594B1 (en) * | 1999-09-08 | 2004-11-09 | Hitachi, Ltd. | Elliptic curve generating method and device, elliptic encryption system and recording medium |
EP1217783B9 (en) | 1999-09-29 | 2009-07-15 | Hitachi, Ltd. | Device, program or system for processing secret information |
US6724894B1 (en) | 1999-11-05 | 2004-04-20 | Pitney Bowes Inc. | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same |
DE19963408A1 (de) | 1999-12-28 | 2001-08-30 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung |
JP2001320356A (ja) * | 2000-02-29 | 2001-11-16 | Sony Corp | 公開鍵系暗号を使用したデータ通信システムおよびデータ通信システム構築方法 |
FR2807898B1 (fr) * | 2000-04-18 | 2002-06-28 | Gemplus Card Int | Procede de cryptographie sur courbes elliptiques |
US7308096B2 (en) * | 2000-05-30 | 2007-12-11 | Hitachi, Ltd. | Elliptic scalar multiplication system |
US6993136B2 (en) * | 2000-08-18 | 2006-01-31 | The United States Of America As Represented By The National Security Agency | Cryptographic key exchange method using efficient elliptic curve |
JP2002207427A (ja) * | 2001-01-10 | 2002-07-26 | Sony Corp | 公開鍵証明書発行システム、公開鍵証明書発行方法、および情報処理装置、情報記録媒体、並びにプログラム記憶媒体 |
JP3950638B2 (ja) * | 2001-03-05 | 2007-08-01 | 株式会社日立製作所 | 耐タンパーモジュラ演算処理方法 |
US7167559B2 (en) * | 2001-03-28 | 2007-01-23 | Matsushita Electric Industrial Co., Ltd. | Information security device, exponentiation device, modular exponentiation device, and elliptic curve exponentiation device |
JP3859983B2 (ja) | 2001-04-27 | 2006-12-20 | 日本電信電話株式会社 | ブラインド署名方法、その装置、そのプログラム及びその記録媒体 |
JP2002328845A (ja) | 2001-05-07 | 2002-11-15 | Fujitsu Ltd | 半導体集積回路及びicカードのセキュリティー保護方法 |
JP4596686B2 (ja) | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Dpaに対して安全な暗号化 |
US7142670B2 (en) | 2001-08-14 | 2006-11-28 | International Business Machines Corporation | Space-efficient, side-channel attack resistant table lookups |
JP2003131568A (ja) | 2001-10-26 | 2003-05-09 | Hitachi Ltd | 楕円曲線署名検証方法及び装置並びに記憶媒体 |
US7127063B2 (en) | 2001-12-31 | 2006-10-24 | Certicom Corp. | Method and apparatus for computing a shared secret key |
US7215780B2 (en) | 2001-12-31 | 2007-05-08 | Certicom Corp. | Method and apparatus for elliptic curve scalar multiplication |
JP4034585B2 (ja) * | 2002-01-28 | 2008-01-16 | 松下電器産業株式会社 | 楕円曲線演算装置及び楕円曲線演算方法 |
US7505585B2 (en) * | 2002-06-25 | 2009-03-17 | The United States Of America As Represented By The Director, The National Security Agency | Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same |
GB0215524D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
US7401109B2 (en) * | 2002-08-06 | 2008-07-15 | The State Of Oregon Acting By And Through The State Board Of Higher Education On Behalf Of Oregon State University | Multiplication of multi-precision numbers having a size of a power of two |
CA2439736C (en) * | 2002-09-03 | 2013-05-21 | Certicom Corp. | Method and apparatus for performing validation of elliptic curve public keys |
JP2004163687A (ja) * | 2002-11-13 | 2004-06-10 | Fujitsu Ltd | 楕円曲線暗号装置、楕円曲線暗号プログラム |
US7613660B2 (en) * | 2002-12-30 | 2009-11-03 | Pitney Bowes Inc. | System and method for mail destination address information encoding, protection and recovery in postal payment |
US7103772B2 (en) * | 2003-05-02 | 2006-09-05 | Giritech A/S | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US20040249765A1 (en) * | 2003-06-06 | 2004-12-09 | Neopost Inc. | Use of a kiosk to provide verifiable identification using cryptographic identifiers |
FR2856538B1 (fr) * | 2003-06-18 | 2005-08-12 | Gemplus Card Int | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique |
US20050039100A1 (en) * | 2003-08-14 | 2005-02-17 | International Business Machines Corporation | Method and system for automatic error recovery in an electronic mail system |
JP3854954B2 (ja) * | 2003-09-05 | 2006-12-06 | キヤノン株式会社 | データ共有装置 |
WO2005034421A2 (en) * | 2003-10-03 | 2005-04-14 | Matsushita Electric Industrial Co., Ltd. | Information transfer system, encryption device, and decryption device using elliptic curve |
KR100720726B1 (ko) | 2003-10-09 | 2007-05-22 | 삼성전자주식회사 | Rsa 알고리즘을 이용한 보안유지시스템 및 그 방법 |
WO2005039100A1 (en) * | 2003-10-16 | 2005-04-28 | Matsushita Electric Industrial Co., Ltd. | Encrypted communication system and communication device |
US9240884B2 (en) * | 2003-10-28 | 2016-01-19 | Certicom Corp. | Method and apparatus for verifiable generation of public keys |
US7620179B2 (en) * | 2004-01-29 | 2009-11-17 | Comcast Cable Holdings, Llc | System and method for security processing media streams |
US7593527B2 (en) * | 2005-01-07 | 2009-09-22 | First Data Corporation | Providing digital signature and public key based on shared knowledge |
CA2592875C (en) | 2005-01-18 | 2016-09-06 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
US8467535B2 (en) * | 2005-01-18 | 2013-06-18 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
SG174833A1 (en) * | 2006-11-15 | 2011-10-28 | Certicom Corp | Implicit certificate verification |
CA2698000C (en) | 2007-09-04 | 2015-10-27 | Certicom Corp. | Signatures with confidential message recovery |
-
2006
- 2006-01-18 CA CA2592875A patent/CA2592875C/en active Active
- 2006-01-18 JP JP2007550647A patent/JP5068176B2/ja active Active
- 2006-01-18 WO PCT/CA2006/000058 patent/WO2006076800A1/en active Application Filing
- 2006-01-18 US US11/333,296 patent/US8204232B2/en active Active
- 2006-01-18 EP EP11178908.7A patent/EP2395424B1/en active Active
- 2006-01-18 EP EP06701572A patent/EP1842128B1/en active Active
- 2006-01-18 AT AT06701572T patent/ATE533103T1/de active
- 2006-01-18 CA CA2935823A patent/CA2935823C/en active Active
-
2011
- 2011-10-19 JP JP2011230106A patent/JP5373026B2/ja active Active
-
2012
- 2012-05-23 US US13/478,288 patent/US8806197B2/en active Active
- 2012-06-14 HK HK12105810.3A patent/HK1165053A1/xx unknown
- 2012-06-26 JP JP2012143272A patent/JP2012212164A/ja active Pending
- 2012-09-14 US US13/620,206 patent/US8788827B2/en active Active
-
2014
- 2014-06-27 US US14/318,313 patent/US10284370B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20140344579A1 (en) | 2014-11-20 |
HK1165053A1 (en) | 2012-09-28 |
JP2008527865A (ja) | 2008-07-24 |
CA2935823C (en) | 2019-01-15 |
EP1842128B1 (en) | 2011-11-09 |
JP5068176B2 (ja) | 2012-11-07 |
US10284370B2 (en) | 2019-05-07 |
US8204232B2 (en) | 2012-06-19 |
US8806197B2 (en) | 2014-08-12 |
ATE533103T1 (de) | 2011-11-15 |
JP2012014203A (ja) | 2012-01-19 |
WO2006076800A1 (en) | 2006-07-27 |
EP1842128A1 (en) | 2007-10-10 |
EP1842128A4 (en) | 2009-11-04 |
JP2012212164A (ja) | 2012-11-01 |
US8788827B2 (en) | 2014-07-22 |
EP2395424A1 (en) | 2011-12-14 |
US20120230494A1 (en) | 2012-09-13 |
US20130064367A1 (en) | 2013-03-14 |
US20070064932A1 (en) | 2007-03-22 |
CA2592875A1 (en) | 2006-07-27 |
CA2935823A1 (en) | 2006-07-27 |
CA2592875C (en) | 2016-09-06 |
EP2395424B1 (en) | 2013-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5373026B2 (ja) | デジタル署名と公開鍵の促進された検証 | |
US8462944B2 (en) | Method of public key generation | |
US8467535B2 (en) | Accelerated verification of digital signatures and public keys | |
JP5329676B2 (ja) | 鍵合意プロトコルの加速 | |
CN110247757B (zh) | 基于国密算法的区块链处理方法、装置及系统 | |
CN102412971B (zh) | 基于sm2密钥交换协议的密钥协商方法及装置 | |
US8184803B2 (en) | Hash functions using elliptic curve cryptography | |
CN109450640B (zh) | 基于sm2的两方签名方法及系统 | |
JP4453996B2 (ja) | 通信方法、通信システム、及び、コンピュータ読み取り可能な記録媒体 | |
CA2770001C (en) | Accelerated verification of digital signatures and public keys | |
CN117795901A (zh) | 生成数字签名份额 | |
CN117595984B (zh) | 基于可验证随机函数的节点选择方法、装置、设备及介质 | |
JP2003218858A (ja) | 署名生成方法及び署名検証方法及び署名生成装置及び署名検証装置及び署名生成プログラム及び署名検証プログラム及び署名生成プログラムを格納した記憶媒体及び署名検証プログラムを格納した記憶媒体 | |
JPH0643809A (ja) | 楕円曲線に基づくデイジタル署名方式とその署名者装置及び検証者装置 | |
JP3240723B2 (ja) | 通信方法、秘密通信方法及び署名通信方法 | |
JP3518680B2 (ja) | 素数生成装置 | |
CN117837123A (zh) | 生成数字签名 | |
JP2010020189A (ja) | 一括検証装置及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20111019 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120626 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130315 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130614 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20130828 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20130918 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5373026 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |