[go: up one dir, main page]

BR9809664A - Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos - Google Patents

Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos

Info

Publication number
BR9809664A
BR9809664A BR9809664-8A BR9809664A BR9809664A BR 9809664 A BR9809664 A BR 9809664A BR 9809664 A BR9809664 A BR 9809664A BR 9809664 A BR9809664 A BR 9809664A
Authority
BR
Brazil
Prior art keywords
code
public
cryptosystem
accredited
private
Prior art date
Application number
BR9809664-8A
Other languages
English (en)
Inventor
Adan Lucas Young
Marcel Mordechay Yung
Original Assignee
Adan Lucas Young
Marcel Mordechay Yung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/864,839 external-priority patent/US6202150B1/en
Priority claimed from US08/878,189 external-priority patent/US6122742A/en
Priority claimed from US08/920,504 external-priority patent/US6243466B1/en
Priority claimed from US08/932,639 external-priority patent/US6389136B1/en
Priority claimed from US08/959,351 external-priority patent/US6282295B1/en
Application filed by Adan Lucas Young, Marcel Mordechay Yung filed Critical Adan Lucas Young
Publication of BR9809664A publication Critical patent/BR9809664A/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

"PROCESSO E APARELHO COMPREENDENDO UM CRIPTOSSISTEMA QUE PODE SER USADO PARA GERAR, VERIFICAR, USAR, E RECUPERAR CóDIGOS CRIPTOGRáFICOS". é provido um processo para um criptossistema de depósito que é livre de sobrecarga, não requer uma implementação de "hardware" à prova de controle criptográfico (isto é, pode ser feito em "software"), é publicamente verificáveis e não pode ser usado subliminalmente para habilitar um sistema de código público imagem. Um sistema de código público imagem é um código público não submetido a depósito que é publicamente exibido de um modo oculto. Os códigos gerados pelo processo são auto-recuperáveis e auto-certificáveis (abreviado ARC). O Criptossistema ARC é baseado em um mecanismo de geração de código que emite um par de código público/privado, e um certificado de prova de que o código foi gerado de acordo com o algoritmo. Cada par de código público gerado pode ser verificado eficientemente para ser submetido a depósito adequadamente por qualquer um. O procedimento de verificação não usa o código privado. Daí, o público geral possui um modo eficiente de se tornar seguro de qualquer código privado individual dado é submetido adequadamente a depósito, e as autoridades acreditadas serão capazes de acessar o código privado, se necessário. Uma vez que a verificação pode ser efetuada por qualquer um, não há necessidade de uma entidade acreditada especial, conhecida na técnica como uma "terceira parte acreditada". O criptossistema é livre de sobrecarga, uma vez que não há interação de protocolo adicional entre o usuário que gera seu próprio código e a autoridade de certificação ou autoridades depositárias, em comparação ao que é requerido para submeter o próprio código público em sistemas de código público regulares certificados. Ainda mais, o sistema é projetado de tal modo que seus internos podem ser tornados publicamente escrutináveis (por exemplo, podem ser distribuídos na forma de código fonte). Isto difere de alguns esquemas que requerem que o dispositivo de depósito seja de "hardware" à prova de controle.
BR9809664-8A 1997-05-28 1998-05-21 Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos BR9809664A (pt)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US08/864,839 US6202150B1 (en) 1997-05-28 1997-05-28 Auto-escrowable and auto-certifiable cryptosystems
US08/878,189 US6122742A (en) 1997-06-18 1997-06-18 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys
US08/920,504 US6243466B1 (en) 1997-08-29 1997-08-29 Auto-escrowable and auto-certifiable cryptosystems with fast key generation
US08/932,639 US6389136B1 (en) 1997-05-28 1997-09-17 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys
US08/959,351 US6282295B1 (en) 1997-10-28 1997-10-28 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers
PCT/US1998/010392 WO1998054864A2 (en) 1997-05-28 1998-05-21 Auto-recoverable auto-certifiable cryptosystems

Publications (1)

Publication Number Publication Date
BR9809664A true BR9809664A (pt) 2000-09-05

Family

ID=27542270

Family Applications (1)

Application Number Title Priority Date Filing Date
BR9809664-8A BR9809664A (pt) 1997-05-28 1998-05-21 Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos

Country Status (13)

Country Link
EP (1) EP0997017A2 (pt)
JP (1) JP2002500842A (pt)
KR (1) KR20010013155A (pt)
CN (1) CN1241353C (pt)
AU (1) AU737037B2 (pt)
BR (1) BR9809664A (pt)
CA (1) CA2290952A1 (pt)
CZ (1) CZ9904106A3 (pt)
IL (1) IL132961A0 (pt)
NO (1) NO995811L (pt)
NZ (1) NZ501273A (pt)
PL (1) PL338018A1 (pt)
WO (1) WO1998054864A2 (pt)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6473508B1 (en) * 1998-12-22 2002-10-29 Adam Lucas Young Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys
KR20010108151A (ko) * 1999-01-29 2001-12-07 션 엘. 맥클린톡 Cta 사이의 콜 패킷과 시그널링을 보호하기 위해 전화호출에 대한 키를 관리하는 방법 및 장치
US7139917B2 (en) * 2000-06-05 2006-11-21 Phoenix Technologies Ltd. Systems, methods and software for remote password authentication using multiple servers
WO2004032557A1 (en) * 2002-10-07 2004-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Security and privacy enhancements for security devices
US7577659B2 (en) * 2003-10-24 2009-08-18 Microsoft Corporation Interoperable credential gathering and access modularity
US7721340B2 (en) * 2004-06-12 2010-05-18 Microsoft Corporation Registry protection
CN102013983B (zh) * 2010-11-26 2012-08-22 中国科学院软件研究所 一种基于强rsa假设的数字签名方法
EP4383643A3 (en) * 2016-02-23 2024-09-11 nChain Licensing AG Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
IL278834B2 (en) 2016-02-23 2023-09-01 Nchain Holdings Ltd Automatic registration and management method for smart contracts based on 'block chain'
WO2017145002A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Personal device security using elliptic curve cryptography for secret sharing
US11625694B2 (en) 2016-02-23 2023-04-11 Nchain Licensing Ag Blockchain-based exchange with tokenisation
GB2561465B (en) 2016-02-23 2021-12-08 Nchain Holdings Ltd A method and system for securing computer software using a distributed hash table and a blockchain
EA201891832A1 (ru) 2016-02-23 2019-02-28 Нчейн Холдингс Лимитед Универсальная система токенизации для криптовалют на основе блокчейна
KR102799781B1 (ko) 2016-02-23 2025-04-23 엔체인 홀딩스 리미티드 안전한 정보 교환과 계층 구조적이고 결정론적인 암호키를 위한 공통 비밀 결정
CA3014737A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Blockchain-implemented method for control and distribution of digital content
CN109155035B (zh) 2016-02-23 2023-07-04 区块链控股有限公司 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统
HK1259177A1 (zh) 2016-02-23 2019-11-29 nChain Holdings Limited 一种实现区块链上交换的通证化方法及系统
KR102861293B1 (ko) 2016-02-23 2025-09-18 엔체인 라이센싱 아게 블록체인 시스템 내에서 피드백을 통합하는 에이전트 기반의 튜링 완전 거래
US11727501B2 (en) 2016-02-23 2023-08-15 Nchain Licensing Ag Cryptographic method and system for secure extraction of data from a blockchain
KR20180115766A (ko) 2016-02-23 2018-10-23 엔체인 홀딩스 리미티드 스마트 계약에 기초한 자동화 페이롤 방법 및 시스템을 초래하는, 블록체인 상에서 페이롤에 연관된 암호화폐를 효율적으로 전달하는 방법 및 시스템
CN113641986B (zh) * 2021-08-27 2024-04-02 上海金融期货信息技术有限公司 基于SoftHSM实现联盟链用户私钥托管方法与系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ329891A (en) * 1994-01-13 2000-01-28 Certco Llc Method of upgrading firmware of trusted device using embedded key
US5666414A (en) * 1996-03-21 1997-09-09 Micali; Silvio Guaranteed partial key-escrow
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system

Also Published As

Publication number Publication date
CN1262007A (zh) 2000-08-02
CN1241353C (zh) 2006-02-08
AU737037B2 (en) 2001-08-09
WO1998054864A2 (en) 1998-12-03
CA2290952A1 (en) 1998-12-03
PL338018A1 (en) 2000-09-25
NO995811L (no) 2000-01-27
EP0997017A2 (en) 2000-05-03
WO1998054864A3 (en) 1999-05-14
JP2002500842A (ja) 2002-01-08
CZ9904106A3 (cs) 2001-08-15
IL132961A0 (en) 2001-03-19
KR20010013155A (ko) 2001-02-26
AU8656498A (en) 1998-12-30
NO995811D0 (no) 1999-11-26
NZ501273A (en) 2001-09-28

Similar Documents

Publication Publication Date Title
BR9809664A (pt) Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos
US11620387B2 (en) Host attestation
US6209091B1 (en) Multi-step digital signature method and system
EP0872080B1 (en) Multi-step digital signature method and system
HUP0002700A3 (en) Auto-recoverable auto-certifiable cryptosystems
US20090217034A1 (en) Multi-step digital signature method and system
US10129034B2 (en) Signature delegation
US10243939B2 (en) Key distribution in a distributed computing environment
Nist The digital signature standard
Miller et al. Strong Security for {Network-Attached} Storage
US7073056B2 (en) Apparatus and method for demonstrating and confirming the status of digital certificates and other data
US6339824B1 (en) Method and apparatus for providing public key security control for a cryptographic processor
US7526644B2 (en) Apparatus and method for demonstrating and confirming the status of digital certificates and other data
US11212082B2 (en) Ciphertext based quorum cryptosystem
US10237249B2 (en) Key revocation
CN118520513A (zh) 生成阈值库的计算机实现方法
IL167140A (en) Method and system of securely escrowing private keys in a public key infrastructure
EP1599965A1 (en) Long-term secure digital signatures
WO2003007203A2 (en) System and method for renewing and extending digitally signed certificates
US20170104745A1 (en) Password-based authentication in server systems
CN115380502A (zh) 从备份存储器中恢复分布式密钥
Hartung Attacks on secure logging schemes
Byrd et al. Yalta: A secure collaborative space for dynamic coalitions
EP4546704A1 (en) Improved redundancy protection by way of cloning stateful private keys suitable for protecting against quantum computer attacks using an hsm
US7035403B2 (en) Encryption method and apparatus with escrow guarantees

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 6A,7A,8A E 9A ANUIDADES

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 1909 DE 07/08/2007.