WO2006078557A3 - Authentication protocol using a multi-factor asymmetric key pair - Google Patents
Authentication protocol using a multi-factor asymmetric key pair Download PDFInfo
- Publication number
- WO2006078557A3 WO2006078557A3 PCT/US2006/001258 US2006001258W WO2006078557A3 WO 2006078557 A3 WO2006078557 A3 WO 2006078557A3 US 2006001258 W US2006001258 W US 2006001258W WO 2006078557 A3 WO2006078557 A3 WO 2006078557A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- message
- key pair
- asymmetric key
- authentication protocol
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
Techniques for user authentication based upon an asymmetric key pair having a public key and a split private key are provided. A first portion of the split private key is generated based upon multiple factors under control of the user (820, 825). The factors include a password (820). A challenge is cryptographically combined with a first one of the multiple factors, but not the user password, to form a first message (841). The first message is transformed with the generated first portion to form a second message, which is then sent to an authentication entity (850). The sent second message is transformed to authenticate the user by proving direct verification of user control of the first factor (855).
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64402805P | 2005-01-18 | 2005-01-18 | |
US60/644,028 | 2005-01-18 | ||
US11/055,988 US7386720B2 (en) | 2005-02-14 | 2005-02-14 | Authentication protocol using a multi-factor asymmetric key pair |
US11/055,988 | 2005-02-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006078557A2 WO2006078557A2 (en) | 2006-07-27 |
WO2006078557A3 true WO2006078557A3 (en) | 2008-01-03 |
Family
ID=36692746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/001258 WO2006078557A2 (en) | 2005-01-18 | 2006-01-13 | Authentication protocol using a multi-factor asymmetric key pair |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006078557A2 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768388A (en) * | 1996-03-01 | 1998-06-16 | Goldwasser; Shafi | Time delayed key escrow |
US6072876A (en) * | 1996-07-26 | 2000-06-06 | Nippon Telegraph And Telephone Corporation | Method and system for depositing private key used in RSA cryptosystem |
US6542608B2 (en) * | 1997-02-13 | 2003-04-01 | Tecsec Incorporated | Cryptographic key split combiner |
US20050002532A1 (en) * | 2002-01-30 | 2005-01-06 | Yongxin Zhou | System and method of hiding cryptographic private keys |
US7260552B2 (en) * | 2001-12-12 | 2007-08-21 | Scytl Online World Security, Sa | Secure remote electronic voting system and cryptographic protocols and computer programs employed |
-
2006
- 2006-01-13 WO PCT/US2006/001258 patent/WO2006078557A2/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768388A (en) * | 1996-03-01 | 1998-06-16 | Goldwasser; Shafi | Time delayed key escrow |
US6072876A (en) * | 1996-07-26 | 2000-06-06 | Nippon Telegraph And Telephone Corporation | Method and system for depositing private key used in RSA cryptosystem |
US6542608B2 (en) * | 1997-02-13 | 2003-04-01 | Tecsec Incorporated | Cryptographic key split combiner |
US7260552B2 (en) * | 2001-12-12 | 2007-08-21 | Scytl Online World Security, Sa | Secure remote electronic voting system and cryptographic protocols and computer programs employed |
US20050002532A1 (en) * | 2002-01-30 | 2005-01-06 | Yongxin Zhou | System and method of hiding cryptographic private keys |
Also Published As
Publication number | Publication date |
---|---|
WO2006078557A2 (en) | 2006-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006130616A3 (en) | Augmented single factor split key asymmetric cryptography-key generation and distributor | |
WO2006119184A3 (en) | Protecting one-time-passwords against man-in-the-middle attacks | |
WO2004092886A3 (en) | Associating software with hardware using cryptography | |
WO2008121157A3 (en) | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
EP2348446A3 (en) | A computer implemented method for authenticating a user | |
WO2006078558A3 (en) | Multiple factor private portion of an asymmetric key | |
TW200704103A (en) | Small public-key based digital signatures for authentication | |
WO2008066671A3 (en) | Indentity-based-encryption extensions formed using multiple instances of an identity based encryption scheme | |
WO2006078430A3 (en) | Wireless network credential provisioning | |
WO2009002705A3 (en) | Device provisioning and domain join emulation over non-secured networks | |
WO2006050152A3 (en) | Secure collaborative terminal identity authentication between a wireless communication device and a wireless operator | |
WO2007027241A3 (en) | Multi-key cryptographically generated address | |
WO2007011991A3 (en) | Hybrid symmetric/asymmetric cryptography with user authentication | |
WO2011017099A3 (en) | Secure communication using asymmetric cryptography and light-weight certificates | |
WO2005008442A3 (en) | Ticket-based secure time delivery in digital networks | |
BRPI0419162A (en) | secure and authenticated channel | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
WO2006133413A3 (en) | Method and apparatus for establishing a key agreement protocol | |
WO2012154367A3 (en) | Secure user credential control | |
WO2005101722A3 (en) | Asynchronous enhanced shared secret provisioning protocol | |
WO2012023122A3 (en) | Authentication device and system | |
WO2010105915A3 (en) | Method for providing a cryptic pair of keys | |
WO2010046565A3 (en) | Method for two step digital signature | |
GB201300412D0 (en) | Resource access management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06718345 Country of ref document: EP Kind code of ref document: A2 |