WO2006074611A1 - Procede et dispositif pour generer une cle privee sur la base d'un identifiant - Google Patents

Procede et dispositif pour generer une cle privee sur la base d'un identifiant Download PDF

Info

Publication number
WO2006074611A1
WO2006074611A1 PCT/CN2006/000054 CN2006000054W WO2006074611A1 WO 2006074611 A1 WO2006074611 A1 WO 2006074611A1 CN 2006000054 W CN2006000054 W CN 2006000054W WO 2006074611 A1 WO2006074611 A1 WO 2006074611A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
public
private key
key
public key
Prior art date
Application number
PCT/CN2006/000054
Other languages
English (en)
French (fr)
Inventor
Xianghao Nan
Zhong Chen
Original Assignee
Xianghao Nan
Zhong Chen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=34852935&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2006074611(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Xianghao Nan, Zhong Chen filed Critical Xianghao Nan
Priority to EP06705476A priority Critical patent/EP1843509A4/en
Priority to AU2006205987A priority patent/AU2006205987B2/en
Priority to CA2593414A priority patent/CA2593414C/en
Priority to US11/795,264 priority patent/US8229114B2/en
Priority to JP2007550662A priority patent/JP2008527866A/ja
Publication of WO2006074611A1 publication Critical patent/WO2006074611A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • the present invention relates to the field of network security technologies, and more particularly to a method and apparatus for generating a public-private key pair in an asymmetric key system. Background technique
  • Asymmetric Keys The technology currently known to those skilled in the art is the Public Key Infrastructure.
  • the operation of the ⁇ depends on two major components: a hierarchical CA (Certification Authority) and a large certificate base LDAP.
  • PKI relies on third-party notarization to resolve the binding of identification and keys. This requires the establishment of a large and hierarchical CA certification body.
  • PKI also relies on the support of the online certificate store.
  • the online operation of the certificate store triggers a large amount of network information > traffic. For example, in order to obtain the certificate of the other party, the party needs to authenticate to the CA layer. So scholar from all over the world, including some PKI companies, are actively looking for a new way out.
  • IBE Identity Based Encryption
  • the object of the present invention is to find a simple key generation method based on identification and not limited by the number of users, to solve the above problems existing in the prior art.
  • the present invention proposes a method of key generation and management and a corresponding apparatus and system for generating a public key from the identity of the other party, thereby eliminating the need for a third party CA certificate and no system online maintenance.
  • the identification-based key generation and management method establishes a public key calculation parameter and a private key calculation parameter with a limited public and private key pair, and creates a mapping calculation method and an operation rule, so that each relying party can pass each other.
  • the identification directly calculates the other party's public key, thereby implementing an identity-based key method.
  • the invention discloses a method for generating an asymmetric key pair according to a user identifier i, comprising the following steps: generating a private key calculation parameter and a public key calculation parameter corresponding to each other; and utilizing the identifier provided by the first user
  • the private key calculation parameter calculates a private key of the first user; provides the generated private key to the first user; and publishes the public key calculation parameter, so that the second user can obtain the identifier of the first user, And calculating, according to the identifier of the first user, the public key of the first user by using the public key calculation parameter.
  • the present invention discloses an apparatus for generating an asymmetric key pair based on a user identification, comprising: one or more processors and a memory, the processor generating private key calculation parameters and public key calculation parameters corresponding to each other And storing the private key calculation parameter in the memory, calculating a private key according to the identifier provided by the first user, providing the calculated private key to the first user, and publishing the public key calculation parameter, so that the second Users can calculate the parameters based on the published public key! [And the identity of the first user, the public key of the first user is calculated.
  • the second user can calculate the public key of the first user according to the published public key parameter and the identifier of the first user.
  • the invention can be implemented as an elliptic curve cipher or as a discrete log cipher.
  • the definition of the identifier in the present invention is broad, and the user name, the user ID number, the telephone number, the mail address, the personal account number, the device serial number, and the software process name can all be identified.
  • the private key calculation parameter is a secret variable dedicated to the production of the private key, 'stored in the Key Management Center (KMC).
  • KMC Key Management Center
  • Public key calculation parameters are public variables that are published directly in any medium that is the easiest to access. Because the amount of parameters that need to be published is very limited, it is usually recorded directly in the personal ID authentication card, and is sent together with the private key. Therefore, each relying party can calculate the public key of any user through the public key calculation parameter as long as it knows the identity of the other party.
  • the present invention regards the identity of the other party as the public key of the other party, thereby eliminating the need for a third party. Agency certification.
  • the present invention as opposed to the IBE algorithm, only needs to retain a small number of shared parameters without retaining a large number of user-related parameters, thus eliminating the need for database support such as a catalog (LDAP) and no online maintenance of the system.
  • LDAP catalog
  • the public-private key generation method of the present invention will be described by taking an elliptic curve cipher as an example.
  • ECC elliptic curve cryptography
  • Public key calculation base and private key calculation base is the basis of implementing the identification-based key algorithm.
  • the private key calculation base SCB is composed of an arbitrarily selected integer variable Sij
  • the public key calculation base PCB is derived from the private key calculation base according to the principle of the elliptic curve cryptography described above, that is, A one-to-one correspondence between public and private keys is formed between the private key calculation base and the public key calculation base.
  • the size of the calculation base is defined as fx h
  • the private key calculation base (SCB) and public key calculation base (PCB) can be defined as follows:
  • the private key calculation base SCB and the public key calculation base PCB are simulated as the elliptic curve cipher, and the result is similar to the case of the above elliptic curve cipher.
  • HASH ( IDENTITY) datal : Under the encryption 'algorithm (such as AES), the intermediate variable iiatal is used as data, and is encrypted with the row value key R0WKEY to obtain the intermediate variable MAPO: the intermediate traffic amount MAPo is used as data, and then encrypted with the key R0WKEY, and then the intermediate variable MAP is obtained. 1 ⁇ analogy until the required number of MP values is obtained.
  • the calculation base size is set to (32X32) in this example.
  • the key R0WKEY used is provided by the ID authentication card.
  • the permutation algorithm PMT of the column variables is set, and the result of the column permutation is one of the full permutations of (0, 1, 2, 3, ..., 31).
  • the calculation method is as follows.
  • AESCOLKEY (IDENTITY) PMT - KEY: C0LKEY is given in the ID certificate.
  • PMTP purposeT_KEV( ⁇ ) PERMUT: The original order is the natural order of 0,1, 31.
  • the row values of 32 rows are obtained (7, 13, 29, ..., 11), and the column replacement values are (3, 6, 12,... , 5), then, the variables taken in the private key calculation base are s[7,3], s[13,6], s [29,12],...,s [11, 5] ;
  • the variables used in the calculation of the public key are P[7, 3] , P[13, 6], P[29, 12], ⁇ , P[ll, 5]; due to public key calculation and private key calculation
  • the mapping values are the same, and the access locations are exactly the same, which guarantees the pairing relationship between the public and private keys.
  • the scope of the scope is to resolve the contradiction between openness and closure in the authentication network, and is the key technology to achieve logical isolation.
  • the authentication network is divided into n layers. For convenience of explanation, it is divided into three layers, that is, the scope parameters are divided into provincial, municipal, and county domains.
  • the province is a parameter that only works within the province; if there is no interconnection requirement between different provinces and is completely independent, then an independent calculation base is used, and no provincial parameters can be set.
  • the city area is a parameter that only works within the city; the parameters are different between different cities.
  • the county scope is a parameter that only works within the county; the parameters vary between different counties. This meets the needs of segmentation.
  • the provincial city public key parameter guarantees the delivery within the provincial scope
  • the city public key parameter guarantees the delivery within the city
  • the county public key parameter guarantees the delivery within the county. This meets the interoperability needs.
  • MAPoCUmod 32 map [i] ⁇ , 1, . ., 15)
  • the column value is:
  • ⁇ . ⁇ (original order) t. , t[, t 2 , ⁇ ⁇ ⁇ , t 31 ;
  • the key management center uses the calculation formula for user A to produce the private key:
  • the calculation formula used by the Key Management Center to generate the private key for User A is:
  • each user retains only its own private and public key calculation bases for digital signatures and key exchanges.
  • the size of the public key calculation base is (fX h)
  • the storage amount is (fXh)
  • the public key quantity is (f) h .
  • the ID certificate consists of a certificate body and a variable body.
  • the certificate body according to the present invention is similar to a general certificate, and mainly defines basic attributes of a user, such as a name, Fixed parts such as job title, grade, expiration date, issuing unit and signature, so they are not discussed.
  • the certificate body satisfies the hierarchically assigned security-type security policy.
  • variable body is the core of the authentication card.
  • the specific configuration key and parameter variables contain n different identifiers and n scopes.
  • the variant includes the following 16 paragraphs.
  • the variable body satisfies the application-based voluntary assurance (self-protection) security policy. Verification parameter item
  • verification parameter item Z1 verification parameter, Z2 verification parameter role identification definition item
  • ID certificate certificate body + variable body
  • ID certificate certificate body + variable body + public key calculation base
  • ID certificate certificate body + variable body + backup key
  • a trusted authentication system can be constructed based on the present invention, including an office authentication system, a telephone and mail authentication system, a ticket authentication system, a proxy (process) authentication system, and the like.
  • the system is roughly divided into three parts: the background program, the client program, and the standardization part.
  • the background program is a key center program, and the key center is the highest authority for management. Under the corresponding security policy, it mainly undertakes the off-line production task of the private key.
  • the private key production needs to configure the private key calculation base, and the corresponding private key is generated according to the user identification (phone number, email address, personal account number, etc.) provided by the user, and recorded in the media under the protection of the user password, and sent to the user by ID certificate.
  • the medium is, for example, a smart IC card.
  • the key part of the client program is stored in the smart IC card, which includes an intelligent IC card operating system including functions such as signature and authentication, a public key calculation program, and an ID certificate.
  • an intelligent IC card operating system including functions such as signature and authentication, a public key calculation program, and an ID certificate.
  • the public key calculation base and the public key calculation program as the shared parameters are simultaneously recorded in the smart IC card.
  • the smart card IC operating system, the public key calculation program, and the smart IC card of the ID certificate of different contents are unified in the production of the key center.
  • the techniques of this disclosure may be implemented in software, hardware, or a combination of software and hardware.
  • the method of the present invention may be embodied in a number of program instructions which, when executed by one or more processors, perform the methods described herein to achieve the objectives of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Description

基于标识的密钥产生方法及装置 技术领域
本发明涉及网络安全技术领域,更具体说涉及在非对称密钥系统中产生公 私钥对的方法和装置。 背景技术
随着互联网的发展,对计算机和网络安全的要求也越来越高,相应的加密 算法和技术也在蓬勃发展。 目前的加密技术可分为两类,即对称密钥技术和非对 称密钥技术。 其中非对称密钥技术由于可以避免通过网络传递解密密钥即私钥 的需要而受到了广泛的应用。
非对称密钥目前最为本领域内的技术人员所公知的技术是 ΡΠ (Public Key Infrastructure)。 ΡΠ的运行靠两大部件:层次化的 CA机构(Certification Authority)和庞大的证书库 LDAP。 PKI靠第三方公证来解决标识和密钥的捆绑。 此需要建立庞大的层次化的 CA认证机构。 PKI还要靠在线运行的证书库的支持, 证书库的在线运行引发了大量的网络信 >流量,例如一方为了获得通信对方的证 书,就需要向 CA层层认证。于是各国学者,包括部分 PKI公司在内,正在积极寻找一 种新的出路。
另一种非常具有前景的加密技术是 IBE (Identity Based Encryption)。 1984年, Shamir提出了基于标识的签名设想,并推测基于标识的密码体制(简称 IBE: Identity Based Encryption) 的存在性,但是一直没有找到具体的实现方 法。
2001 年 Don Boneh和 Matthew Franklin根据 Shamir的想法,提出了从 Weil配对 来实现基于标识的密码体制。 与 PKI技术相比较 , ΙΒΕ算法虽然取消了庞大的层 次化 CA机构,但需要保留用户相关的参数。 因为参数是与各用户相关,所以参数 量与用户量形成正比。 只要需要公布用户相关信息,就需要目录库(LDAP)等数 据库的支持,进而也没法减少动态的在线维护量。 发明内容 本发明的目的就是找出简便的基于标识的不受用户数量限制的密钥产生方 法, 以解决现有技术中存在的上述问题。
为此,本发明提出了一种密钥产生及管理的方法以及相应的装置和系统,从 对方的标识产生公钥,从而不需要第三方 CA的证明,也没有系统在线维护量。
根据本发明,基于标识的密钥产生及管理方法以有限的公、 私钥对,分别建 立公钥计算参数和私钥计算参数,并创设映射计算方法和运算规则,使各依赖方 能够通过对方的标识直接计算对方公钥,从而实现基于标识的密钥方法。
本发明公开了一种用于根据用户标 i只产生非对称密钥对的方法,包括下述 步骤: 生成彼此对应的私钥计算参数和公钥计算参数; 根据第一用户提供的标 识,利用所述私钥计算参数计算第一用户的私钥; 将所产生的私钥提供给第一用 户; 以及公布所述公钥计算参数,以使得第二用户在获得第一用户的标识后,可 根据第一用户的标识,利用所述公钥计算参数,计算第一用户的公钥。
另外,本发明公开了一种用于根据用户标识产生非对称密钥对的装置,包 括: 一个或多个处理器以及存储器,所述处理器生成彼此对应的私钥计算参数 和公钥计算参数,将私钥计算参数存储在所述存储器中,根据第一用户提供的标 识为其计算私钥,将所计算的私钥提供给该第一用户,并公布公钥计算参数, 以 使得第二用户可根据公布的公钥计算参! [和第一用户的标识,计算出第一用户 的公钥。
第二用户可根据公布的公钥参数和第一用户的标识,计算出第一用户的公 钥。
本发明可以椭圆曲线密码实现,也可以模拟为离散对数密码。
本发明中的标识的定义是广义的,用户名、用户名身份证号、 电话号码、 邮 件地址、 个人帐号、 设备序列号、 软件进程名等都可以做标识。
在本发明的实施方式中,私钥计算参数是秘密变量,专用于私钥的生产, '存 放于密钥管理中心 (KMC)。公钥计算参数是公开变量,直接公布于最容易访问的 任何媒体中。因为需要公布的参数量非常有限,一般直接记录在个人 ID认证卡中, 与私钥一起发 ^用户使用。 因此,各依赖方只要知道对方的标识,都可以通过公 钥计算参数计算出任何用户的公钥。
与现有技术相比,本发明把对方的标识当作对方的公钥,从而不需要第三方 机构的证明。 与 IBE算法相对比的 本发明只需保留少量共用参数,而无需保留 大量用户相关的参数,因而不需要目录库( LDAP)等数据库的支持,也没有系统 在线维护量。
本发明对现有技术的对比以及对现有技术的改进用下表可更清楚地表现出 来:
Figure imgf000004_0003
具体实施方式
下面的实施例中,以椭圆曲线密码为例说明本发明的公私钥产生方法。 根据椭圆曲线密码 (ECC)标准的定义,设椭圆曲线 (密码) E: y2=x3+ax+b (m) , 参数 T : (a,b, G, n,m), 其中 m是模数, n是界, G是基点,即 G= (X。, Y0) Μ 设将私钥 s选择为任一整数,那么可得到对应的公钥 P为椭圆曲线 E上的一个点 sG,用 (xs, ys) 标记。 p
(1)公钥计算基和私钥计算基公、私钥的计算基是实现基于标识的密钥算法 的基础。私钥计算基 SCB由任意选择的整数变量 Sij组成,而公钥计算基 PCB则根据 上述椭圆曲线密码的原理,从私钥计算基派生,即
Figure imgf000004_0001
在私钥计算 基和公钥计算基之间形成一一对应的公、 私钥关系。 将计算基的大小定义为 fx h,可定义如下的私钥计算基 (SCB)和公钥计算基 (PCB):
Figure imgf000004_0002
SCB=S31 PCB=P3, P32 P33 公、 私钥计算基有以下性质。'
性质 1:在私钥计算基 SCB和公钥计算基 PCB之间存在一种一一对应关系。设 SCB 的 是私钥,
Figure imgf000005_0001
(X。,Yo); 同理,假设 S21是私钥,那么 P21是 S21的公钥。 类推,设 Sij是私钥,那么 是公钥 (i=l. . f, j=l. . h)。
性质 2 :在椭圆曲线密码中,如果 S„和 是私钥,对应的公钥为 Pu和 P21,那么, 当 S„+S21= α做私钥时 , Ρ„+Ρ21= β为 α的公钥。 这是因为 β =PU+P21= (xn, yn) + (Χ21, Υ21) =SUG+S21G= (Sn+S21) G- α G 。 正好符合椭圆曲线密码公、 私钥的定义。
从性质 1中可以看到,私钥计算基和公钥计算基的建立是非常简便的,从性 质 2 中可以看到,用一种算法实现密钥的规模化提供了依据。
如果能把计算基的这种性质和用户标识有机联系起来,就不难构造出基于 标识的密钥系统。
在另一个实施例中,利用了离散对数密码,定义的参数为 T= (g, m) , g是小 于 m的整数基, m是模数。 假设整数 s是私钥,那么,公钥是 gs=p mod m, p是整数。 与椭圆曲线密码一样模拟出私钥计算基 SCB和公钥计算基 PCB,结果与上述椭 曲 线密码的情形下类似。
(2 ) 行映 '射和列置换为了实现基手标识的密钥分发,必须找到一种方法, 把公私钥计算基和用户标识结合起来。 公钥和标识绑定的方法不是唯一的,但 最简便的方法是随机映射。
为了说明问题方便,在下面的例子中用加密的简单方式(随机),将标识和 公钥变量绑定在一起。 为此需设置两种算法:行值计算方法和列值计算方法。 行值计算方法:
给定行值密钥 R0WKEY,这是一个公开变量,以常数形式固定。
首先在一种 HASH算法 (如 MD5)下,将不定长度的名称标识(IDENTIIY)变 换成固定长度的变量 datal。
HASH ( IDENTITY) =datal : 在加密 '算法(如 AES)下,将中间变量 iiatal作数据,用行值密钥 R0WKEY加密, 得到中间变量 MAPo:将中间交量 MAPo做数据,再用密钥 R0WKEY加密,再得中间变量 MAP1}类推,直到得出所需数量的 MP值为止。 为了说明方便,在本例中设定计算基 大小为 (32X32) 。 所用密钥 R0WKEY由 ID认证卡中提供。
AES瞧 By(datal)=MAPo:
Figure imgf000006_0001
MAPo的 16个字节分别用 m (在本例中 m=32)模,得到 16个小于 m的行值,以 map[0]-map[15] 标记; MAP 的 16个字节分别模 m也得到 16个小于 m的行值,以 map [ 16] -map [31 ]标记。
MAPo [I] mod m=map[i] (i=0, 1, .. , 15) ;
MAPi[I] mod m=raap[i] (i=16, 17, -31);
至此得到 32个 map值,用于行的 32次选取。 如 map[l] =5,则在私钥计算基或 公钥计算基中选择第 5行,又如 map [2]=21, 则选择第 21行,类推。 列值计算方法:
为了避免列变量的顺序取用,设置了列变量的置换算法 PMT,列置换的结果 是(0, 1,2, 3,...,31) 的全排列的一种。 计算方法如下。
首先计算 PMT算法所用密钥 PMT—KEY:
AESCOLKEY (IDENTITY) =PMT— KEY:C0LKEY在 ID证书中给出。
然后用 PMi一 KEY作密钥,用 PMT算法对原序加密,求出列置换值 PERMUT:
PMTP„T_KEV(原序)=PERMUT:原序是 0,1, 31的自然序。 PERMUT 是新的经置换的序: σ ( 0, 1, ..., 31) =t0, tb t2, · · ., ΐ
假设 t。, t„ t2, ... , t31= (3, 6, 12,..., 5) , 则按 3, 6, 12, ..., 5 的新序取 用列变量。
比如,经过上述的行值计算和列值计算后,得到 32个行的行值为 ( 7, 13, 29,...,11) , 列置换值为 (3,6, 12,...,5),那么,在私钥计算基中取 用的变量为 s[7,3] ,s[13,6] ,s [29,12],...,s [11, 5] ; 在公钥计算基中 用 的变量为 P[7, 3] , P[13, 6], P[29, 12], ···, P[ll, 5]; 由于公钥计算和私钥计算时 的映射值相同,其取用位置完全相同,这就保证了公、 私钥的配对关系。 (3)作用域参数
作用域的划定是为了在认证网络中解决开放和封闭这一对矛盾,是实现逻 辑隔离的关键技术。设将认证网络分为 n层,为了说明方便,分三层,即作用域参 数分为省域、 市域、 县域。
省域是只在该省范围内起作用的参数; 如果不同省域间没有互联要求而完 全独立,那么就使用独立的计算基就行,可以不设省域参数。
市域是只在该市范围内起作用的参数; 在不同市域之间参数均不同。 县域作用域是只在该县范围内起作用的参数; 在不同县域之间参数均不 同。 这就满足分割的需求。
省城公钥参数保证省域范围内的交信,市域公钥参数保证该市域范围内的 交信,县城公钥参数保证该县域范围内的交信。 这就满足互通需求。
(4)密钥对的计算
设在互联网上的用户 A的地址为 abcde@yahoo. com,计算基大小为(32 X 32); 假设,行值为-
MAPoCUmod 32=map [i] Οθ, 1, . ., 15)
MAP, [I] mod 32=map [i] (i=16, 17, '··, 31) ;
列值为:
ΡΜΤΡΜΤ.ΚΕΪ (原序) = t。, t【, t2, · · ·, t31
那么,密钥管理中心为用户 A生产私钥时所用计算公式为:
SA- ( ¾ (s[[a t[i]]) +作用域参数) mod n; 各依赖方计算用户 A的公钥时所用计算公式为:
Figure imgf000007_0001
mod m; 将椭圆曲线密码的公、 私钥计算过程用离散对数密码模拟如下:
密钥管理中心为用户 A生产私钥时所用计算公式为:
s^ ( (5 )+作用域参数) mod m; 各依赖方计算用户 A的公钥时所用计算公式为:
Π (P[W, TRA X作用域参数) mod m; 到此,形成'了一个将邮件地址作标识的公钥和私钥对应关系。只有密钥管理 中心才保存有私钥计算基,因此私钥的生成只能在密钥管理中心进行;又因为公 钥计算基是公开的,所以任何依赖方只要知道对方的邮件地址都可以计算对方 的公钥。 因为公钥的计算是自动的,所以对用户来说,等于把对方的用户名 (标识) 直接当作公钥。
(5)公钥的存储
各用户只保留自己的私钥和公钥计算基,用于数字签名和密钥交换。设: 公 钥计算基的大小为(fX h),那么存储量为(fXh)个,而公钥量则为 (f)h。 下表列 出了计算基大小和公钥量的比较。 如当矩阵大小为(16X 64) =lk 时,存储量为 lk,而公钥量则为(16)64=2256-1077
Figure imgf000008_0001
由于需要存储的共用参数量非常有限,而且是公开变量,可存放在各种最方 便的媒介或地点。如直接写在个人 ID证书中发给每一个人,或公布在各网站上共 用。
(6) ID证书
ID证书由证书体和变量体构成。
根据本发明的证书体与一般证书差不多,主要定义用户基本属性,如姓名、 职务、 等级、 有效期、签发单位与签名等固定部分,因此不再论述。证书体 满足划分等级的分配式义务型 security (保密)安全策略。
变量体是认证卡的核心,具体配置有关密钥、参数变量,包含 n个不同标识和 n个作用域。 变 体包括以下 16段内容。 变量体满足划分角色的申请式自愿型 assurance (自保)安全策略。 验证参数项
1验证参数项 Z1 : 验证参数, Z2验证参数 角色标识定义项
2用户角色项 等级: 雇员,中层,高层,顾客
3标识定义项 姓名,单位,地址,电话,职务 '
4帐号定义项 帐号 1,帐号 2,··· 作用域项
5省域密钥 省域网共用密钥, 省域网行值密钥, 省域网列值密钥
6市域密钥 市域网共用密钥, 市域网行值密钥, 市域网列值密钥
7县域密钥 县域网共用密钥, 县域网行值密钥, 县域网列值密钥 私钥变量项
8省域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2···
9市域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2·'··
10县域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2··· 公钥变量项
11省域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2···
12市域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2···
13县域网私钥变量 姓名, 单位, 地址, 电话, 职务, 帐号 1, 帐号 2··· 证书签发项
14证书签发项 发放单位名, 发放单位签名 以上是变量体的主要组成部分,但可以将公钥计算基和备用密钥加进变量 体中。 公钥计算基项
15公钥计算基项 公钥计算基 备用密钥项
16备用密钥项 备用公钥 1, 备用公钥 2, 对通密钥 因此证书的组成形式有以下三种:
第一种形式: ID证书 =证书体 +变量体;
第二种形式: ID证书 =证书体 +变量体 +公钥计算基;
第三种形式: ID证书 =证书体 +变量体 +备用密钥;
(7 )实施系统示例
可以基于本发明构建一种可信认证系统,包括办公认证系统、 电话和邮件认证系 统、票据认证系'统、代理 (进程)认证系统等等。 系统大致分三大部分:后台程序, 客户端程序,标准化部分。
后台程序是密钥中心的程序, 密钥中心是管理的最高机构。在相应的安全策 略下,主要承担私钥的脱线生产任务。私钥生产需要配置私钥计算基,根据用户提 供的用户标识 (电话号码,邮件地址,个人帐号等) 生产相应私钥,并在用户口令 保护下记录在媒体中,以 ID证书方式发给用户使用,所述媒体例如是智能 IC卡。
客户端程序的关键部分存放在智能 IC卡中,它包括含有签名、 认证等功能的 智能 IC卡操作系统、公钥计算程序以及 ID证书。这样在智能 IC卡中就同时记录了 作为共用参数的公钥计算基和公钥计算程序。密钥中心统一生产、 自己发含有签 名、认证等功能'的智能 IC卡操作系统、公钥计算程序以及不同内容的 ID证书的智 能 IC卡。
因为密钥管理是相当复杂的系统工程,所以程序的系统适应性和证书的灵活 性是至关重要的。 认证网络有多种,如单层认证网络,多层认证网络,星状认证网 络, 格状认证网络等,应适应各种不同认证网络, ID证书格式要相同,但证书的内 容可不同。 代理(进程) 鉴别技术,只能用全软件实现,重点解决私钥的保护。
本发明的技术可以软件、 硬件或软件和硬件的结合来实现。 本发明的方法 可体现在若干程序指令中,这些指令被一个或多个处理器执行时可执行在此所描 述的方法,从而实现本发明的目的。
虽然在前述实施例中是以椭圆曲线密码以及离散对数密码为例,并结合了 一些具体的密钥生成过程来从标识和少量公用参数产生的公钥,但是本领域内 的技术人员将会认识到,基于本申请所公开的内容,可采用现在可获得以及将来 可能开发出的其他密码机制来从标识和少量公用参数产生公钥,因为本发明的 范围不局限于在此所公开的具体密码形式和产生机制,而包括其他可能的密码 形式和产生机制。

Claims

权利要求书
1. 一种用于根据用户标识产生非对称密钥对的方法,包括下述步骤:
生成彼此对应的私钥计算参数和公钥计算参数;
根据第一用户提供的标识,利用所述私钥计算参数计算第一用户的私钥;
将所产生的私钥提供给第一用户; 以及
公布所述公钥计算参数,以使得第二用户在获得第一用户的标识后,可根据第一用户 的标识,利用所述公钥计算参数,计算第一用户的公钥。
2. 如权利要求 1 所述的方法,其中:
产生所述公私钥计算参数时利用了椭圆曲线密码或离散对数密码; 并且
所述公私钥计算参数具有矩阵的形式;
3. 如权利要求 2所述的方法,其中: '
在计算所述公钥 /私钥时,对所述标识进行变换,定位所述公 /私钥计算参数矩阵中的 一个或多个元素,组合得到所述公 /私钥。
4. 如权利要求 1所¾1的方法,其中第一用户和第二用户是同一用户或不同用户。
5. 如权利要求 1所述的方法,其中,计算所述公钥和私钥时,在所述公钥计算参数和私钥计 算参数之外,还利用了具有分层结构的作用域参数。
6. 一种用于根据用户标识产生非对称密钥对的装置,包括:
一个或多个处理器以及存储器 , 所述处理器生成彼此对应的私钥计算参数和公钥计 算参数,将私钥计算参数存储在所述存储器中,根据第一用 户提供的标识为其计算私钥, 将所计算的私钥提供给该第一用户,并公布公钥计算参数,以使得第二用户可根据公布的公 钥计算参数和第一用户的标识,计算出第一用户的公钥。
7. 如权利要求 6所 的装置,其中:
产生所述公私钥计算参数时利用了'椭圆曲线密码或离散对数密码:并且
所述公钥计算参数和私钥计算参数具有矩阵的形式;
8. 如权利要求 7所述的装置,其中:
在计算所述公 /私钥时,对所述标识进行变换,定位所述公 /私钥计算参数矩阵中的一 个或多个元素,组合得到所述公 /私钥。
9. 如权利要求 6所述的装置,其中第一用户和第二用户是同一用户或不同用户。
10. 如权利要求 9所述的装置,其中,计算所述公钥和私钥时,在所述公钥计算参数和私钥计 算参数之外,还利用; Γ具有分层结构的作用域参数。
PCT/CN2006/000054 2005-01-14 2006-01-13 Procede et dispositif pour generer une cle privee sur la base d'un identifiant WO2006074611A1 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP06705476A EP1843509A4 (en) 2005-01-14 2006-01-13 METHOD AND DEVICE FOR PRODUCING PRIVATE KEYS BASED ON IDENTIFICATIONS
AU2006205987A AU2006205987B2 (en) 2005-01-14 2006-01-13 Identifier-based private key generating method and device
CA2593414A CA2593414C (en) 2005-01-14 2006-01-13 Identity-based key generating methods and devices
US11/795,264 US8229114B2 (en) 2005-01-14 2006-01-13 Identity-based key generating methods and devices
JP2007550662A JP2008527866A (ja) 2005-01-14 2006-01-13 識別情報に基づく暗号鍵方法及びデバイス

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510002156.4 2005-01-14
CNB2005100021564A CN1262087C (zh) 2005-01-14 2005-01-14 基于标识的密钥产生方法

Publications (1)

Publication Number Publication Date
WO2006074611A1 true WO2006074611A1 (fr) 2006-07-20

Family

ID=34852935

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/000054 WO2006074611A1 (fr) 2005-01-14 2006-01-13 Procede et dispositif pour generer une cle privee sur la base d'un identifiant

Country Status (8)

Country Link
US (1) US8229114B2 (zh)
EP (1) EP1843509A4 (zh)
JP (1) JP2008527866A (zh)
KR (1) KR100960578B1 (zh)
CN (1) CN1262087C (zh)
AU (1) AU2006205987B2 (zh)
CA (1) CA2593414C (zh)
WO (1) WO2006074611A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090048979A1 (en) * 2007-08-17 2009-02-19 Ahmed Ibrahim Al-Herz Token based new digital cash protocols
US20110173452A1 (en) * 2008-05-28 2011-07-14 Nan Xiang-Hao Method of generating compound type combined public key
US20140074721A1 (en) * 2012-09-10 2014-03-13 King Fahd University Of Petroleum And Minerals Hybrid virtual account and token-based digital cash protocols

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1262087C (zh) * 2005-01-14 2006-06-28 南相浩 基于标识的密钥产生方法
GB2434947B (en) * 2006-02-02 2011-01-26 Identum Ltd Electronic data communication system
CN1835434B (zh) * 2006-04-10 2012-07-18 北京易恒信认证科技有限公司 一种基于cpk安全认证的电子邮件系统和方法
CN1829150B (zh) * 2006-04-10 2011-06-01 北京易恒信认证科技有限公司 一种基于cpk的网关认证装置及方法
CN1831865B (zh) * 2006-04-24 2010-09-29 北京易恒信认证科技有限公司 一种基于cpk的电子银行安全认证系统和方法
CN100428261C (zh) * 2006-05-22 2008-10-22 北京易恒信科技认证有限公司 基于cpk的可信认证系统
CN101267301A (zh) * 2007-03-15 2008-09-17 上海贝尔阿尔卡特股份有限公司 通信网络中基于身份的认证和密钥协商方法及装置
CA2693133C (en) 2007-07-17 2014-10-14 Certicom Corp. Method and system for generating implicit certificates and applications to identity-based encryption (ibe)
CN101183938B (zh) * 2007-10-22 2011-11-23 华中科技大学 一种无线网络安全传输方法、系统及设备
CN101222325B (zh) * 2008-01-23 2010-05-12 西安西电捷通无线网络通信有限公司 一种基于id的无线多跳网络密钥管理方法
CN101567784B (zh) 2008-04-21 2016-03-30 华为数字技术(成都)有限公司 一种获取密钥的方法、系统和设备
CN101420300B (zh) * 2008-05-28 2013-05-29 北京易恒信认证科技有限公司 双因子组合公钥生成和认证方法
CN101420303B (zh) * 2008-12-12 2011-02-02 广州杰赛科技股份有限公司 一种语音数据的通信方法及其装置
US8341427B2 (en) * 2009-02-16 2012-12-25 Microsoft Corporation Trusted cloud computing and services framework
US9165154B2 (en) * 2009-02-16 2015-10-20 Microsoft Technology Licensing, Llc Trusted cloud computing and services framework
DE102009001719B4 (de) 2009-03-20 2011-02-10 Compugroup Holding Ag Verfahren zur Erzeugung von asymmetrischen kryptografischen Schlüsselpaaren
EP2348450B1 (en) 2009-12-18 2013-11-06 CompuGroup Medical AG Database system, computer system, and computer-readable storage medium for decrypting a data record
EP2348447B1 (en) 2009-12-18 2014-07-16 CompuGroup Medical AG A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
EP2348452B1 (en) 2009-12-18 2014-07-02 CompuGroup Medical AG A computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system
EP2365456B1 (en) 2010-03-11 2016-07-20 CompuGroup Medical SE Data structure, method and system for predicting medical conditions
CN101989984A (zh) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 电子文件安全共享系统及方法
CN101917710A (zh) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 移动互联网加密通讯的方法、系统及相关装置
CN102096778B (zh) * 2010-12-07 2013-01-23 中国科学院软件研究所 基于椭圆曲线和双线性对密码体制的直接匿名证明方法
KR101329007B1 (ko) * 2012-05-31 2013-11-12 삼성에스디에스 주식회사 아이디 기반 암호 시스템을 위한 비밀키 생성 장치 및 그 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체
CN103078736A (zh) * 2013-01-25 2013-05-01 匡创公司 一种多维度密钥生成方法
CN103260001A (zh) * 2013-04-03 2013-08-21 匡创公司 用于多媒体的自认证防护方法
CN104283860A (zh) * 2013-07-10 2015-01-14 全联斯泰克科技有限公司 一种基于代码签名的elf文件鉴别方法和装置
WO2015179020A2 (en) * 2014-03-27 2015-11-26 Ent Technologies, Inc. Generalized entity network translation (gent)
CN104200154A (zh) * 2014-09-22 2014-12-10 上海众人科技有限公司 一种基于标识的安装包签名方法及其装置
DE102015210734B4 (de) 2014-10-31 2021-03-04 Hewlett Packard Enterprise Development Lp Verwaltung kryptographischer schlüssel
CN105577373B (zh) * 2015-12-15 2018-10-19 四川长虹电器股份有限公司 标识密匙的生成方法
CN107239712A (zh) * 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 基于应用程序的用户信息的隐藏方法及装置
CN105790941B (zh) * 2016-04-22 2019-08-16 北京迪曼森科技有限公司 一种基于标识的具有域划分的组合密钥生成及认证方法
DE102016207635A1 (de) * 2016-05-03 2017-11-09 Siemens Aktiengesellschaft Verfahren und Vorrichtung zur Absicherung von Gerätezugriffen
KR101865703B1 (ko) * 2016-10-28 2018-06-08 삼성에스디에스 주식회사 키 생성 방법 및 장치, 암호화 장치 및 방법
US10341098B2 (en) * 2017-01-24 2019-07-02 Nxp B.V. Method of generating cryptographic key pairs
KR102432356B1 (ko) * 2017-03-23 2022-08-16 삼성에스디에스 주식회사 키 생성 장치 및 방법, 암호화 장치 및 방법
CN107682375A (zh) * 2017-11-21 2018-02-09 武汉珈港科技有限公司 一种密钥管理和动态密钥保护方法
CN109379194A (zh) * 2018-12-11 2019-02-22 西安慧博习兆信息技术有限公司 用标识密钥安全加解密、签署、传递文件的网络系统
WO2021076118A1 (en) * 2019-10-16 2021-04-22 Hewlett-Packard Development Company, L.P. Generating keys
CN113765666A (zh) * 2020-10-20 2021-12-07 北京沃东天骏信息技术有限公司 信息加密方法及装置
CN113259093B (zh) * 2021-04-21 2022-03-25 山东大学 基于身份基加密的层级签名加密系统与构建方法
WO2022265618A1 (en) * 2021-06-14 2022-12-22 Hewlett-Packard Development Company, L.P. Authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020021810A1 (en) * 2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic key exchange method using efficient elliptic curve
CN1505306A (zh) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 椭圆曲线加密解密方法和装置
CN1505313A (zh) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 椭圆曲线签名和验证签名方法和装置
JP2004201124A (ja) * 2002-12-19 2004-07-15 Murata Mach Ltd 公開鍵暗号方法,署名方法,暗号通信システム及びコンピュータプログラム
US20050010801A1 (en) 2003-06-25 2005-01-13 Terence Spies Identity-based-encryption messaging system with public parameter host servers

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000124887A (ja) * 1998-10-14 2000-04-28 Fuji Xerox Co Ltd グループ単位の暗号化・復号方法および署名方法ならびに装置
US7239701B1 (en) * 2000-05-02 2007-07-03 Murata Machinery Ltd. Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem
EP2429116B1 (en) * 2001-08-13 2013-07-10 The Board of Trustees of the Leland Stanford Junior University Method for identity-based encryption and related crytographic techniques
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
US7571321B2 (en) * 2003-03-14 2009-08-04 Voltage Security, Inc. Identity-based-encryption messaging system
KR100561847B1 (ko) * 2003-10-08 2006-03-16 삼성전자주식회사 공개키를 이용한 데이터 암호화 및 복호화 방법
US7103911B2 (en) * 2003-10-17 2006-09-05 Voltage Security, Inc. Identity-based-encryption system with district policy information
JP4546231B2 (ja) * 2004-12-09 2010-09-15 株式会社日立製作所 Idベース署名及び暗号化システムおよび方法
CN1262087C (zh) * 2005-01-14 2006-06-28 南相浩 基于标识的密钥产生方法
CN101340282B (zh) * 2008-05-28 2011-05-11 北京易恒信认证科技有限公司 复合公钥的生成方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020021810A1 (en) * 2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic key exchange method using efficient elliptic curve
CN1505306A (zh) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 椭圆曲线加密解密方法和装置
CN1505313A (zh) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 椭圆曲线签名和验证签名方法和装置
JP2004201124A (ja) * 2002-12-19 2004-07-15 Murata Mach Ltd 公開鍵暗号方法,署名方法,暗号通信システム及びコンピュータプログラム
US20050010801A1 (en) 2003-06-25 2005-01-13 Terence Spies Identity-based-encryption messaging system with public parameter host servers

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
BONEH ET AL.: "CRYPTO 2001, Proc.", 2001, SPRINGER, article "Adv. in Cryptology", pages: 213 - 229
See also references of EP1843509A4
SWEE-HUAY HENG ET AL.: "CT-RSA", 2004, SPRINGER, article "Topics in Cryptology", pages: 67 - 80
TANG W., NAN X., CHEN Z.: "Elliptic Curve Cryptography-based Combined Public Key Technique", COMPUTER ENGINEERING AND APPLICATION, 2003, XP008090713 *
TANG WEN ET AL., COMP. ENG. AND APPL., vol. 39, no. 21, pages 1 - 3

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090048979A1 (en) * 2007-08-17 2009-02-19 Ahmed Ibrahim Al-Herz Token based new digital cash protocols
US20110302088A1 (en) * 2007-08-17 2011-12-08 King Fahd University Of Petroleum And Minerals Token based new digital cash protocols
US8160966B2 (en) * 2007-08-17 2012-04-17 King Fahd University Of Petroleum And Minerals Token based new digital cash protocols
US20110173452A1 (en) * 2008-05-28 2011-07-14 Nan Xiang-Hao Method of generating compound type combined public key
US20140074721A1 (en) * 2012-09-10 2014-03-13 King Fahd University Of Petroleum And Minerals Hybrid virtual account and token-based digital cash protocols
US9171324B2 (en) * 2012-09-10 2015-10-27 King Fahd University Of Petroleum And Minerals Hybrid virtual account and token-based digital cash protocols

Also Published As

Publication number Publication date
KR20070096014A (ko) 2007-10-01
US20080267394A1 (en) 2008-10-30
CA2593414C (en) 2014-12-16
AU2006205987B2 (en) 2011-04-28
JP2008527866A (ja) 2008-07-24
EP1843509A1 (en) 2007-10-10
US8229114B2 (en) 2012-07-24
AU2006205987A1 (en) 2006-07-20
EP1843509A4 (en) 2010-01-13
CA2593414A1 (en) 2006-07-20
CN1262087C (zh) 2006-06-28
CN1633071A (zh) 2005-06-29
KR100960578B1 (ko) 2010-06-03

Similar Documents

Publication Publication Date Title
WO2006074611A1 (fr) Procede et dispositif pour generer une cle privee sur la base d'un identifiant
CN113014392B (zh) 基于区块链的数字证书管理方法及系统、设备、存储介质
JP5933786B2 (ja) Idベース暗号化および関連する暗号手法のシステムおよび方法
JP5265744B2 (ja) 導出鍵を用いたセキュアメッセージングシステム
Adams et al. Understanding PKI: concepts, standards, and deployment considerations
RU2512139C2 (ru) Способ и устройство для генерации и аутентификации псевдонима
WO2009143713A1 (zh) 双因子组合公钥生成和认证方法
WO2011163044A2 (en) A method and apparatus for key revocation in an attribute-based encryption scheme
JP2010161826A (ja) 証明書に基づく暗号化および公開鍵構造基盤
US20220020020A1 (en) Methods, systems, and devices for managing digital assets
Xu et al. A secure EMR sharing system with tamper resistance and expressive access control
CN108712259A (zh) 基于身份的可代理上传数据的云存储高效审计方法
CN110519040B (zh) 基于身份的抗量子计算数字签名方法和系统
Thilakanathan et al. Secure multiparty data sharing in the cloud using hardware-based TPM devices
Suveetha et al. Ensuring confidentiality of cloud data using homomorphic encryption
CN112950356B (zh) 基于数字身份的个人贷款处理方法及系统、设备、介质
Patel et al. The study of digital signature authentication process
Sowmiya et al. Secure cloud storage model with hidden policy attribute based access control
Kumar et al. ASP: advanced security protocol for security and privacy in cloud computing
Tanwar et al. Design and Implementation of Database Security for Various type of Digital Signature
HariPriya et al. An Efficient Cloud Storage with Secure Dynamic Data Modification
REDDY et al. Two-Factor Data Security Preservation System for Cloud Storage
Scholar Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud
Malek et al. A new scheme for securing mobile agents
Grimm Security for open communication: The DFN mail security project report

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2593414

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007550662

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2006205987

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2006705476

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020077018357

Country of ref document: KR

ENP Entry into the national phase

Ref document number: 2006205987

Country of ref document: AU

Date of ref document: 20060113

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2006205987

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 2006705476

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 11795264

Country of ref document: US