WO2002009348A3 - Ring-based digital signature and authentication method and apparatus - Google Patents

Ring-based digital signature and authentication method and apparatus Download PDF

Info

Publication number
WO2002009348A3
WO2002009348A3 PCT/US2001/023866 US0123866W WO0209348A3 WO 2002009348 A3 WO2002009348 A3 WO 2002009348A3 US 0123866 W US0123866 W US 0123866W WO 0209348 A3 WO0209348 A3 WO 0209348A3
Authority
WO
WIPO (PCT)
Prior art keywords
processor
user
ring
digital signature
memories
Prior art date
Application number
PCT/US2001/023866
Other languages
French (fr)
Other versions
WO2002009348A2 (en
Inventor
Jeffrey Hoffstein
Jill Pipher
Joseph H Silverman
Original Assignee
Ntru Cryptosystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US22066800P priority Critical
Priority to US60/220,668 priority
Priority to US09/812,917 priority patent/US20020136401A1/en
Priority to US09/812,917 priority
Application filed by Ntru Cryptosystems Inc filed Critical Ntru Cryptosystems Inc
Publication of WO2002009348A2 publication Critical patent/WO2002009348A2/en
Publication of WO2002009348A3 publication Critical patent/WO2002009348A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Abstract

Methods, systems and computer readable media for signing and verifying a digital message (m) are described. First, ideals (p) and (q) of a ring (R), stored in the memories (123), are selected in the processor. Elements (f) and (g) of the ring (R) are generated in the processor (110), followed by generating an element (F) in the processor, which is an inverse of (f), in the ring (R). A public key (h) is produced in the processor (110), equal to a product that can be calculated using (g) and (F). Then, a private key that includes (f) is produced in th eprocessor (110). A digital signature (s) is signed by the processor (110) to the message (m) retrieved from the memories (123), using the private key. The digital signature is verified by confirming one or more specified conditions using the message (m) and the public key (h). A second user (155) can authenticate the identify of a first user (105). A challenge communication that includes selection of a challenge (m) in the ring (R) retrieved from the memories (168) is generated in the processor (160) of the second user (155) and transmitted by the tranceiver (162) to the first user (105). A response communication that includes computation of a response (s) in the processor of the first user (110), where (s) is a function of (m) and (f), is transmtted to the second user (155) by the tranceiver (135) of the first user (105). A verification that includes confirming one or more specified conditions using the response (s), the challenge (m) and the public key (h) is performed by the processor (160) of the second user (155).
PCT/US2001/023866 2000-07-25 2001-07-25 Ring-based digital signature and authentication method and apparatus WO2002009348A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US22066800P true 2000-07-25 2000-07-25
US60/220,668 2000-07-25
US09/812,917 US20020136401A1 (en) 2000-07-25 2001-03-20 Digital signature and authentication method and apparatus
US09/812,917 2001-03-20

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU7722601A AU7722601A (en) 2000-07-25 2001-07-25 Digital signature and authentification method and apparatus

Publications (2)

Publication Number Publication Date
WO2002009348A2 WO2002009348A2 (en) 2002-01-31
WO2002009348A3 true WO2002009348A3 (en) 2002-03-28

Family

ID=26915072

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/023866 WO2002009348A2 (en) 2000-07-25 2001-07-25 Ring-based digital signature and authentication method and apparatus

Country Status (3)

Country Link
US (1) US20020136401A1 (en)
AU (1) AU7722601A (en)
WO (1) WO2002009348A2 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040151309A1 (en) * 2002-05-03 2004-08-05 Gentry Craig B Ring-based signature scheme
EP1451967A1 (en) * 2001-12-07 2004-09-01 NTRU Cryptosystems, Inc. Digital signature and authentication method and apparatus
CN101453332A (en) * 2002-04-15 2009-06-10 株式会社Ntt都科摩 Signature schemes using bilinear mappings
US6718536B2 (en) * 2002-06-21 2004-04-06 Atmel Corporation Computer-implemented method for fast generation and testing of probable prime numbers for cryptographic applications
US7334255B2 (en) * 2002-09-30 2008-02-19 Authenex, Inc. System and method for controlling access to multiple public networks and for controlling access to multiple private networks
US8239917B2 (en) * 2002-10-16 2012-08-07 Enterprise Information Management, Inc. Systems and methods for enterprise security with collaborative peer to peer architecture
US7840806B2 (en) * 2002-10-16 2010-11-23 Enterprise Information Management, Inc. System and method of non-centralized zero knowledge authentication for a computer network
US8041957B2 (en) * 2003-04-08 2011-10-18 Qualcomm Incorporated Associating software with hardware using cryptography
JP2007510380A (en) * 2003-10-31 2007-04-19 株式会社エヌ・ティ・ティ・ドコモ Encryption method and signature method to reduce message size using message mapping
US7921303B2 (en) 2005-11-18 2011-04-05 Qualcomm Incorporated Mobile security system and method
US7499552B2 (en) * 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US8112626B1 (en) 2006-01-20 2012-02-07 Symantec Corporation Method and apparatus to provide public key authentication with low complexity devices
US8290151B2 (en) * 2007-10-12 2012-10-16 Infineon Technologies Ag Device and method for determining an inverse of a value related to a modulus
FR2956541B1 (en) 2010-02-18 2012-03-23 Centre Nat Rech Scient CRYPTOGRAPHIC METHOD FOR COMMUNICATING CONFIDENTIAL INFORMATION.
JP5594034B2 (en) * 2010-07-30 2014-09-24 ソニー株式会社 Authentication device, authentication method, and program
WO2013101136A1 (en) * 2011-12-30 2013-07-04 Intel Corporation Dual composite field advanced encryption standard memory encryption engine
US8954728B1 (en) * 2012-12-28 2015-02-10 Emc Corporation Generation of exfiltration-resilient cryptographic keys
US9722798B2 (en) * 2014-02-10 2017-08-01 Security Innovation Inc. Digital signature method
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
SE539942C2 (en) 2015-03-25 2018-02-06 Crunchfish Ab Asset authentication in a dynamic, proximity-based network of communication devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220606A (en) * 1992-02-10 1993-06-15 Harold Greenberg Cryptographic system and method
US5790675A (en) * 1995-07-27 1998-08-04 Cp8 Transac Cryptographic communication process
US5796840A (en) * 1994-05-31 1998-08-18 Intel Corporation Apparatus and method for providing secured communications
JPH1173105A (en) * 1997-08-28 1999-03-16 Nec Corp Double vector adder, double vector doubler, double vector integer-multiplier, open key delivery system, elgamal type cryptographic system, and elgamal type signature system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220606A (en) * 1992-02-10 1993-06-15 Harold Greenberg Cryptographic system and method
US5796840A (en) * 1994-05-31 1998-08-18 Intel Corporation Apparatus and method for providing secured communications
US5790675A (en) * 1995-07-27 1998-08-04 Cp8 Transac Cryptographic communication process
JPH1173105A (en) * 1997-08-28 1999-03-16 Nec Corp Double vector adder, double vector doubler, double vector integer-multiplier, open key delivery system, elgamal type cryptographic system, and elgamal type signature system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BUCHMANN J. ET AL.: "A one way function based on ideal arithmetic in number fields", ADVANCES IN CRYPTOLOGY, CRYPTO'97, SPRINGER-VERLAG, 1997, pages 386 - 394, XP002949213 *

Also Published As

Publication number Publication date
US20020136401A1 (en) 2002-09-26
WO2002009348A2 (en) 2002-01-31
AU7722601A (en) 2002-02-05

Similar Documents

Publication Publication Date Title
WO2002009348A3 (en) Ring-based digital signature and authentication method and apparatus
CN106789047B (en) A kind of block chain identification system
CA2462266C (en) System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
JP3552648B2 (en) Data transmission / reception system for ad hoc wireless communication and data transmission / reception method for ad hoc wireless communication
US7533735B2 (en) Digital authentication over acoustic channel
CN108270571A (en) Internet of Things identity authorization system and its method based on block chain
TWI268688B (en) System and method for acoustic two factor authentication
JP2012530996A (en) Authentication method and system
IL138109A (en) Method and devices for digitally signing files by means of a hand-held device
JP2006136003A (en) Method for checking correctness of data, system and portable terminal
WO2003015370A3 (en) Data certification method and apparatus
JP4872908B2 (en) Member certificate acquisition device, member certificate issuing device, group signature device, group signature verification device
WO2002001794A3 (en) A platform and method for establishing provable identities while maintaining privacy
WO1998051032A3 (en) Two way authentication protocol
WO2007063420A3 (en) Authentication in communications networks
CA2440546A1 (en) Cryptographic authentication with ephemeral modules
JP2005509384A5 (en)
EP1150452A3 (en) Authentication system, authentication method, authentication apparatus, and authentication method therefor
CN102820972A (en) Authentication method based on sound wave
US6910129B1 (en) Remote authentication based on exchanging signals representing biometrics information
CN107835079A (en) A kind of two-dimentional code authentication method and equipment based on digital certificate
FR2743236A1 (en) METHOD FOR AUTHENTICATING THE IDENTITY OF A USER USING AUTHENTICATION INFORMATION
GB2348584B (en) Identification protocols
WO2005025128A8 (en) Method for signing a dataset in a public key system and data processing system for carrying out said method
JP2004147019A (en) Server device and communication controller

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

121 Ep: the epo has been informed by wipo that ep was designated in this application
AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP