SE9901358D0 - Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree - Google Patents

Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree

Info

Publication number
SE9901358D0
SE9901358D0 SE9901358A SE9901358A SE9901358D0 SE 9901358 D0 SE9901358 D0 SE 9901358D0 SE 9901358 A SE9901358 A SE 9901358A SE 9901358 A SE9901358 A SE 9901358A SE 9901358 D0 SE9901358 D0 SE 9901358D0
Authority
SE
Sweden
Prior art keywords
subordinated
administrators
administrator
manner
secret
Prior art date
Application number
SE9901358A
Other languages
Swedish (sv)
Other versions
SE9901358L (en
SE515778C2 (en
Inventor
Alf Bengtsson
Original Assignee
Foersvarets Forskningsanstalt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foersvarets Forskningsanstalt filed Critical Foersvarets Forskningsanstalt
Priority to SE9901358A priority Critical patent/SE515778C2/en
Publication of SE9901358D0 publication Critical patent/SE9901358D0/en
Priority to PCT/SE2000/000721 priority patent/WO2000064098A1/en
Publication of SE9901358L publication Critical patent/SE9901358L/en
Publication of SE515778C2 publication Critical patent/SE515778C2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The present invention relates to a method for distribution of cryptographic keys by using public-key handling in a cryptographic method for data communication in a hierarchical communication network, which comprises nodes in the form of administrators and final operators. An identity in the form of a unique prime number which is known to all administrators and final operators is associated with each administrator in the tree. The main administrator of the tree selects one or more directly subordinated administrators. He also selects a basic secret which he keeps secret. The main administrator creates a subsecret for each directly subordinated administrator based on his own secret and the identity of each directly subordinated administrator. The subsecret is allocated to the associated subordinated administrator and he keeps it secret. In a recursive method, subordinated administrators in turn select in a corresponding manner subordinated administrators and create subsecrets for them. The final operators are allocated a pair of keys by their respective administrators, consisting of a private key, selected in a manner similar to the manner in which the identity of subordinated administrators is selected and a public key created in a manner corresponding to the manner in which a subsecret for a subordinated administrator is selected or vice versa.
SE9901358A 1999-04-16 1999-04-16 Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree SE515778C2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SE9901358A SE515778C2 (en) 1999-04-16 1999-04-16 Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree
PCT/SE2000/000721 WO2000064098A1 (en) 1999-04-16 2000-04-14 Method for distribution of cryptographic keys in a communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE9901358A SE515778C2 (en) 1999-04-16 1999-04-16 Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree

Publications (3)

Publication Number Publication Date
SE9901358D0 true SE9901358D0 (en) 1999-04-16
SE9901358L SE9901358L (en) 2000-10-17
SE515778C2 SE515778C2 (en) 2001-10-08

Family

ID=20415233

Family Applications (1)

Application Number Title Priority Date Filing Date
SE9901358A SE515778C2 (en) 1999-04-16 1999-04-16 Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree

Country Status (2)

Country Link
SE (1) SE515778C2 (en)
WO (1) WO2000064098A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI109253B (en) * 2000-08-22 2002-06-14 Smarttrust Systems Oy Verified identity chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US5651066A (en) * 1994-04-28 1997-07-22 Nippon Telegraph And Telephone Corporation Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information
US5745574A (en) * 1995-12-15 1998-04-28 Entegrity Solutions Corporation Security infrastructure for electronic transactions
JPH09238132A (en) * 1996-02-29 1997-09-09 Oki Electric Ind Co Ltd Portable terminal communication system and its communication method
NL1005912C2 (en) * 1997-04-25 1998-10-27 Koninkl Kpn Nv Key distribution system.

Also Published As

Publication number Publication date
SE9901358L (en) 2000-10-17
WO2000064098A1 (en) 2000-10-26
SE515778C2 (en) 2001-10-08

Similar Documents

Publication Publication Date Title
Cao et al. The evolution of quantum key distribution networks: On the road to the qinternet
CA2365441A1 (en) Method of establishing secure communications in a digital network using pseudonymic digital identifiers
CN1706153B (en) Location privacy through IP address space scrambling
Zhou et al. Securing ad hoc networks
CN110020541B (en) Reputation evaluation method and system based on block chain privacy protection
ATE332599T1 (en) METHOD AND DEVICE FOR INITIALIZING SECURE CONNECTIONS BETWEEN AND ONLY BETWEEN ASSOCIATED CORDLESS DEVICES
DK1269681T3 (en) Authentication of data transmitted in a digital transmission system
WO2004100426A3 (en) Wireless service points having unique identifiers for secure communication
ATE385147T1 (en) ARRANGING DATA ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS SYSTEM
CN102461060A (en) Key management in secure network enclaves
WO2002023812A3 (en) System and method for managing and provisioning virtual routers
JP2008524931A (en) Multiple certificate revocation using encrypted certificate data for certificate validity / invalidity certification
WO2004100424A3 (en) Wireless service point networks
CN107426162B (en) A kind of method based on attribute base encryption Implement Core mutual role help
CN106341232A (en) Anonymous entity identification method based on password
Phan et al. Decentralized dynamic broadcast encryption
CN102263787B (en) Dynamic distributed certification authority (CA) configuration method
CN106936833A (en) A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group
SE0001044D0 (en) Method and system for encryption and authentication
CN101272244A (en) Wireless self-organizing network cryptographic key updating and repealing method
CN114553883B (en) Cloud edge end cooperative data acquisition and privacy protection method and system based on blockchain
CN103532709B (en) A kind of IBE encryption apparatus and data encryption/decryption method
Li et al. Wolverine: a scalable and transaction-consistent redactable permissionless blockchain
CN108763944A (en) Multicenter large attribute Domain Properties base encryption method can be revoked safely in calculating in mist
Daniel et al. Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Legal Events

Date Code Title Description
NUG Patent has lapsed