WO1999033270A1 - Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems - Google Patents
Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems Download PDFInfo
- Publication number
- WO1999033270A1 WO1999033270A1 PCT/EP1997/007124 EP9707124W WO9933270A1 WO 1999033270 A1 WO1999033270 A1 WO 1999033270A1 EP 9707124 W EP9707124 W EP 9707124W WO 9933270 A1 WO9933270 A1 WO 9933270A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- cryptographic
- assigned
- subsets
- cryptographic keys
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44236—Monitoring of piracy processes or activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/606—Traitor tracing
Definitions
- Each key hierarchy has at least a higher hierarchy level of cryptographic keys.
- a higher hierarchical level is formed in that the cryptographic keys of the immediately lower hierarchical level are combined in any manner to form several subsets of a predetermined size, each subset being assigned a cryptographic key which is generated from the cryptographic keys forming the respective subset and then in the storage device is filed. Then at least one individual cryptographic key assigned to a suspicious user is determined by forming the intersection of at least two predetermined subsets that belong to the same hierarchical level of different key hierarchies.
Abstract
Description
Claims
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19649292A DE19649292A1 (de) | 1996-11-28 | 1996-11-28 | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
US08/990,446 US6222923B1 (en) | 1996-11-28 | 1997-12-15 | Method for securing system protected by a key hierarchy |
EP97953855A EP1040662B1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
AT97953855T ATE242949T1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
DE59710287T DE59710287D1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
CA002310406A CA2310406A1 (en) | 1996-11-28 | 1997-12-18 | Method for securing a system protected by key hierarchy |
JP2000526050A JP4351386B2 (ja) | 1996-11-28 | 1997-12-18 | キー階層により保護されたシステムを安全保護する方法 |
ES97953855T ES2201341T3 (es) | 1996-11-28 | 1997-12-18 | Procedimiento para proteger un sistema protegido por una jerarquia de claves criptograficas. |
PCT/EP1997/007124 WO1999033270A1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19649292A DE19649292A1 (de) | 1996-11-28 | 1996-11-28 | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
US08/990,446 US6222923B1 (en) | 1996-11-28 | 1997-12-15 | Method for securing system protected by a key hierarchy |
PCT/EP1997/007124 WO1999033270A1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999033270A1 true WO1999033270A1 (de) | 1999-07-01 |
Family
ID=27216876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1997/007124 WO1999033270A1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
Country Status (8)
Country | Link |
---|---|
US (1) | US6222923B1 (de) |
EP (1) | EP1040662B1 (de) |
JP (1) | JP4351386B2 (de) |
AT (1) | ATE242949T1 (de) |
CA (1) | CA2310406A1 (de) |
DE (2) | DE19649292A1 (de) |
ES (1) | ES2201341T3 (de) |
WO (1) | WO1999033270A1 (de) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002060118A2 (en) * | 2001-01-26 | 2002-08-01 | International Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
CN1303777C (zh) * | 2001-01-26 | 2007-03-07 | 国际商业机器公司 | 无状态接收机的广播加密和密钥撤销方法 |
US9520993B2 (en) | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
Families Citing this family (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69834431T3 (de) * | 1998-01-02 | 2009-09-10 | Cryptography Research Inc., San Francisco | Leckresistentes kryptographisches verfahren und vorrichtung |
US7587044B2 (en) * | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
IL139935A (en) * | 1998-06-03 | 2005-06-19 | Cryptography Res Inc | Des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
DE69935913T2 (de) * | 1998-07-02 | 2008-01-10 | Cryptography Research Inc., San Francisco | Leckresistente aktualisierung eines indexierten kryptographischen schlüssels |
DE19847941A1 (de) * | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer |
US6735313B1 (en) * | 1999-05-07 | 2004-05-11 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers |
US6934817B2 (en) * | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US7194634B2 (en) * | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
US6754815B1 (en) | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6957332B1 (en) * | 2000-03-31 | 2005-10-18 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
US6769058B1 (en) | 2000-03-31 | 2004-07-27 | Intel Corporation | Resetting a processor in an isolated execution environment |
US6760441B1 (en) * | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
EP1414181B1 (de) * | 2000-06-21 | 2008-12-17 | Sony Corporation | Vorrichtung und Verfahren zur Schlüssel erneuerung in einer hierarchischen Baumschlüsselstruktur |
US6976162B1 (en) * | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
US7793111B1 (en) * | 2000-09-28 | 2010-09-07 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
US7818808B1 (en) | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7035963B2 (en) * | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
US20030068047A1 (en) * | 2001-09-28 | 2003-04-10 | Lee David A. | One-way broadcast key distribution |
US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7340603B2 (en) | 2002-01-30 | 2008-03-04 | Sony Corporation | Efficient revocation of receivers |
US7631196B2 (en) * | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US6820177B2 (en) | 2002-06-12 | 2004-11-16 | Intel Corporation | Protected configuration space in a protected environment |
US7142674B2 (en) * | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
GB2394803A (en) * | 2002-10-31 | 2004-05-05 | Hewlett Packard Co | Management of security key distribution using an ancestral hierarchy |
US7165181B2 (en) * | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
US20040117532A1 (en) * | 2002-12-11 | 2004-06-17 | Bennett Steven M. | Mechanism for controlling external interrupts in a virtual machine system |
US7900017B2 (en) | 2002-12-27 | 2011-03-01 | Intel Corporation | Mechanism for remapping post virtual machine memory pages |
US20040128345A1 (en) * | 2002-12-27 | 2004-07-01 | Robinson Scott H. | Dynamic service registry |
US7076802B2 (en) * | 2002-12-31 | 2006-07-11 | Intel Corporation | Trusted system clock |
US7062048B2 (en) | 2003-01-27 | 2006-06-13 | Wegener Communications, Inc. | Apparatus and method for single encryption with multiple authorization of distributed content data |
US7206411B2 (en) | 2003-06-25 | 2007-04-17 | Wegener Communications, Inc. | Rapid decryption of data by key synchronization and indexing |
US7415708B2 (en) * | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
US20050044292A1 (en) * | 2003-08-19 | 2005-02-24 | Mckeen Francis X. | Method and apparatus to retain system control when a buffer overflow attack occurs |
US7739521B2 (en) * | 2003-09-18 | 2010-06-15 | Intel Corporation | Method of obscuring cryptographic computations |
US7610611B2 (en) * | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
US20050080934A1 (en) | 2003-09-30 | 2005-04-14 | Cota-Robles Erik C. | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
US7177967B2 (en) * | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
US8156343B2 (en) | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
US8037314B2 (en) | 2003-12-22 | 2011-10-11 | Intel Corporation | Replacing blinded authentication authority |
US20050152539A1 (en) * | 2004-01-12 | 2005-07-14 | Brickell Ernie F. | Method of protecting cryptographic operations from side channel attacks |
US7802085B2 (en) | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
US20050216920A1 (en) * | 2004-03-24 | 2005-09-29 | Vijay Tewari | Use of a virtual machine to emulate a hardware device |
US7356735B2 (en) * | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
JP4162237B2 (ja) * | 2004-06-24 | 2008-10-08 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 複数の復号化装置に対し選択的にメッセージを配信する暗号化通信システム、暗号化装置、復号化装置、暗号化方法、復号化方法、暗号化プログラム、及び復号化プログラム |
US20050288056A1 (en) * | 2004-06-29 | 2005-12-29 | Bajikar Sundeep M | System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module |
US7305592B2 (en) * | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
DE102004042094B3 (de) * | 2004-08-30 | 2005-09-22 | RUHR-UNIVERSITäT BOCHUM | Datenübertragungsverfahren und Datenübertragungsanordung |
US7840962B2 (en) * | 2004-09-30 | 2010-11-23 | Intel Corporation | System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time |
US8146078B2 (en) * | 2004-10-29 | 2012-03-27 | Intel Corporation | Timer offsetting mechanism in a virtual machine environment |
US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
US7840010B2 (en) * | 2004-12-21 | 2010-11-23 | Shield Security Systems, Llc | Interactive security control system with conflict checking |
US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US7395405B2 (en) * | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
KR100916228B1 (ko) | 2006-02-28 | 2009-09-08 | 엘지전자 주식회사 | 페이 퍼 뷰 및 서비스 기반 방송 가입자를 위한 sek와pek의 관리 방법 및 그 통신 시스템 |
US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
US8189791B2 (en) * | 2006-06-22 | 2012-05-29 | Koninklijke Philips Electronics N.V. | Hierarchical deterministic pairwise key predistribution scheme |
US20080065751A1 (en) * | 2006-09-08 | 2008-03-13 | International Business Machines Corporation | Method and computer program product for assigning ad-hoc groups |
KR101321401B1 (ko) | 2007-02-02 | 2013-10-25 | 재단법인서울대학교산학협력재단 | 그룹 키 관리 방법 및 이를 이용한 그룹 키 관리 장치 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3124150A1 (de) * | 1980-06-19 | 1982-03-18 | Oak Industries Inc., 16935 Rancho Bernardo, Calif. | Zwei-ebenen-verschluesselungs-system fuer rf-signale |
US4771459A (en) * | 1985-04-29 | 1988-09-13 | U.S. Philips Corp. | System for storing and distributing keys for cryptographically protected communication |
EP0506435A2 (de) * | 1991-03-29 | 1992-09-30 | Scientific-Atlanta, Inc. | Unabhängiges externes Sicherheitsmodul für einen digital-erweiterbaren Fernsehsignaldekoder |
DE19511298A1 (de) * | 1995-03-28 | 1996-10-02 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
US4531020A (en) * | 1982-07-23 | 1985-07-23 | Oak Industries Inc. | Multi-layer encryption system for the broadcast of encrypted information |
US4613901A (en) * | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
DE3432653C1 (de) * | 1984-09-05 | 1986-01-16 | Westdeutscher Rundfunk, Anstalt des öffentlichen Rechts, 5000 Köln | Verfahren zum Übertragen von Fersehprogrammen an berechtigte Teilnehmer |
FR2613565B1 (fr) * | 1987-04-03 | 1989-06-23 | Bull Cps | Procede pour acheminer des cles secretes vers des modules de securite et des cartes utilisateurs, dans un reseau de traitement d'informations |
DE3827172A1 (de) * | 1987-08-13 | 1989-03-16 | Peter Elsner | Einrichtung zur identifizierung von nachrichten |
US4888801A (en) * | 1988-05-02 | 1989-12-19 | Motorola, Inc. | Hierarchical key management system |
US5220604A (en) * | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
JPH06141004A (ja) * | 1992-10-27 | 1994-05-20 | Mitsubishi Corp | 課金システム |
DE4326590C1 (de) * | 1993-08-07 | 1994-10-20 | Inst Rundfunktechnik Gmbh | Verfahren zum Sperren oder der Wiedergabe bestimmter Programme in einem Fernsehempfänger oder ihrer Aufzeichnung in einem Videorecorder |
US5432852A (en) * | 1993-09-29 | 1995-07-11 | Leighton; Frank T. | Large provably fast and secure digital signature schemes based on secure hash functions |
-
1996
- 1996-11-28 DE DE19649292A patent/DE19649292A1/de not_active Withdrawn
-
1997
- 1997-12-15 US US08/990,446 patent/US6222923B1/en not_active Expired - Lifetime
- 1997-12-18 ES ES97953855T patent/ES2201341T3/es not_active Expired - Lifetime
- 1997-12-18 AT AT97953855T patent/ATE242949T1/de active
- 1997-12-18 DE DE59710287T patent/DE59710287D1/de not_active Expired - Lifetime
- 1997-12-18 JP JP2000526050A patent/JP4351386B2/ja not_active Expired - Fee Related
- 1997-12-18 CA CA002310406A patent/CA2310406A1/en not_active Abandoned
- 1997-12-18 WO PCT/EP1997/007124 patent/WO1999033270A1/de active IP Right Grant
- 1997-12-18 EP EP97953855A patent/EP1040662B1/de not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3124150A1 (de) * | 1980-06-19 | 1982-03-18 | Oak Industries Inc., 16935 Rancho Bernardo, Calif. | Zwei-ebenen-verschluesselungs-system fuer rf-signale |
US4771459A (en) * | 1985-04-29 | 1988-09-13 | U.S. Philips Corp. | System for storing and distributing keys for cryptographically protected communication |
EP0506435A2 (de) * | 1991-03-29 | 1992-09-30 | Scientific-Atlanta, Inc. | Unabhängiges externes Sicherheitsmodul für einen digital-erweiterbaren Fernsehsignaldekoder |
DE19511298A1 (de) * | 1995-03-28 | 1996-10-02 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
Non-Patent Citations (2)
Title |
---|
LEIN HARN ET AL: "A CRYPTOGRAPHIC KEY GENERATION SCHEME FOR MULTILEVEL DATA SECURITY", 1 October 1990, COMPUTERS & SECURITY INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, VOL. 9, NR. 6, PAGE(S) 539 - 546, XP000162681 * |
SANTOSH CHOKHANI: "TOWARD A NATINAL PUBLIC KEY INFRASTRUCTURE", IEEE COMMUNICATIONS MAGAZINE, vol. 32, no. 9, 1 September 1994 (1994-09-01), pages 70 - 74, XP000476557 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002060118A2 (en) * | 2001-01-26 | 2002-08-01 | International Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
WO2002060118A3 (en) * | 2001-01-26 | 2002-09-19 | Ibm | Method for tracing traitor receivers in a broadcast encryption system |
US7010125B2 (en) | 2001-01-26 | 2006-03-07 | Interntional Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
CN1303777C (zh) * | 2001-01-26 | 2007-03-07 | 国际商业机器公司 | 无状态接收机的广播加密和密钥撤销方法 |
CN1310463C (zh) * | 2001-01-26 | 2007-04-11 | 国际商业机器公司 | 在广播加密系统中跟踪叛徒接收机的方法 |
US7698551B2 (en) | 2001-01-26 | 2010-04-13 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
US9520993B2 (en) | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
US11108569B2 (en) | 2001-01-26 | 2021-08-31 | International Business Machines Corporation | Renewable traitor tracing |
Also Published As
Publication number | Publication date |
---|---|
EP1040662A1 (de) | 2000-10-04 |
DE59710287D1 (de) | 2003-07-17 |
ATE242949T1 (de) | 2003-06-15 |
JP2001527349A (ja) | 2001-12-25 |
ES2201341T3 (es) | 2004-03-16 |
US6222923B1 (en) | 2001-04-24 |
JP4351386B2 (ja) | 2009-10-28 |
DE19649292A1 (de) | 1998-06-04 |
CA2310406A1 (en) | 1999-07-01 |
EP1040662B1 (de) | 2003-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1040662B1 (de) | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems | |
DE2824135C2 (de) | ||
DE19511298B4 (de) | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder | |
DE69834396T2 (de) | Sicheres Datensignalübertragungssystem | |
DE3036596A1 (de) | Verfahren zum gesicherten abwickeln eines geschaeftsvorganges ueber einen ungesicherten nachrichtenkanal | |
DE2401602A1 (de) | Elektronisches kombinationsschloss und schleusensystem | |
DE2439116A1 (de) | Verfahren und vorrichtung zum verzerren und entzerren von uebertragungssignalen | |
DE2855787A1 (de) | Digitalsignatureinrichtung | |
DE102017209014A1 (de) | Verfahren und Vorrichtung zum Anfügen von Transaktionen an eine Blockkette | |
EP0768773B1 (de) | Verfahren zum Etablieren eines gemeinsamen Schlüssels für autorisierte Personen mittels Threshold-Verfahrens | |
DE19750779C1 (de) | Verfahren zum Identifizieren von Verrätern proprietärer Daten | |
DE69729685T2 (de) | Verfahren zur Verdeckung eines Geheimcodes in einer Rechnerbeglaubigungsvorrichtung | |
DE69826778T2 (de) | Vorrichtungen zum Verschlüsseln und Entschlüsseln einer Schlüsselwiedergewinnungsbedingung | |
EP0386677B1 (de) | Verfahren zur Generierung einer Zufallszahl für die verschlüsselte Übertragung von Daten, unter Verwendung eines variablen Startwertes | |
DE2350288A1 (de) | Drahtfunksystem | |
EP2253097A1 (de) | Verfahren zur unmanipulierbaren, abhörsicheren und nicht hackbaren p2p-kommunikation in mehrteilnehmernetze | |
EP0948193B1 (de) | Verfahren zum Einbringen manipulationssicherer digitaler Fingerabdrücke in elektronische Dokumente | |
DE2304925A1 (de) | Rechnergesteuerte nebenstellenanlage | |
EP0765550A1 (de) | Entschlüsselungseinrichtung von entschlüsselungsalgorithmen und verfahren zur durchführung der ver- und entschlüsselung derselben | |
DE3640849C2 (de) | ||
DE3439120A1 (de) | Verfahren zur identifizierung einer teilnehmerstation eines fernmeldenetzes | |
DE4420967C2 (de) | Entschlüsselungseinrichtung von digitalen Informationen und Verfahren zur Durchführung der Ver- und Entschlüsselung dieser mit Hilfe der Entschlüsselungseinrichtung | |
EP1358734A1 (de) | Telekommunikationsprotokoll, -system und -vorrichtungen zur anonymen und authentischen abwicklung einer elektronischen wahl | |
DE4416253B4 (de) | Verfahren zur datenschutzgerechten Verteilung von Schlüsselinformationen | |
DE1437515A1 (de) | Schaltungsanordnung fuer zentralgesteuerte Fernsprechvermittlungsanlagen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA CN JP KR TR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1997953855 Country of ref document: EP |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2310406 Country of ref document: CA Ref country code: CA Ref document number: 2310406 Kind code of ref document: A Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1997953855 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1997953855 Country of ref document: EP |