WO2002045340A2 - Threshold cryptography scheme for message authentication systems - Google Patents
Threshold cryptography scheme for message authentication systems Download PDFInfo
- Publication number
- WO2002045340A2 WO2002045340A2 PCT/US2001/029842 US0129842W WO0245340A2 WO 2002045340 A2 WO2002045340 A2 WO 2002045340A2 US 0129842 W US0129842 W US 0129842W WO 0245340 A2 WO0245340 A2 WO 0245340A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- share
- shares
- key
- authenticating
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
Definitions
- This invention concerns a system and method for providing message authentication.
- the system does not require the full keys to be sent to the receiver of the message. Instead, the keys are recovered using at least one share received from the sender and at least two shares stored at the receiver.
- message authentication is an important objective of information security. This objective is met by providing the receiver of a message an assurance of the sender's identity.
- physical protection such as sealed envelopes is not possible for messages expressed as binary sequences, digital tools have been developed using cryptography.
- a major weakness of all cryptographic methods for message authentication lies in their use of algorithms with fixed symmetric or public keys. We describe a new key transport scheme, based on secret sharing, which allows each new message to be authenticated with a new key, strengthening the system's resistance to attacks on the key or messages.
- Authentication is one of the four most important objectives of information security. The others are confidentiality, data integrity and non-repudiation. In communication networks, some or all of these objectives may need to be met.
- Encryption techniques provide confidentiality by transforming data into unintelligible format. This is a reversible process, and the entity in possession of the right key can recover the data.
- Authentication provides assurance of the identity of the originator of the message.
- Entity authentication provides assurance of the identity of originator of the message, as well as assurance of the active participation of the originator of the message.
- Figure 6 shows a communication channel where two parties (A and B) communicate using a protocol for exchanging messages.
- Party A is the sender of the message M
- party B is the receiver.
- party B would like at least three (3) pieces of information on receipt of the message: (1) an assurance of the identity of the party that sent the message M (commonly referred to as 'message' authentication), (2) evidence that the message M was not modified during transmission (data integrity), and (3) an indication that party A (i.e., the sender) was active at the time the message was sent (commonly referred to as 'entity' authentication).
- message authentication provides assurance of the identity of party A, the originator of the message M.
- Message authentication also includes evidence of data integrity because if the message M is modified during transmission, party A cannot be the originator.
- Entity authentication assures party B of not only the identity of party A, but also his active participation.
- two parties need to authenticate each other for messages to flow in either direction.
- Challenge-response protocols based on symmetric or public key schemes, and zero-knowledge protocols are commonly used for mutual authentication.
- time variant data e.g., sequence numbers, time stamps, etc.
- Hash functions may be classified into two groups: (1) unkeyed hash functions (i.e., the message is the only input parameter), and (2) keyed hash functions (i.e., the message and a secret key are the input parameters).
- MDCs Manipulation Detection Codes
- Some examples are: (a) hash functions based on block ciphers, (b) hash functions based on modular arithmetic, and (c) customized hash functions.
- MACs Message Authentication Codes
- MACs Authentication methods
- message encryption a Authentication methods
- digital signatures a MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1 MAC-SHA-1, Secure Digital Signature, Secure Digital Signatures.
- Figure 7 shows a block diagram of a message authentication method using a MAC.
- the message M is input to a MAC algorithm which computes the MAC using a key K which is shared by both parties (i.e., sender (party A) and receiver (party B)).
- Party A then appends the MAC to the message M, and sends the composite signal to party B.
- Figure 8 shows a block diagram of a message authentication method using message encryption.
- Message encryption may be accomplished in two ways, symmetric key encryption and public key encryption.
- symmetric key encryption the message M is encrypted with a symmetric key before transmission to the receiver (e.g., party B).
- the receiver e.g., party B
- public key encryption the message M is encrypted using a public key and decrypted using the corresponding private key at the receiver.
- a message M is input to an encryption algorithm which uses a key K (symmetric or public) to create an encrypted message Ek(M).
- Figure 9 shows a block diagram of a message authentication method using a digital signature.
- the sender e.g., party A
- a private key K pr jvate
- an appropriate signature algorithm may be used.
- the receiver e.g., party B
- A is the only party who owns the private key.
- the symmetric key shared by the sender and the receiver needs to used for all messages during its lifetime. This makes this method vulnerable to attacks for key recovery and MAC forgery. There are two possible attacks: (1) attacks on the key space, and (2) attacks on the MAC value. If the pirate can determine the MAC key, he or she would be able to create a MAC value for any message. For a key size of 't' bits and a fixed input, the probability of finding the correct n-bit MAC is about 2 " ⁇ The objective of MAC forgery is to create a MAC for a given message, or to find a message for a given MAC without knowing the key. For an n-bit MAC algorithm, the probability of meeting this objective is about 2 "n . In sum, the effort needed for a brute force attack on a MAC algorithm would be the minimum (2 2 n ).
- this method is also vulnerable to brute force attacks.
- the key may be determined by testing all 2 55 DES operations. More efficient attacks like linear or differential cryptanalysis allow key recovery with less processor time.
- the digital signature method no public key signature algorithm has been proven secure. The security of public key algorithms is based on the difficulty of computing discrete logarithms, or factoring large numbers. With a fixed public/private key pair, attacks are possible using the public key or signatures on messages. In some applications, the authenticity of the sender's public key is a major problem requiring complex public key infrastructures.
- the present invention defines a method and apparatus for providing authentication of a message, said method including receiving, at a receiver station, data representative of a first share, constructing a key using said first share and at least two additional shares, said at least two additional shares being stored at said receiver station; and authenticating a message using said constructed key.
- first and second shares are used.
- the first and second shares are points on a Euclidean plane and the step of constructing the key comprises calculating the Y-intercept of the line formed on the Euclidean plane by the first and second shares.
- first, second and third shares are used.
- the first, second and third shares are points on a Euclidean plane and the step of constructing the key comprises calculating the Y-intercept of the parabolic curve formed on the Euclidean plane by the first, second and third shares.
- first, second, third and fourth shares are used.
- the first, second, third and fourth shares are points on a Euclidean plane and the step of constructing the key comprises calculating the Y- intercept of the curve formed on the Euclidean plane by the first, second, third and fourth shares.
- any number of shares may be used, depending upon the level of security required.
- Figure 1 is a block diagram showing a message authentication system according to a first exemplary embodiment of the present invention.
- Figure 2a is a graphical representation of the determination of the authentication key in accordance with a first exemplary embodiment of the present invention.
- Figure 2b is a graphical representation of an allocation of a unique and non- overlapping range for each transmitter in accordance with Figure 1.
- Figure 3 is a graphical representation of the determination of the authentication key in accordance with a second exemplary embodiment of the present invention.
- Figure 4 is a graphical representation of the determination of the authentication key in accordance with a third exemplary embodiment of the present invention.
- Figure 5 is a graphical representation of the determination of a plurality of authentication keys in accordance with the first through third exemplary embodiments of the present invention.
- Figure 6 is a block diagram showing a conventional message authentication system.
- Figure 7 is a block diagram showing a message authentication system using a MAC.
- Figure 8 is a block diagram showing a message authentication system using message encryption.
- Figure 9 is a block diagram showing a message authentication system using a digital signature.
- the present invention comprises a message authentication system, where messages sent between two or more parties are authenticated using a prepositioned secret sharing scheme.
- a prepositioned secret sharing scheme By using a prepositioned secret sharing scheme, the security and flexibility (e.g., by using different keys) of the message authentication system is increased.
- the present invention employs an application of a secret sharing scheme, originally developed by Adi Shamir, known as a 'threshold scheme' (See, A. Shamir, "How to share a secret," Communications of the ACM, Vol. 22, No. 11 , pp. 612-613 , November 1979).
- a perfect threshold scheme is a threshold scheme in which knowledge of (t-1) or fewer pieces ('shares' or 'shadows') provides no information about the secret.
- the secret is divided into five shares but only two of the shares are required to reconstruct the secret.
- a (2,5) threshold scheme such as the one described above may be used by a bank manager to divide the combination to the main safe among five tellers. In this way, any two of the tellers working together could open the safe, but one teller alone could not open the safe.
- Shamir's (t,n) threshold scheme choosing a higher value for t, and storing (t-1) secrets in the smart card would increase the system's resistance to ciphertext only attacks, but would lead to more computations for polynomial construction.
- the present invention utilizes the principles of Shamir's secret sharing to conceal the identity of a key for authenticating a message. In particular, the present inventor proposes a scheme where the key comprises the Y-intercept of a specific line or curve formed by two or more points on a Euclidean plane.
- a device e.g., receiver
- a share or shares already stored therein this is often referred to as a 'prepositioned' shared secret scheme, as discussed below.
- This stored share is used to compute the key, which is then used to obtain a message authenticator.
- the message authenticator may be, for example, of type discussed above with reference to Figure 7 (e.g., MAC), or may be a different authenticator known to those skilled in the art.
- an additional or 'activating' share is transmitted therewith. It will be noted that the 'activating' share does not need to be encrypted in this scheme, since knowledge of the activating share means nothing without the knowledge of the stored share.
- the device On receiving the 'activating' share, the device computes the message authenticator using a key which is computed by finding the Y-intercept of the line formed by the stored share and the 'activating' share. Each time a new key is required, a new 'activating' share may be selected at the transmitter, thereby changing the Y-intercept of the line formed by the stored share and the 'activating' share. In this way, an infinite number of keys may be defined and utilized without changing the device hardware or software. It will be noted that the 'device' described above may comprise many different types of equipment such as analog or digital television receivers, set top boxes, videocassette recorders (NCRs), and other equivalent equipment known to those skilled in the art. For simplicity, the foregoing description will focus on a general "receiver" structure.
- the key generation and distribution process may be automated by developing a program to perform the following steps:
- This message authenticator may be, for example, a MAC.
- Such a scheme as the one described above is often referred to as a 'prepositioned' shared secret scheme because a portion of the secret is 'prepositioned' at the device (e.g., receiver).
- the 'prepositioned' share is the share which is stored at the receiver.
- Such 'prepositioned' shared secret schemes have been discussed by others in the field of cryptology (See, G.J. Simmons, "How to (really) share a secret,” Advances in Cryptology - CRYPTO '88 Proceedings, Springer-Nerlag, pp. 390-448, 1990; G.J. Simmons, "Prepositioned shared secret and/or shared control schemes," Advances in Cryptology - EUROCRYPT '89 Proceedings, Springer-Nerlag, pp. 436-467, 1990).
- the key can be changed relatively easily without changing any of the circuitry at the receiver; only the 'activating' share need to be changed.
- prepositioned secret sharing scheme which utilizes a secret S with only 2 shares (i.e., 2 points of a line on a Euclidean plane).
- shares i.e., 2 points of a line on a Euclidean plane.
- other secrets S can be computed from many more shares (points), thereby making cryptanalysis more difficult.
- the important aspect of a prepositioned secret sharing scheme is that some of the shares are 'prepositioned' at the receiver.
- the present invention involves storing at least one of the shares of a secret at a specific location (e.g., in the receiver hardware).
- the stored share is then used in conjunction with an 'activating' share to construct the secret.
- an 'activating' share to construct the secret.
- a (4, 4) scheme for example, preferably three (3) of the four (4) shares are stored at the specific location (e.g., receiver).
- the last share also referred to herein as the 'activating' share
- the secret is not the shares themselves, but the Y-intercept of the line or curve (for higher order polynomials) formed by the shares when expressed as points on a Euclidean plane.
- the message authentication system 100 includes a message source (transmitter) 40 and a message receiver 50.
- the message source 40 uses a secret key to generate a message authenticator from the message which is typically sent with the message to the receiver 50.
- the receiver 50 constructs the same key, and uses the key to compute the authenticator. If the authenticator constructed at the receiver and the authenticator sent with the message are the same, the message is determined to be authentic.
- the secret is obtained from two shares. As noted above, each share is defined by a point on a Euclidean plane.
- a first share (or data point) of the secret.
- the first share may be thought of as a single point on a Euclidean plane (e.g., in the form of (xo, yo)).
- Message source 40 transmits a message with a specific authentication protocol to the receiver 50.
- message source 40 transmits the message authenticator and a second (or 'activating') share (which is a second part of the secret).
- the second share may be a second single point from the same Euclidean plane (e.g., in the form of (x ls y_)).
- the message, the message authenticator e.g., the message authenticator
- the receiver 50 uses the second ('activating') share (e.g., (xi, yi)) and the stored first share (e.g., (x 0 , yo)) to reconstruct (or recover) the key (i.e., secret).
- the receiver 50 uses the reconstructed key to generate the message authenticator (e.g., MAC). If the message authenticator (e.g., MAC)computed at the receiver 50 is the same as the message authenticator sent from the message source 40, the message is deemed authentic, if the message authenticators are not the same, the message is rejected.
- the message authenticator e.g., MAC
- Recovery of the key is achieved by constructing a polynomial utilizing the first and the second shares; the y-intercept of the constructed polynomial being the key.
- the key is constructed by computing the value of S in the given finite field, where:
- Figure 2(a) illustrates a graphical representation of the first exemplary embodiment of the present invention showing exemplary shares (x 0 , yo) and (x ls y , and a line formed thereby which crosses the Y-axis at a specific point (which is the key).
- the plot in Figure 2(a) is obtained using real numbers, and not modular arithmetic.
- Such an approach as the one described above with reference to the first exemplary embodiment permits more than one message source 40 to share the stored (first) share (xo, yo) which is stored at the receiver 50.
- Each message source 40 would then be free to choose its own 'activating' (second) share (i.e., (x ls y ), thereby defining a broad range of secrets.
- the probability of constructing polynomials with identical y-intercepts (i.e., identical keys) is low.
- the range of possible second ('activating') shares could be allocated such that each service provider has a unique and non-overlapping range (see Figure 2(b)).
- the value of the secret S can be discovered by computing f(0):
- the value of the secret and thus the key, would be 6 (mod 23).
- the value of this secret will change with each different value of (xi, yi).
- Figure 3 illustrates a key recovery scheme according to a second exemplary embodiment of the present invention that utilizes three shares (as opposed to the two shares of the first exemplary embodiment).
- recovery of the key is achieved by constructing a second-degree polynomial (i.e., parabolic curve) utilizing first, second and third shares (e.g., (xo,yo), (x ⁇ ,y ⁇ ), (X2,Y2)); the y-intercept of the constructed second-degree polynomial being the key.
- a second-degree polynomial i.e., parabolic curve
- the value of the secret S can be discovered by computing f(0):
- the first, second and third shares may be expressed as points on a Euclidean plane.
- the plot in Figure 4 is obtained using real numbers, and not modular arithmetic.
- Figure 4 illustrates a key recovery scheme according to a third exemplary embodiment of the present invention that utilizes four shares.
- recovery of the key is achieved by constructing a third-degree polynomial (i.e., curve) utilizing first, second, third and fourth shares (e.g., (xo,yo), (xi.yi). fey.), (X3 3)); the y- intercept of the constructed third-degree polynomial being the key.
- a third-degree polynomial i.e., curve
- first, second, third and fourth shares e.g., (xo,yo), (xi.yi). fey.), (X3 3)
- the first, second, third and fourth shares may be expressed as points on a Euclidean plane.
- the plot in Figure 4 is obtained using real numbers, and not modular arithmetic.
- Multiple shares may also be used to build a convenient key transport scheme in a communications network.
- Code authentication an important issue in digital networks, may be used as a case study. In the future, sophisticated home entertainment devices handling audio/video data will receive software for various applications via digital distribution networks (e.g., satellite, cable, terrestrial, Internet). Identification of the source of this code is an essential requirement for both the service providers delivering the content and the manufacturer of the devices utilizing the content. The service providers would like to have assurance that their application is received an used only by authorized devices. The device manufacturers would, in turn, be concerned about unauthorized services using their devices. Suppose in a given broadcasting system different groups of devices are to be authorized in different ways. The example given below will discuss how prepositioned secret sharing may be used to establish the required key hierarchy.
- Level 1 Receiver - all the receivers in the broadcast 'region' are assigned one common share (i.e., a share common to all receivers in the region);
- Level 2 Receiver - all the receivers in a specified group are assigned an additional common share (i.e., another share common to all receivers in the specified group); and (3) Level 3 Receiver - each receiver is assigned a unique additional share.
- the above-described receivers may be used in conjunction with an 'activating' share to authenticate certain messages. Since the Level 1 Receiver includes only one share, while the Level 2 Receiver includes 2 shares, and the Level 3 Receiver includes 3 shares, each receiver will provide different sets of keys. Thus, all receivers in the broadcast region (i.e., Level 1 Receivers) will have the ability to receive and authenticate general messages, but only Level 2 Receivers will have the ability to receive and authenticate some additional messages, and only Level 3 Receivers will have the ability to receive and authenticate certain other additional messages. It will be noted that the shares which are placed in the Level 1-3 receivers comprise 'prepositioned' information which may be used in conjunction with an 'activating' share to compute a secret (e.g., the key).
- Figure 5 shows how the multiple share scheme would be constructed using the Euclidean plane.
- the three different authentication levels correspond to the three y-intercepts (i.e., "regional key”, “group key”, “individual key”).
- the first-degree polynomial (corresponding to the Level 1 or 'regional' authorization) comprises a line passing through an 'activating share' and a Level 1 common share.
- the second-degree polynomial (corresponding to the Level 2 or 'group' authorization) comprises a parabola passing through the 'activating' share, the Level 1 common share, and a Level 2 share.
- the third-degree polynomial (corresponding to the Level 3 or 'individual' authorization) comprises a curve passing through the 'activating share', the Level 1 common share, the Level 2 share, and a Level 3 share.
- the 'activating' share is used to compute each of the different keys (i.e., individual, group and regional).
- the plot in Figure 5 is obtained using real numbers, and not modular arithmetic.
- the above-described scheme effectively combines the advantages of symmetric and public key systems.
- the 'prepositioned' information can be considered to be the private key of the receiver.
- the symmetric key to be constructed is determined by the public information sent as part of the ECM. As the keys are not generated at the message source, no additional cipher is needed to protect them in distribution.
- a time-dependent secret system parameter e.g., the degree of the polynomial f(x) defining the secret would change from day-to-day, hour-to-hour, etc. Cryptanalysis would become a more demanding task for adversaries because they would have to first determine the degree of the polynomial.
- Masking the activating share before transmission The activating share transmitted with the message can then be unmasked by the receiver in a predefined process. An example of masking would be using a hash value of the activating share for authentication, but transmitting the activating share instead. Then, the receiver would perform hashing to determine the actual value.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Graphics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MXPA03004599A MXPA03004599A (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for message authentication systems. |
JP2002546357A JP2004515160A (en) | 2000-11-29 | 2001-09-24 | Threshold encryption method and system for message authentication system |
EP01981324A EP1366594A2 (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for message authentication systems |
BR0115573-3A BR0115573A (en) | 2000-11-29 | 2001-09-24 | Limit encryption scheme for message authentication systems |
KR10-2003-7006413A KR20030094217A (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for message authentication systems |
AU2002212977A AU2002212977A1 (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for message authentication systems |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US25378100P | 2000-11-29 | 2000-11-29 | |
US60/253,781 | 2000-11-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002045340A2 true WO2002045340A2 (en) | 2002-06-06 |
WO2002045340A3 WO2002045340A3 (en) | 2002-10-17 |
Family
ID=22961673
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/029842 WO2002045340A2 (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for message authentication systems |
PCT/US2001/029790 WO2002045337A2 (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for conditional access systems |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/029790 WO2002045337A2 (en) | 2000-11-29 | 2001-09-24 | Threshold cryptography scheme for conditional access systems |
Country Status (8)
Country | Link |
---|---|
EP (2) | EP1348276A2 (en) |
JP (2) | JP2004515160A (en) |
KR (2) | KR20030094217A (en) |
CN (2) | CN1483259A (en) |
AU (2) | AU2002212977A1 (en) |
BR (2) | BR0115575A (en) |
MX (2) | MXPA03004599A (en) |
WO (2) | WO2002045340A2 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005124168A (en) * | 2003-10-14 | 2005-05-12 | Microsoft Corp | Digital rights management system |
JP2008167505A (en) * | 2008-03-26 | 2008-07-17 | Dainippon Printing Co Ltd | Public key encryption processing system and method |
WO2009016371A1 (en) | 2007-08-01 | 2009-02-05 | Iti Scotland Limited | Identification and authentication of devices in a network |
US7620187B1 (en) | 2005-03-30 | 2009-11-17 | Rockwell Collins, Inc. | Method and apparatus for ad hoc cryptographic key transfer |
US7958354B1 (en) | 2008-02-14 | 2011-06-07 | Rockwell Collins, Inc. | High-order knowledge sharing system to distribute secret data |
WO2017130200A1 (en) * | 2016-01-27 | 2017-08-03 | Secret Double Octopus Ltd | System and method for securing a communication channel |
US11170094B2 (en) | 2016-01-27 | 2021-11-09 | Secret Double Octopus Ltd. | System and method for securing a communication channel |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5255436B2 (en) * | 2005-06-08 | 2013-08-07 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Deterministic key pre-distribution and operational key management for human sensor networks |
JP4776378B2 (en) * | 2006-01-11 | 2011-09-21 | 日本電信電話株式会社 | MULTI-KEY AUTHENTICATION TERMINAL DEVICE, MULTI-KEY AUTHENTICATION MANAGEMENT DEVICE, MULTI-KEY AUTHENTICATION SYSTEM, AND PROGRAM |
JP4916915B2 (en) * | 2007-02-28 | 2012-04-18 | Kddi株式会社 | Terminal device, data management device, and computer program |
JP4909796B2 (en) * | 2007-04-24 | 2012-04-04 | Kddi株式会社 | Secret information management system, secret information management method and program |
JP5608509B2 (en) * | 2010-10-21 | 2014-10-15 | Kddi株式会社 | Key management system, key management method, and computer program |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000049756A2 (en) * | 1999-02-17 | 2000-08-24 | Certco, Inc. | Cryptographic control and maintenance of organizational structure and functions |
-
2001
- 2001-09-24 AU AU2002212977A patent/AU2002212977A1/en not_active Abandoned
- 2001-09-24 WO PCT/US2001/029842 patent/WO2002045340A2/en active Search and Examination
- 2001-09-24 MX MXPA03004599A patent/MXPA03004599A/en active IP Right Grant
- 2001-09-24 BR BR0115575-0A patent/BR0115575A/en not_active IP Right Cessation
- 2001-09-24 JP JP2002546357A patent/JP2004515160A/en not_active Withdrawn
- 2001-09-24 BR BR0115573-3A patent/BR0115573A/en not_active IP Right Cessation
- 2001-09-24 MX MXPA03004822A patent/MXPA03004822A/en active IP Right Grant
- 2001-09-24 EP EP01977153A patent/EP1348276A2/en not_active Withdrawn
- 2001-09-24 CN CNA018196888A patent/CN1483259A/en active Pending
- 2001-09-24 AU AU2001296294A patent/AU2001296294A1/en not_active Abandoned
- 2001-09-24 KR KR10-2003-7006413A patent/KR20030094217A/en not_active Application Discontinuation
- 2001-09-24 EP EP01981324A patent/EP1366594A2/en not_active Withdrawn
- 2001-09-24 KR KR10-2003-7006964A patent/KR20040010565A/en not_active Application Discontinuation
- 2001-09-24 JP JP2002546354A patent/JP2004515159A/en not_active Withdrawn
- 2001-09-24 WO PCT/US2001/029790 patent/WO2002045337A2/en active Application Filing
- 2001-09-24 CN CNA01819723XA patent/CN1484901A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000049756A2 (en) * | 1999-02-17 | 2000-08-24 | Certco, Inc. | Cryptographic control and maintenance of organizational structure and functions |
Non-Patent Citations (4)
Title |
---|
ADI SHAMIR: "How to Share a Secret" COMMUNICATIONS OF THE ACM, [Online] 1979, XP002201104 Massachusetts Institute of Technology Retrieved from the Internet: <URL:http://szabo.best.vwh.net/secret.html > [retrieved on 2002-06-04] * |
BLUNDO, CRESTI, DE SANTIS, VACCARO: "Fully Dynamic Secret Sharing Schemes" DIPARTAMENTO DI INFORMATICA ED APPLICAZIONI, [Online] 1994, pages 110-125, XP002201105 Universita di Salerno (Italy) Retrieved from the Internet: <URL:http://citeseer.nj.nec.com/cache/papers/cs/788/http:zSzzSzwww.unisa.itzSzpaperszSzfully.pdf/blundo94fully.pdf> [retrieved on 2002-06-04] * |
MENEZES, OORSCHOT: "Handbook of Applied Cryptography" 1997 , CRC PRESS LLC , USA XP002201106 * page 364 * * page 524 - page 527 * * |
SIMMONS J.G.: "Prepositioned Shared Secret and/or Shared Control Schemes" EUROCRYPT '89 PROCEEDINGS, SPRINGER-VERLAG, [Online] 1990, pages 437-467, XP002201103 Alburquerque, New Mexico (USA) Retrieved from the Internet: <URL:http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/E89/436.PDF> [retrieved on 2002-06-04] * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005124168A (en) * | 2003-10-14 | 2005-05-12 | Microsoft Corp | Digital rights management system |
US7620187B1 (en) | 2005-03-30 | 2009-11-17 | Rockwell Collins, Inc. | Method and apparatus for ad hoc cryptographic key transfer |
WO2009016371A1 (en) | 2007-08-01 | 2009-02-05 | Iti Scotland Limited | Identification and authentication of devices in a network |
US7958354B1 (en) | 2008-02-14 | 2011-06-07 | Rockwell Collins, Inc. | High-order knowledge sharing system to distribute secret data |
JP2008167505A (en) * | 2008-03-26 | 2008-07-17 | Dainippon Printing Co Ltd | Public key encryption processing system and method |
WO2017130200A1 (en) * | 2016-01-27 | 2017-08-03 | Secret Double Octopus Ltd | System and method for securing a communication channel |
US11170094B2 (en) | 2016-01-27 | 2021-11-09 | Secret Double Octopus Ltd. | System and method for securing a communication channel |
Also Published As
Publication number | Publication date |
---|---|
JP2004515160A (en) | 2004-05-20 |
MXPA03004822A (en) | 2003-09-25 |
WO2002045337A3 (en) | 2002-09-06 |
WO2002045337A2 (en) | 2002-06-06 |
BR0115573A (en) | 2003-07-29 |
KR20030094217A (en) | 2003-12-11 |
CN1483259A (en) | 2004-03-17 |
CN1484901A (en) | 2004-03-24 |
KR20040010565A (en) | 2004-01-31 |
EP1366594A2 (en) | 2003-12-03 |
AU2002212977A1 (en) | 2002-06-11 |
AU2001296294A1 (en) | 2002-06-11 |
WO2002045340A3 (en) | 2002-10-17 |
JP2004515159A (en) | 2004-05-20 |
MXPA03004599A (en) | 2003-09-04 |
EP1348276A2 (en) | 2003-10-01 |
BR0115575A (en) | 2003-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7200752B2 (en) | Threshold cryptography scheme for message authentication systems | |
US5708714A (en) | Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses | |
EP0735723B1 (en) | Cryptographic communication method and cryptographic communication device | |
US7848525B2 (en) | Hybrid broadcast encryption method | |
US6154541A (en) | Method and apparatus for a robust high-speed cryptosystem | |
USRE44670E1 (en) | Resilient cryptographic scheme | |
EP1234404B1 (en) | Generation of a mathematically constrained key using a one-way function | |
US6345098B1 (en) | Method, system and apparatus for improved reliability in generating secret cryptographic variables | |
Wang et al. | Improved one-to-many authentication scheme for access control in pay-TV systems | |
WO2001084766A2 (en) | System and method for encryption using transparent keys | |
EP1366594A2 (en) | Threshold cryptography scheme for message authentication systems | |
AU737037B2 (en) | Auto-recoverable auto-certifiable cryptosystems | |
Mu et al. | Robust and secure broadcasting | |
Burmester et al. | Strong forward security | |
Knudsen et al. | On the difficulty of software key escrow | |
WO2000019652A1 (en) | Distributed shared key generation and management using fractional keys | |
US6724893B1 (en) | Method of passing a cryptographic key that allows third party access to the key | |
Han et al. | Verifiable threshold cryptosystems based on elliptic curve | |
Eskicioglu | A prepositioned secret sharing scheme for message authentication in broadcast networks | |
AlDerai et al. | A Study of Image Encryption/Decryption by Using Elliptic Curve Cryptography ECC | |
Gennaro et al. | Secure key recovery | |
Sakuraii et al. | A key escrow system with protecting user's privacy by blind decoding | |
JP3862397B2 (en) | Information communication system | |
JP2000115157A (en) | Loss communication method | |
JPH08204696A (en) | Authentication method in communication system having plural equipments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 551/KOLNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037006413 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2003/004599 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002546357 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 01819723X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001981324 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 2001981324 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020037006413 Country of ref document: KR |