RU2623724C2 - Основанные на атрибутах цифровые подписи - Google Patents
Основанные на атрибутах цифровые подписи Download PDFInfo
- Publication number
- RU2623724C2 RU2623724C2 RU2013112947A RU2013112947A RU2623724C2 RU 2623724 C2 RU2623724 C2 RU 2623724C2 RU 2013112947 A RU2013112947 A RU 2013112947A RU 2013112947 A RU2013112947 A RU 2013112947A RU 2623724 C2 RU2623724 C2 RU 2623724C2
- Authority
- RU
- Russia
- Prior art keywords
- signature
- key
- attributes
- signing
- module
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 30
- 230000008569 process Effects 0.000 claims abstract description 10
- 238000004590 computer program Methods 0.000 claims description 7
- 230000015572 biosynthetic process Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000008859 change Effects 0.000 abstract description 2
- 230000000694 effects Effects 0.000 abstract description 2
- 239000000126 substance Substances 0.000 abstract 1
- 238000004422 calculation algorithm Methods 0.000 description 47
- 238000012795 verification Methods 0.000 description 17
- 238000006243 chemical reaction Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000036541 health Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000007493 shaping process Methods 0.000 description 3
- 230000003203 everyday effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000021615 conjugation Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP10173838.3 | 2010-08-24 | ||
| EP10173838 | 2010-08-24 | ||
| PCT/IB2011/053672 WO2012025866A1 (en) | 2010-08-24 | 2011-08-22 | Attribute-based digital signatures |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| RU2013112947A RU2013112947A (ru) | 2014-09-27 |
| RU2623724C2 true RU2623724C2 (ru) | 2017-06-28 |
Family
ID=44645160
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| RU2013112947A RU2623724C2 (ru) | 2010-08-24 | 2011-08-22 | Основанные на атрибутах цифровые подписи |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US9401811B2 (enExample) |
| EP (1) | EP2609712A1 (enExample) |
| JP (1) | JP2013536651A (enExample) |
| CN (1) | CN103069745B (enExample) |
| BR (1) | BR112013004074A2 (enExample) |
| RU (1) | RU2623724C2 (enExample) |
| WO (1) | WO2012025866A1 (enExample) |
Families Citing this family (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9800555B2 (en) * | 2012-08-17 | 2017-10-24 | Koninklijke Philips N.V. | Attribute-based encryption |
| CN104184584A (zh) * | 2013-05-27 | 2014-12-03 | 华为技术有限公司 | 多重签名的方法及其装置 |
| KR20150084221A (ko) * | 2014-01-13 | 2015-07-22 | 삼성전자주식회사 | 어플리케이션 패키지의 재서명 장치, 방법 및 상기 어플리케이션 패키지를 실행하는 단말장치 |
| US9230133B2 (en) | 2014-01-14 | 2016-01-05 | International Business Machines Corporation | Secure access for sensitive digital information |
| US10452869B2 (en) * | 2014-05-07 | 2019-10-22 | Infineon Technologies Ag | Systems and methods for processing and verifying data using signatures |
| US9544150B2 (en) | 2014-06-04 | 2017-01-10 | International Business Machines Corporation | Using multiple digital identification documents to control information disclosure |
| US10097354B2 (en) | 2015-08-21 | 2018-10-09 | International Business Machines Corporation | Privacy control using unique identifiers associated with sensitive data elements of a group |
| EP3179670A1 (en) * | 2015-12-11 | 2017-06-14 | Gemalto Sa | Secure electronic device with mechanism to provide unlinkable attribute assertion verifiable by a service provider |
| US10218515B2 (en) * | 2016-08-26 | 2019-02-26 | Microsoft Technology Licensing, Llc | Evolving a signature during trust verification of an object |
| US10116450B1 (en) * | 2016-11-02 | 2018-10-30 | ISARA Corporation | Merkle signature scheme using subtrees |
| CN106789066B (zh) * | 2016-12-12 | 2019-09-24 | 西北工业大学 | 基于ip签名的代理重签名方法 |
| US11356427B1 (en) | 2017-02-15 | 2022-06-07 | Wells Fargo Bank, N.A. | Signcrypted envelope message |
| US11354660B1 (en) | 2017-04-27 | 2022-06-07 | Wells Fargo Bank, N.A. | Encapsulation of payment information |
| WO2019214942A1 (en) * | 2018-05-10 | 2019-11-14 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
| CN108777626A (zh) * | 2018-08-16 | 2018-11-09 | 西南交通大学 | 一种支持动态属性空间的属性基网络签名方法 |
| US11601284B2 (en) * | 2019-06-14 | 2023-03-07 | Planetway Corporation | Digital signature system based on a cloud of dedicated local devices |
| US10581616B1 (en) | 2019-07-11 | 2020-03-03 | ISARA Corporation | Managing nodes of a cryptographic hash tree in a hash-based digital signature scheme |
| JP7348848B2 (ja) * | 2020-01-16 | 2023-09-21 | 株式会社国際電気通信基礎技術研究所 | 統合属性ベースグループ署名処理方法、統合属性ベースグループ署名処理システム、および、プログラム |
| US11165588B1 (en) * | 2020-04-09 | 2021-11-02 | International Business Machines Corporation | Key attribute verification |
| CN113271200A (zh) * | 2021-05-26 | 2021-08-17 | 陕西理工大学 | 一种抗量子攻击的格属性签名方法 |
| KR102568418B1 (ko) * | 2021-08-26 | 2023-08-18 | 하이파이브랩 주식회사 | 다중 서명을 지원하는 전자 인증 시스템 및 방법 |
| WO2023152797A1 (ja) * | 2022-02-08 | 2023-08-17 | 富士通株式会社 | 検証方法、検証プログラムおよび情報処理装置 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040181756A1 (en) * | 2000-06-06 | 2004-09-16 | Berringer Ryan R. | Creating and verifying electronic documents |
| US20090327735A1 (en) * | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Unidirectional multi-use proxy re-signature process |
| US20100037062A1 (en) * | 2008-08-11 | 2010-02-11 | Mark Carney | Signed digital documents |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5422953A (en) * | 1993-05-05 | 1995-06-06 | Fischer; Addison M. | Personal date/time notary device |
| ATE305682T1 (de) * | 1994-07-19 | 2005-10-15 | Certco Llc | Verfahren zur sicheren anwendung digitaler unterschriften in einem kommerziellen verschlüsselungssystem |
| US7003480B2 (en) * | 1997-02-27 | 2006-02-21 | Microsoft Corporation | GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions |
| US6151676A (en) * | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
| ATE399405T1 (de) * | 2001-02-22 | 2008-07-15 | Bea Systems Inc | System und verfahren zum verschlüsseln von nachrichten und zum registrieren in einem transaktionsverarbeitungssystem |
| US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| DE50200601D1 (de) * | 2002-05-24 | 2004-08-12 | Swisscom Mobile Ag | Vorrichtungen und Verfahren zur Zertifizierung von digitalen Unterschriften |
| WO2005038634A2 (en) * | 2003-10-17 | 2005-04-28 | International Business Machines Corporation | Maintaining privacy for transactions performable by a user device having a security module |
| US8276209B2 (en) * | 2004-09-17 | 2012-09-25 | Koninklijke Philips Electronics N.V. | Proximity check server |
| JP2006325072A (ja) | 2005-05-20 | 2006-11-30 | Kddi R & D Laboratories Inc | 属性情報交換システム、属性情報交換方法および通信端末 |
| US8938615B2 (en) * | 2006-09-08 | 2015-01-20 | Ceritcom Corp. | System and method for authenticating radio frequency identification (RFID) tags |
| ATE466347T1 (de) * | 2007-01-15 | 2010-05-15 | Stepover Gmbh | Verfahren und vorrichtung zum sichern eines dokuments mit eingefügtem signaturabbild und biometrischen daten in einem computersystem |
| US8171527B2 (en) * | 2007-06-26 | 2012-05-01 | General Instrument Corporation | Method and apparatus for securing unlock password generation and distribution |
| EP2166493A1 (en) * | 2008-09-12 | 2010-03-24 | BRITISH TELECOMMUNICATIONS public limited company | Control of supply networks and verification of items |
| DE102008055076A1 (de) * | 2008-12-22 | 2010-07-01 | Robert Bosch Gmbh | Vorrichtung und Verfahren zum Schutz von Daten, Computerprogramm, Computerprogrammprodukt |
| EP2355402A1 (en) * | 2010-01-29 | 2011-08-10 | British Telecommunications public limited company | Access control |
| CN102869263A (zh) | 2010-04-30 | 2013-01-09 | 先正达参股股份有限公司 | 减少虫媒病毒感染的方法 |
| US8527777B2 (en) * | 2010-07-30 | 2013-09-03 | International Business Machines Corporation | Cryptographic proofs in data processing systems |
-
2011
- 2011-08-22 EP EP11755144.0A patent/EP2609712A1/en not_active Withdrawn
- 2011-08-22 BR BR112013004074A patent/BR112013004074A2/pt not_active IP Right Cessation
- 2011-08-22 CN CN201180040747.4A patent/CN103069745B/zh active Active
- 2011-08-22 US US13/818,178 patent/US9401811B2/en active Active
- 2011-08-22 RU RU2013112947A patent/RU2623724C2/ru active
- 2011-08-22 JP JP2013525395A patent/JP2013536651A/ja active Pending
- 2011-08-22 WO PCT/IB2011/053672 patent/WO2012025866A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040181756A1 (en) * | 2000-06-06 | 2004-09-16 | Berringer Ryan R. | Creating and verifying electronic documents |
| US20090327735A1 (en) * | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Unidirectional multi-use proxy re-signature process |
| US20100037062A1 (en) * | 2008-08-11 | 2010-02-11 | Mark Carney | Signed digital documents |
Non-Patent Citations (1)
| Title |
|---|
| HEMANTA MAJI et al, статья "ATTRIBUTE-BASED SIGNATURES: ACHIEVING ATTRIBUTE-PRIVACY AND COLLUSION-RESISTANCE", опубл. 15.04.2008 на 23 листах. * |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2013536651A (ja) | 2013-09-19 |
| US9401811B2 (en) | 2016-07-26 |
| CN103069745B (zh) | 2017-04-19 |
| WO2012025866A1 (en) | 2012-03-01 |
| CN103069745A (zh) | 2013-04-24 |
| RU2013112947A (ru) | 2014-09-27 |
| BR112013004074A2 (pt) | 2016-07-26 |
| EP2609712A1 (en) | 2013-07-03 |
| US20130159730A1 (en) | 2013-06-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| RU2623724C2 (ru) | Основанные на атрибутах цифровые подписи | |
| Jiang et al. | Attribute-based encryption with blockchain protection scheme for electronic health records | |
| Pussewalage et al. | Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions | |
| Sun et al. | Cross-domain data sharing in distributed electronic health record systems | |
| Ibraimi et al. | Secure management of personal health records by applying attribute-based encryption | |
| Sajid et al. | Data privacy in cloud-assisted healthcare systems: state of the art and future challenges | |
| Abbas et al. | A review on the state-of-the-art privacy-preserving approaches in the e-health clouds | |
| Zhou et al. | PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system | |
| EP2885893B1 (en) | Attribute-based encryption | |
| US20120260094A1 (en) | Digital rights managmenet using attribute-based encryption | |
| Huang et al. | A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud | |
| T. de Oliveira et al. | A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud | |
| Pussewalage et al. | An attribute based access control scheme for secure sharing of electronic health records | |
| Khan et al. | Fine-grained access control to medical records in digital healthcare enterprises | |
| Alam et al. | Garbled role-based access control in the cloud | |
| Gao et al. | Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing | |
| Babu et al. | An effective block-chain based authentication technique for cloud based IoT | |
| Sethia et al. | CP-ABE for selective access with scalable revocation: A case study for mobile-based healthfolder. | |
| Garson et al. | Security and privacy system architecture for an e-hospital environment | |
| Chen | A trusted user-to-role and role-to-key access control scheme | |
| Sonya et al. | An effective blockchain‐based smart contract system for securing electronic medical data in smart healthcare application | |
| Debnath et al. | A secure revocable personal health record system with policy-based fine-grained access control | |
| Mahmood et al. | User-trust centric lightweight access control for smart IoT crowd sensing applications in healthcare systems | |
| Khan et al. | Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology | |
| Dabra et al. | An improved finegrained ciphertext policy based temporary keyword search on encrypted data for secure cloud storage |