SG10201609449SA - System and method for constructing a self-authenticating message using identity-based crytography - Google Patents
System and method for constructing a self-authenticating message using identity-based crytographyInfo
- Publication number
- SG10201609449SA SG10201609449SA SG10201609449SA SG10201609449SA SG10201609449SA SG 10201609449S A SG10201609449S A SG 10201609449SA SG 10201609449S A SG10201609449S A SG 10201609449SA SG 10201609449S A SG10201609449S A SG 10201609449SA SG 10201609449S A SG10201609449S A SG 10201609449SA
- Authority
- SG
- Singapore
- Prior art keywords
- self
- constructing
- identity
- crytography
- authenticating message
- Prior art date
Links
Abstract
SYSTEM AND METHOD FOR CONSTRUCTING A SELF-AUTHENTICATING MESSAGE USING IDENTITY-BASED CRYTOGRAPHY This document discloses a system and method for constructing a self-authenticating message that is to be sent from a first electronic device to a second electronic device. The disclosed system and method constructs a self-authenticating message using identity-based cryptography whereby plaintext is encrypted and decrypted using encryption/decryption keys that were generated using identities of the sender and/or receiver. FIGURE 4
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201609449SA SG10201609449SA (en) | 2016-11-11 | 2016-11-11 | System and method for constructing a self-authenticating message using identity-based crytography |
CN201710598707.0A CN108075896B (en) | 2016-11-11 | 2017-07-21 | System and method for building self-authentication messages using identity-based cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201609449SA SG10201609449SA (en) | 2016-11-11 | 2016-11-11 | System and method for constructing a self-authenticating message using identity-based crytography |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201609449SA true SG10201609449SA (en) | 2018-06-28 |
Family
ID=62159320
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201609449SA SG10201609449SA (en) | 2016-11-11 | 2016-11-11 | System and method for constructing a self-authenticating message using identity-based crytography |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108075896B (en) |
SG (1) | SG10201609449SA (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019066822A1 (en) * | 2017-09-27 | 2019-04-04 | Visa International Service Association | Secure shared key establishment for peer to peer communications |
CN109861809B (en) * | 2019-02-20 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | Practical grouping random encryption and decryption method |
CN110289946B (en) * | 2019-07-12 | 2022-11-11 | 深圳市元征科技股份有限公司 | Block chain wallet localized file generation method and block chain node point equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030235305A1 (en) * | 2002-06-20 | 2003-12-25 | Hsu Raymond T. | Key generation in a communication system |
CN101547095B (en) * | 2009-02-11 | 2011-05-18 | 广州杰赛科技股份有限公司 | Application service management system and management method based on digital certificate |
JP5701855B2 (en) * | 2009-04-10 | 2015-04-15 | コーニンクレッカ フィリップス エヌ ヴェ | Device and user authentication |
CN105897416B (en) * | 2016-06-29 | 2019-03-05 | 邓月霞 | A kind of end-to-end security instant communication method of forward direction based on id password system |
-
2016
- 2016-11-11 SG SG10201609449SA patent/SG10201609449SA/en unknown
-
2017
- 2017-07-21 CN CN201710598707.0A patent/CN108075896B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108075896B (en) | 2021-05-11 |
CN108075896A (en) | 2018-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12018501745A1 (en) | Personal device security using elliptic curve cryptography for secret sharing | |
EP4254860A3 (en) | Key pair infrastructure for secure messaging | |
EP4254248A3 (en) | Cryptographic methods and systems for managing digital certificates | |
WO2016057086A3 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
MX2019008945A (en) | Origin certificate based online certificate issuance. | |
UA122327C2 (en) | Nado cryptography with key generators | |
CA3011085A1 (en) | System and method for implementing secure communications for internet of things (iot) devices | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
MX2016001900A (en) | Nado cryptography using one-way functions. | |
JP2016511620A5 (en) | ||
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
MX2017005313A (en) | Transaction messaging. | |
MX2019008264A (en) | Homomorphic white box system and method for using same. | |
WO2014059136A3 (en) | Techniqued for secure data exchange | |
WO2010010336A3 (en) | Mulitipad encryption | |
EP3068066A3 (en) | Private computation on encrypted biometric data using homomorphic encryption | |
GB201206962D0 (en) | Joint encryption of data | |
EP2629448A4 (en) | Encryption and decryption method based on proxy, network apparatus, network device, and system | |
PH12016502362A1 (en) | Systems and methods for controlling media distribution | |
WO2018213744A3 (en) | Reducing compromise of sensitive data in virtual machine | |
SG10201609449SA (en) | System and method for constructing a self-authenticating message using identity-based crytography | |
EE201700036A (en) | Method, device and system for generating a composite cryptographic signature and a computer readable medium | |
EP4274157A3 (en) | Communicating securely with devices in a distributed control system | |
Greenberg | Hacker lexicon: What is end-to-end encryption? |