WO2006074611A1 - Procede et dispositif pour generer une cle privee sur la base d'un identifiant - Google Patents
Procede et dispositif pour generer une cle privee sur la base d'un identifiant Download PDFInfo
- Publication number
- WO2006074611A1 WO2006074611A1 PCT/CN2006/000054 CN2006000054W WO2006074611A1 WO 2006074611 A1 WO2006074611 A1 WO 2006074611A1 CN 2006000054 W CN2006000054 W CN 2006000054W WO 2006074611 A1 WO2006074611 A1 WO 2006074611A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- public
- private key
- key
- public key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
Definitions
- the present invention relates to the field of network security technologies, and more particularly to a method and apparatus for generating a public-private key pair in an asymmetric key system. Background technique
- Asymmetric Keys The technology currently known to those skilled in the art is the Public Key Infrastructure.
- the operation of the ⁇ depends on two major components: a hierarchical CA (Certification Authority) and a large certificate base LDAP.
- PKI relies on third-party notarization to resolve the binding of identification and keys. This requires the establishment of a large and hierarchical CA certification body.
- PKI also relies on the support of the online certificate store.
- the online operation of the certificate store triggers a large amount of network information > traffic. For example, in order to obtain the certificate of the other party, the party needs to authenticate to the CA layer. So scholar from all over the world, including some PKI companies, are actively looking for a new way out.
- IBE Identity Based Encryption
- the object of the present invention is to find a simple key generation method based on identification and not limited by the number of users, to solve the above problems existing in the prior art.
- the present invention proposes a method of key generation and management and a corresponding apparatus and system for generating a public key from the identity of the other party, thereby eliminating the need for a third party CA certificate and no system online maintenance.
- the identification-based key generation and management method establishes a public key calculation parameter and a private key calculation parameter with a limited public and private key pair, and creates a mapping calculation method and an operation rule, so that each relying party can pass each other.
- the identification directly calculates the other party's public key, thereby implementing an identity-based key method.
- the invention discloses a method for generating an asymmetric key pair according to a user identifier i, comprising the following steps: generating a private key calculation parameter and a public key calculation parameter corresponding to each other; and utilizing the identifier provided by the first user
- the private key calculation parameter calculates a private key of the first user; provides the generated private key to the first user; and publishes the public key calculation parameter, so that the second user can obtain the identifier of the first user, And calculating, according to the identifier of the first user, the public key of the first user by using the public key calculation parameter.
- the present invention discloses an apparatus for generating an asymmetric key pair based on a user identification, comprising: one or more processors and a memory, the processor generating private key calculation parameters and public key calculation parameters corresponding to each other And storing the private key calculation parameter in the memory, calculating a private key according to the identifier provided by the first user, providing the calculated private key to the first user, and publishing the public key calculation parameter, so that the second Users can calculate the parameters based on the published public key! [And the identity of the first user, the public key of the first user is calculated.
- the second user can calculate the public key of the first user according to the published public key parameter and the identifier of the first user.
- the invention can be implemented as an elliptic curve cipher or as a discrete log cipher.
- the definition of the identifier in the present invention is broad, and the user name, the user ID number, the telephone number, the mail address, the personal account number, the device serial number, and the software process name can all be identified.
- the private key calculation parameter is a secret variable dedicated to the production of the private key, 'stored in the Key Management Center (KMC).
- KMC Key Management Center
- Public key calculation parameters are public variables that are published directly in any medium that is the easiest to access. Because the amount of parameters that need to be published is very limited, it is usually recorded directly in the personal ID authentication card, and is sent together with the private key. Therefore, each relying party can calculate the public key of any user through the public key calculation parameter as long as it knows the identity of the other party.
- the present invention regards the identity of the other party as the public key of the other party, thereby eliminating the need for a third party. Agency certification.
- the present invention as opposed to the IBE algorithm, only needs to retain a small number of shared parameters without retaining a large number of user-related parameters, thus eliminating the need for database support such as a catalog (LDAP) and no online maintenance of the system.
- LDAP catalog
- the public-private key generation method of the present invention will be described by taking an elliptic curve cipher as an example.
- ECC elliptic curve cryptography
- Public key calculation base and private key calculation base is the basis of implementing the identification-based key algorithm.
- the private key calculation base SCB is composed of an arbitrarily selected integer variable Sij
- the public key calculation base PCB is derived from the private key calculation base according to the principle of the elliptic curve cryptography described above, that is, A one-to-one correspondence between public and private keys is formed between the private key calculation base and the public key calculation base.
- the size of the calculation base is defined as fx h
- the private key calculation base (SCB) and public key calculation base (PCB) can be defined as follows:
- the private key calculation base SCB and the public key calculation base PCB are simulated as the elliptic curve cipher, and the result is similar to the case of the above elliptic curve cipher.
- HASH ( IDENTITY) datal : Under the encryption 'algorithm (such as AES), the intermediate variable iiatal is used as data, and is encrypted with the row value key R0WKEY to obtain the intermediate variable MAPO: the intermediate traffic amount MAPo is used as data, and then encrypted with the key R0WKEY, and then the intermediate variable MAP is obtained. 1 ⁇ analogy until the required number of MP values is obtained.
- the calculation base size is set to (32X32) in this example.
- the key R0WKEY used is provided by the ID authentication card.
- the permutation algorithm PMT of the column variables is set, and the result of the column permutation is one of the full permutations of (0, 1, 2, 3, ..., 31).
- the calculation method is as follows.
- AESCOLKEY (IDENTITY) PMT - KEY: C0LKEY is given in the ID certificate.
- PMTP purposeT_KEV( ⁇ ) PERMUT: The original order is the natural order of 0,1, 31.
- the row values of 32 rows are obtained (7, 13, 29, ..., 11), and the column replacement values are (3, 6, 12,... , 5), then, the variables taken in the private key calculation base are s[7,3], s[13,6], s [29,12],...,s [11, 5] ;
- the variables used in the calculation of the public key are P[7, 3] , P[13, 6], P[29, 12], ⁇ , P[ll, 5]; due to public key calculation and private key calculation
- the mapping values are the same, and the access locations are exactly the same, which guarantees the pairing relationship between the public and private keys.
- the scope of the scope is to resolve the contradiction between openness and closure in the authentication network, and is the key technology to achieve logical isolation.
- the authentication network is divided into n layers. For convenience of explanation, it is divided into three layers, that is, the scope parameters are divided into provincial, municipal, and county domains.
- the province is a parameter that only works within the province; if there is no interconnection requirement between different provinces and is completely independent, then an independent calculation base is used, and no provincial parameters can be set.
- the city area is a parameter that only works within the city; the parameters are different between different cities.
- the county scope is a parameter that only works within the county; the parameters vary between different counties. This meets the needs of segmentation.
- the provincial city public key parameter guarantees the delivery within the provincial scope
- the city public key parameter guarantees the delivery within the city
- the county public key parameter guarantees the delivery within the county. This meets the interoperability needs.
- MAPoCUmod 32 map [i] ⁇ , 1, . ., 15)
- the column value is:
- ⁇ . ⁇ (original order) t. , t[, t 2 , ⁇ ⁇ ⁇ , t 31 ;
- the key management center uses the calculation formula for user A to produce the private key:
- the calculation formula used by the Key Management Center to generate the private key for User A is:
- each user retains only its own private and public key calculation bases for digital signatures and key exchanges.
- the size of the public key calculation base is (fX h)
- the storage amount is (fXh)
- the public key quantity is (f) h .
- the ID certificate consists of a certificate body and a variable body.
- the certificate body according to the present invention is similar to a general certificate, and mainly defines basic attributes of a user, such as a name, Fixed parts such as job title, grade, expiration date, issuing unit and signature, so they are not discussed.
- the certificate body satisfies the hierarchically assigned security-type security policy.
- variable body is the core of the authentication card.
- the specific configuration key and parameter variables contain n different identifiers and n scopes.
- the variant includes the following 16 paragraphs.
- the variable body satisfies the application-based voluntary assurance (self-protection) security policy. Verification parameter item
- verification parameter item Z1 verification parameter, Z2 verification parameter role identification definition item
- ID certificate certificate body + variable body
- ID certificate certificate body + variable body + public key calculation base
- ID certificate certificate body + variable body + backup key
- a trusted authentication system can be constructed based on the present invention, including an office authentication system, a telephone and mail authentication system, a ticket authentication system, a proxy (process) authentication system, and the like.
- the system is roughly divided into three parts: the background program, the client program, and the standardization part.
- the background program is a key center program, and the key center is the highest authority for management. Under the corresponding security policy, it mainly undertakes the off-line production task of the private key.
- the private key production needs to configure the private key calculation base, and the corresponding private key is generated according to the user identification (phone number, email address, personal account number, etc.) provided by the user, and recorded in the media under the protection of the user password, and sent to the user by ID certificate.
- the medium is, for example, a smart IC card.
- the key part of the client program is stored in the smart IC card, which includes an intelligent IC card operating system including functions such as signature and authentication, a public key calculation program, and an ID certificate.
- an intelligent IC card operating system including functions such as signature and authentication, a public key calculation program, and an ID certificate.
- the public key calculation base and the public key calculation program as the shared parameters are simultaneously recorded in the smart IC card.
- the smart card IC operating system, the public key calculation program, and the smart IC card of the ID certificate of different contents are unified in the production of the key center.
- the techniques of this disclosure may be implemented in software, hardware, or a combination of software and hardware.
- the method of the present invention may be embodied in a number of program instructions which, when executed by one or more processors, perform the methods described herein to achieve the objectives of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Algebra (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06705476A EP1843509A4 (en) | 2005-01-14 | 2006-01-13 | METHOD AND DEVICE FOR PRODUCING PRIVATE KEYS BASED ON IDENTIFICATIONS |
AU2006205987A AU2006205987B2 (en) | 2005-01-14 | 2006-01-13 | Identifier-based private key generating method and device |
CA2593414A CA2593414C (en) | 2005-01-14 | 2006-01-13 | Identity-based key generating methods and devices |
US11/795,264 US8229114B2 (en) | 2005-01-14 | 2006-01-13 | Identity-based key generating methods and devices |
JP2007550662A JP2008527866A (ja) | 2005-01-14 | 2006-01-13 | 識別情報に基づく暗号鍵方法及びデバイス |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510002156.4 | 2005-01-14 | ||
CNB2005100021564A CN1262087C (zh) | 2005-01-14 | 2005-01-14 | 基于标识的密钥产生方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006074611A1 true WO2006074611A1 (fr) | 2006-07-20 |
Family
ID=34852935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2006/000054 WO2006074611A1 (fr) | 2005-01-14 | 2006-01-13 | Procede et dispositif pour generer une cle privee sur la base d'un identifiant |
Country Status (8)
Country | Link |
---|---|
US (1) | US8229114B2 (zh) |
EP (1) | EP1843509A4 (zh) |
JP (1) | JP2008527866A (zh) |
KR (1) | KR100960578B1 (zh) |
CN (1) | CN1262087C (zh) |
AU (1) | AU2006205987B2 (zh) |
CA (1) | CA2593414C (zh) |
WO (1) | WO2006074611A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090048979A1 (en) * | 2007-08-17 | 2009-02-19 | Ahmed Ibrahim Al-Herz | Token based new digital cash protocols |
US20110173452A1 (en) * | 2008-05-28 | 2011-07-14 | Nan Xiang-Hao | Method of generating compound type combined public key |
US20140074721A1 (en) * | 2012-09-10 | 2014-03-13 | King Fahd University Of Petroleum And Minerals | Hybrid virtual account and token-based digital cash protocols |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1262087C (zh) * | 2005-01-14 | 2006-06-28 | 南相浩 | 基于标识的密钥产生方法 |
GB2434947B (en) * | 2006-02-02 | 2011-01-26 | Identum Ltd | Electronic data communication system |
CN1835434B (zh) * | 2006-04-10 | 2012-07-18 | 北京易恒信认证科技有限公司 | 一种基于cpk安全认证的电子邮件系统和方法 |
CN1829150B (zh) * | 2006-04-10 | 2011-06-01 | 北京易恒信认证科技有限公司 | 一种基于cpk的网关认证装置及方法 |
CN1831865B (zh) * | 2006-04-24 | 2010-09-29 | 北京易恒信认证科技有限公司 | 一种基于cpk的电子银行安全认证系统和方法 |
CN100428261C (zh) * | 2006-05-22 | 2008-10-22 | 北京易恒信科技认证有限公司 | 基于cpk的可信认证系统 |
CN101267301A (zh) * | 2007-03-15 | 2008-09-17 | 上海贝尔阿尔卡特股份有限公司 | 通信网络中基于身份的认证和密钥协商方法及装置 |
CA2693133C (en) | 2007-07-17 | 2014-10-14 | Certicom Corp. | Method and system for generating implicit certificates and applications to identity-based encryption (ibe) |
CN101183938B (zh) * | 2007-10-22 | 2011-11-23 | 华中科技大学 | 一种无线网络安全传输方法、系统及设备 |
CN101222325B (zh) * | 2008-01-23 | 2010-05-12 | 西安西电捷通无线网络通信有限公司 | 一种基于id的无线多跳网络密钥管理方法 |
CN101567784B (zh) | 2008-04-21 | 2016-03-30 | 华为数字技术(成都)有限公司 | 一种获取密钥的方法、系统和设备 |
CN101420300B (zh) * | 2008-05-28 | 2013-05-29 | 北京易恒信认证科技有限公司 | 双因子组合公钥生成和认证方法 |
CN101420303B (zh) * | 2008-12-12 | 2011-02-02 | 广州杰赛科技股份有限公司 | 一种语音数据的通信方法及其装置 |
US8341427B2 (en) * | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
US9165154B2 (en) * | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
DE102009001719B4 (de) | 2009-03-20 | 2011-02-10 | Compugroup Holding Ag | Verfahren zur Erzeugung von asymmetrischen kryptografischen Schlüsselpaaren |
EP2348450B1 (en) | 2009-12-18 | 2013-11-06 | CompuGroup Medical AG | Database system, computer system, and computer-readable storage medium for decrypting a data record |
EP2348447B1 (en) | 2009-12-18 | 2014-07-16 | CompuGroup Medical AG | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device |
EP2348452B1 (en) | 2009-12-18 | 2014-07-02 | CompuGroup Medical AG | A computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system |
EP2365456B1 (en) | 2010-03-11 | 2016-07-20 | CompuGroup Medical SE | Data structure, method and system for predicting medical conditions |
CN101989984A (zh) * | 2010-08-24 | 2011-03-23 | 北京易恒信认证科技有限公司 | 电子文件安全共享系统及方法 |
CN101917710A (zh) * | 2010-08-27 | 2010-12-15 | 中兴通讯股份有限公司 | 移动互联网加密通讯的方法、系统及相关装置 |
CN102096778B (zh) * | 2010-12-07 | 2013-01-23 | 中国科学院软件研究所 | 基于椭圆曲线和双线性对密码体制的直接匿名证明方法 |
KR101329007B1 (ko) * | 2012-05-31 | 2013-11-12 | 삼성에스디에스 주식회사 | 아이디 기반 암호 시스템을 위한 비밀키 생성 장치 및 그 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체 |
CN103078736A (zh) * | 2013-01-25 | 2013-05-01 | 匡创公司 | 一种多维度密钥生成方法 |
CN103260001A (zh) * | 2013-04-03 | 2013-08-21 | 匡创公司 | 用于多媒体的自认证防护方法 |
CN104283860A (zh) * | 2013-07-10 | 2015-01-14 | 全联斯泰克科技有限公司 | 一种基于代码签名的elf文件鉴别方法和装置 |
WO2015179020A2 (en) * | 2014-03-27 | 2015-11-26 | Ent Technologies, Inc. | Generalized entity network translation (gent) |
CN104200154A (zh) * | 2014-09-22 | 2014-12-10 | 上海众人科技有限公司 | 一种基于标识的安装包签名方法及其装置 |
DE102015210734B4 (de) | 2014-10-31 | 2021-03-04 | Hewlett Packard Enterprise Development Lp | Verwaltung kryptographischer schlüssel |
CN105577373B (zh) * | 2015-12-15 | 2018-10-19 | 四川长虹电器股份有限公司 | 标识密匙的生成方法 |
CN107239712A (zh) * | 2016-03-29 | 2017-10-10 | 阿里巴巴集团控股有限公司 | 基于应用程序的用户信息的隐藏方法及装置 |
CN105790941B (zh) * | 2016-04-22 | 2019-08-16 | 北京迪曼森科技有限公司 | 一种基于标识的具有域划分的组合密钥生成及认证方法 |
DE102016207635A1 (de) * | 2016-05-03 | 2017-11-09 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zur Absicherung von Gerätezugriffen |
KR101865703B1 (ko) * | 2016-10-28 | 2018-06-08 | 삼성에스디에스 주식회사 | 키 생성 방법 및 장치, 암호화 장치 및 방법 |
US10341098B2 (en) * | 2017-01-24 | 2019-07-02 | Nxp B.V. | Method of generating cryptographic key pairs |
KR102432356B1 (ko) * | 2017-03-23 | 2022-08-16 | 삼성에스디에스 주식회사 | 키 생성 장치 및 방법, 암호화 장치 및 방법 |
CN107682375A (zh) * | 2017-11-21 | 2018-02-09 | 武汉珈港科技有限公司 | 一种密钥管理和动态密钥保护方法 |
CN109379194A (zh) * | 2018-12-11 | 2019-02-22 | 西安慧博习兆信息技术有限公司 | 用标识密钥安全加解密、签署、传递文件的网络系统 |
WO2021076118A1 (en) * | 2019-10-16 | 2021-04-22 | Hewlett-Packard Development Company, L.P. | Generating keys |
CN113765666A (zh) * | 2020-10-20 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | 信息加密方法及装置 |
CN113259093B (zh) * | 2021-04-21 | 2022-03-25 | 山东大学 | 基于身份基加密的层级签名加密系统与构建方法 |
WO2022265618A1 (en) * | 2021-06-14 | 2022-12-22 | Hewlett-Packard Development Company, L.P. | Authentication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020021810A1 (en) * | 2000-08-18 | 2002-02-21 | Solinas Jerome Anthony | Cryptographic key exchange method using efficient elliptic curve |
CN1505306A (zh) * | 2002-11-29 | 2004-06-16 | 海南信安数据系统有限公司 | 椭圆曲线加密解密方法和装置 |
CN1505313A (zh) * | 2002-11-29 | 2004-06-16 | 海南信安数据系统有限公司 | 椭圆曲线签名和验证签名方法和装置 |
JP2004201124A (ja) * | 2002-12-19 | 2004-07-15 | Murata Mach Ltd | 公開鍵暗号方法,署名方法,暗号通信システム及びコンピュータプログラム |
US20050010801A1 (en) | 2003-06-25 | 2005-01-13 | Terence Spies | Identity-based-encryption messaging system with public parameter host servers |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000124887A (ja) * | 1998-10-14 | 2000-04-28 | Fuji Xerox Co Ltd | グループ単位の暗号化・復号方法および署名方法ならびに装置 |
US7239701B1 (en) * | 2000-05-02 | 2007-07-03 | Murata Machinery Ltd. | Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem |
EP2429116B1 (en) * | 2001-08-13 | 2013-07-10 | The Board of Trustees of the Leland Stanford Junior University | Method for identity-based encryption and related crytographic techniques |
US7003117B2 (en) * | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
US7571321B2 (en) * | 2003-03-14 | 2009-08-04 | Voltage Security, Inc. | Identity-based-encryption messaging system |
KR100561847B1 (ko) * | 2003-10-08 | 2006-03-16 | 삼성전자주식회사 | 공개키를 이용한 데이터 암호화 및 복호화 방법 |
US7103911B2 (en) * | 2003-10-17 | 2006-09-05 | Voltage Security, Inc. | Identity-based-encryption system with district policy information |
JP4546231B2 (ja) * | 2004-12-09 | 2010-09-15 | 株式会社日立製作所 | Idベース署名及び暗号化システムおよび方法 |
CN1262087C (zh) * | 2005-01-14 | 2006-06-28 | 南相浩 | 基于标识的密钥产生方法 |
CN101340282B (zh) * | 2008-05-28 | 2011-05-11 | 北京易恒信认证科技有限公司 | 复合公钥的生成方法 |
-
2005
- 2005-01-14 CN CNB2005100021564A patent/CN1262087C/zh active Active
-
2006
- 2006-01-13 US US11/795,264 patent/US8229114B2/en not_active Expired - Fee Related
- 2006-01-13 JP JP2007550662A patent/JP2008527866A/ja active Pending
- 2006-01-13 KR KR1020077018357A patent/KR100960578B1/ko active IP Right Grant
- 2006-01-13 WO PCT/CN2006/000054 patent/WO2006074611A1/zh active Application Filing
- 2006-01-13 EP EP06705476A patent/EP1843509A4/en not_active Withdrawn
- 2006-01-13 CA CA2593414A patent/CA2593414C/en active Active
- 2006-01-13 AU AU2006205987A patent/AU2006205987B2/en not_active Ceased
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020021810A1 (en) * | 2000-08-18 | 2002-02-21 | Solinas Jerome Anthony | Cryptographic key exchange method using efficient elliptic curve |
CN1505306A (zh) * | 2002-11-29 | 2004-06-16 | 海南信安数据系统有限公司 | 椭圆曲线加密解密方法和装置 |
CN1505313A (zh) * | 2002-11-29 | 2004-06-16 | 海南信安数据系统有限公司 | 椭圆曲线签名和验证签名方法和装置 |
JP2004201124A (ja) * | 2002-12-19 | 2004-07-15 | Murata Mach Ltd | 公開鍵暗号方法,署名方法,暗号通信システム及びコンピュータプログラム |
US20050010801A1 (en) | 2003-06-25 | 2005-01-13 | Terence Spies | Identity-based-encryption messaging system with public parameter host servers |
Non-Patent Citations (5)
Title |
---|
BONEH ET AL.: "CRYPTO 2001, Proc.", 2001, SPRINGER, article "Adv. in Cryptology", pages: 213 - 229 |
See also references of EP1843509A4 |
SWEE-HUAY HENG ET AL.: "CT-RSA", 2004, SPRINGER, article "Topics in Cryptology", pages: 67 - 80 |
TANG W., NAN X., CHEN Z.: "Elliptic Curve Cryptography-based Combined Public Key Technique", COMPUTER ENGINEERING AND APPLICATION, 2003, XP008090713 * |
TANG WEN ET AL., COMP. ENG. AND APPL., vol. 39, no. 21, pages 1 - 3 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090048979A1 (en) * | 2007-08-17 | 2009-02-19 | Ahmed Ibrahim Al-Herz | Token based new digital cash protocols |
US20110302088A1 (en) * | 2007-08-17 | 2011-12-08 | King Fahd University Of Petroleum And Minerals | Token based new digital cash protocols |
US8160966B2 (en) * | 2007-08-17 | 2012-04-17 | King Fahd University Of Petroleum And Minerals | Token based new digital cash protocols |
US20110173452A1 (en) * | 2008-05-28 | 2011-07-14 | Nan Xiang-Hao | Method of generating compound type combined public key |
US20140074721A1 (en) * | 2012-09-10 | 2014-03-13 | King Fahd University Of Petroleum And Minerals | Hybrid virtual account and token-based digital cash protocols |
US9171324B2 (en) * | 2012-09-10 | 2015-10-27 | King Fahd University Of Petroleum And Minerals | Hybrid virtual account and token-based digital cash protocols |
Also Published As
Publication number | Publication date |
---|---|
KR20070096014A (ko) | 2007-10-01 |
US20080267394A1 (en) | 2008-10-30 |
CA2593414C (en) | 2014-12-16 |
AU2006205987B2 (en) | 2011-04-28 |
JP2008527866A (ja) | 2008-07-24 |
EP1843509A1 (en) | 2007-10-10 |
US8229114B2 (en) | 2012-07-24 |
AU2006205987A1 (en) | 2006-07-20 |
EP1843509A4 (en) | 2010-01-13 |
CA2593414A1 (en) | 2006-07-20 |
CN1262087C (zh) | 2006-06-28 |
CN1633071A (zh) | 2005-06-29 |
KR100960578B1 (ko) | 2010-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006074611A1 (fr) | Procede et dispositif pour generer une cle privee sur la base d'un identifiant | |
CN113014392B (zh) | 基于区块链的数字证书管理方法及系统、设备、存储介质 | |
JP5933786B2 (ja) | Idベース暗号化および関連する暗号手法のシステムおよび方法 | |
JP5265744B2 (ja) | 導出鍵を用いたセキュアメッセージングシステム | |
Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
RU2512139C2 (ru) | Способ и устройство для генерации и аутентификации псевдонима | |
WO2009143713A1 (zh) | 双因子组合公钥生成和认证方法 | |
WO2011163044A2 (en) | A method and apparatus for key revocation in an attribute-based encryption scheme | |
JP2010161826A (ja) | 証明書に基づく暗号化および公開鍵構造基盤 | |
US20220020020A1 (en) | Methods, systems, and devices for managing digital assets | |
Xu et al. | A secure EMR sharing system with tamper resistance and expressive access control | |
CN108712259A (zh) | 基于身份的可代理上传数据的云存储高效审计方法 | |
CN110519040B (zh) | 基于身份的抗量子计算数字签名方法和系统 | |
Thilakanathan et al. | Secure multiparty data sharing in the cloud using hardware-based TPM devices | |
Suveetha et al. | Ensuring confidentiality of cloud data using homomorphic encryption | |
CN112950356B (zh) | 基于数字身份的个人贷款处理方法及系统、设备、介质 | |
Patel et al. | The study of digital signature authentication process | |
Sowmiya et al. | Secure cloud storage model with hidden policy attribute based access control | |
Kumar et al. | ASP: advanced security protocol for security and privacy in cloud computing | |
Tanwar et al. | Design and Implementation of Database Security for Various type of Digital Signature | |
HariPriya et al. | An Efficient Cloud Storage with Secure Dynamic Data Modification | |
REDDY et al. | Two-Factor Data Security Preservation System for Cloud Storage | |
Scholar | Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud | |
Malek et al. | A new scheme for securing mobile agents | |
Grimm | Security for open communication: The DFN mail security project report |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2593414 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007550662 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006205987 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006705476 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077018357 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2006205987 Country of ref document: AU Date of ref document: 20060113 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006205987 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2006705476 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11795264 Country of ref document: US |