SE9901358D0 - Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree - Google Patents
Method of key distribution with built-in possibility for authentication and certification in a hierarchical treeInfo
- Publication number
- SE9901358D0 SE9901358D0 SE9901358A SE9901358A SE9901358D0 SE 9901358 D0 SE9901358 D0 SE 9901358D0 SE 9901358 A SE9901358 A SE 9901358A SE 9901358 A SE9901358 A SE 9901358A SE 9901358 D0 SE9901358 D0 SE 9901358D0
- Authority
- SE
- Sweden
- Prior art keywords
- subordinated
- administrators
- administrator
- manner
- secret
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Abstract
The present invention relates to a method for distribution of cryptographic keys by using public-key handling in a cryptographic method for data communication in a hierarchical communication network, which comprises nodes in the form of administrators and final operators. An identity in the form of a unique prime number which is known to all administrators and final operators is associated with each administrator in the tree. The main administrator of the tree selects one or more directly subordinated administrators. He also selects a basic secret which he keeps secret. The main administrator creates a subsecret for each directly subordinated administrator based on his own secret and the identity of each directly subordinated administrator. The subsecret is allocated to the associated subordinated administrator and he keeps it secret. In a recursive method, subordinated administrators in turn select in a corresponding manner subordinated administrators and create subsecrets for them. The final operators are allocated a pair of keys by their respective administrators, consisting of a private key, selected in a manner similar to the manner in which the identity of subordinated administrators is selected and a public key created in a manner corresponding to the manner in which a subsecret for a subordinated administrator is selected or vice versa.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9901358A SE515778C2 (en) | 1999-04-16 | 1999-04-16 | Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree |
PCT/SE2000/000721 WO2000064098A1 (en) | 1999-04-16 | 2000-04-14 | Method for distribution of cryptographic keys in a communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9901358A SE515778C2 (en) | 1999-04-16 | 1999-04-16 | Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree |
Publications (3)
Publication Number | Publication Date |
---|---|
SE9901358D0 true SE9901358D0 (en) | 1999-04-16 |
SE9901358L SE9901358L (en) | 2000-10-17 |
SE515778C2 SE515778C2 (en) | 2001-10-08 |
Family
ID=20415233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE9901358A SE515778C2 (en) | 1999-04-16 | 1999-04-16 | Method of key distribution with built-in possibility for authentication and certification in a hierarchical tree |
Country Status (2)
Country | Link |
---|---|
SE (1) | SE515778C2 (en) |
WO (1) | WO2000064098A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI109253B (en) * | 2000-08-22 | 2002-06-14 | Smarttrust Systems Oy | Verified identity chain |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US5651066A (en) * | 1994-04-28 | 1997-07-22 | Nippon Telegraph And Telephone Corporation | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information |
US5745574A (en) * | 1995-12-15 | 1998-04-28 | Entegrity Solutions Corporation | Security infrastructure for electronic transactions |
JPH09238132A (en) * | 1996-02-29 | 1997-09-09 | Oki Electric Ind Co Ltd | Portable terminal communication system and its communication method |
NL1005912C2 (en) * | 1997-04-25 | 1998-10-27 | Koninkl Kpn Nv | Key distribution system. |
-
1999
- 1999-04-16 SE SE9901358A patent/SE515778C2/en not_active IP Right Cessation
-
2000
- 2000-04-14 WO PCT/SE2000/000721 patent/WO2000064098A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
SE9901358L (en) | 2000-10-17 |
WO2000064098A1 (en) | 2000-10-26 |
SE515778C2 (en) | 2001-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | The evolution of quantum key distribution networks: On the road to the qinternet | |
CA2365441A1 (en) | Method of establishing secure communications in a digital network using pseudonymic digital identifiers | |
CN1706153B (en) | Location privacy through IP address space scrambling | |
Zhou et al. | Securing ad hoc networks | |
CN110020541B (en) | Reputation evaluation method and system based on block chain privacy protection | |
ATE332599T1 (en) | METHOD AND DEVICE FOR INITIALIZING SECURE CONNECTIONS BETWEEN AND ONLY BETWEEN ASSOCIATED CORDLESS DEVICES | |
DK1269681T3 (en) | Authentication of data transmitted in a digital transmission system | |
WO2004100426A3 (en) | Wireless service points having unique identifiers for secure communication | |
ATE385147T1 (en) | ARRANGING DATA ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS SYSTEM | |
CN102461060A (en) | Key management in secure network enclaves | |
WO2002023812A3 (en) | System and method for managing and provisioning virtual routers | |
JP2008524931A (en) | Multiple certificate revocation using encrypted certificate data for certificate validity / invalidity certification | |
WO2004100424A3 (en) | Wireless service point networks | |
CN107426162B (en) | A kind of method based on attribute base encryption Implement Core mutual role help | |
CN106341232A (en) | Anonymous entity identification method based on password | |
Phan et al. | Decentralized dynamic broadcast encryption | |
CN102263787B (en) | Dynamic distributed certification authority (CA) configuration method | |
CN106936833A (en) | A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group | |
SE0001044D0 (en) | Method and system for encryption and authentication | |
CN101272244A (en) | Wireless self-organizing network cryptographic key updating and repealing method | |
CN114553883B (en) | Cloud edge end cooperative data acquisition and privacy protection method and system based on blockchain | |
CN103532709B (en) | A kind of IBE encryption apparatus and data encryption/decryption method | |
Li et al. | Wolverine: a scalable and transaction-consistent redactable permissionless blockchain | |
CN108763944A (en) | Multicenter large attribute Domain Properties base encryption method can be revoked safely in calculating in mist | |
Daniel et al. | Analysis of hierarchical identity based encryption schemes and its applicability to computing environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |