[go: up one dir, main page]

DE60313704D1 - Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels - Google Patents

Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels

Info

Publication number
DE60313704D1
DE60313704D1 DE60313704T DE60313704T DE60313704D1 DE 60313704 D1 DE60313704 D1 DE 60313704D1 DE 60313704 T DE60313704 T DE 60313704T DE 60313704 T DE60313704 T DE 60313704T DE 60313704 D1 DE60313704 D1 DE 60313704D1
Authority
DE
Germany
Prior art keywords
generating
secret key
secret
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60313704T
Other languages
English (en)
Other versions
DE60313704T2 (de
Inventor
Liquin Chen
Keith Alexander Harrison
David Soldera
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Publication of DE60313704D1 publication Critical patent/DE60313704D1/de
Application granted granted Critical
Publication of DE60313704T2 publication Critical patent/DE60313704T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
DE60313704T 2002-07-05 2003-07-04 Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels Expired - Lifetime DE60313704T2 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0215524.0A GB0215524D0 (en) 2002-07-05 2002-07-05 Method and apparatus for generating a cryptographic key
GB0215524 2002-07-05

Publications (2)

Publication Number Publication Date
DE60313704D1 true DE60313704D1 (de) 2007-06-21
DE60313704T2 DE60313704T2 (de) 2008-01-17

Family

ID=9939859

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60313704T Expired - Lifetime DE60313704T2 (de) 2002-07-05 2003-07-04 Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels

Country Status (4)

Country Link
US (1) US7397917B2 (de)
EP (1) EP1379024B1 (de)
DE (1) DE60313704T2 (de)
GB (2) GB0215524D0 (de)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) * 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
GB0215590D0 (en) * 2002-07-05 2002-08-14 Hewlett Packard Co Method and apparatus for generating a cryptographic key
US20050089173A1 (en) * 2002-07-05 2005-04-28 Harrison Keith A. Trusted authority for identifier-based cryptography
SG145524A1 (en) * 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
CA2458123C (en) * 2003-03-13 2012-05-15 Synodon Inc. Remote sensing of gas leaks
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US7769167B2 (en) 2003-07-25 2010-08-03 Microsoft Corporation Weil and Tate pairing techniques using parabolas
US7298839B2 (en) 2003-07-25 2007-11-20 Microsoft Corporation Squared Weil and Tate pairing techniques for use with elliptic curves
US7440569B2 (en) * 2003-07-28 2008-10-21 Microsoft Corporation Tate pairing techniques for use with hyperelliptic curves
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
KR100571820B1 (ko) * 2003-10-20 2006-04-17 삼성전자주식회사 신원 정보를 기반으로 하는 암호 시스템에서의 컨퍼런스세션 키 분배 방법
CN102868528B (zh) * 2003-10-28 2015-09-09 塞尔蒂卡姆公司 一种公开密钥的可验证生成的设备和对应认证中心
GB0325527D0 (en) * 2003-11-01 2003-12-03 Hewlett Packard Development Co Identifier-based signcryption
EP1533971A1 (de) * 2003-11-18 2005-05-25 STMicroelectronics S.r.l. Vorrichtung und Verfahren zum Aufbau einer sicheren Kommunikation
DE60315853D1 (de) * 2003-12-24 2007-10-04 St Microelectronics Srl Verfahren zur Entschlüsselung einer Nachricht
GB2416282B (en) * 2004-07-15 2007-05-16 Hewlett Packard Development Co Identifier-based signcryption with two trusted authorities
GB2419787B (en) * 2004-10-28 2007-07-04 Hewlett Packard Development Co Method and apparatus for providing short-term private keys in public-key cryptographic systems
EP1813051B1 (de) 2004-11-12 2017-09-13 Dublin City University Auf identität basierende verschlüsselung
EP1675299B1 (de) * 2004-12-23 2018-08-01 Hewlett-Packard Development Company, L.P. Authentifizierungsverfahren unter Verwendung bilinearer Abbildungen
ATE533103T1 (de) * 2005-01-18 2011-11-15 Certicom Corp Beschleunigte verifikation digitaler signaturen und öffentlicher schlüssel
US7680268B2 (en) 2005-03-15 2010-03-16 Microsoft Corporation Elliptic curve point octupling using single instruction multiple data processing
US7702098B2 (en) * 2005-03-15 2010-04-20 Microsoft Corporation Elliptic curve point octupling for weighted projective coordinates
US8180047B2 (en) * 2006-01-13 2012-05-15 Microsoft Corporation Trapdoor pairings
US8234505B2 (en) * 2006-01-20 2012-07-31 Seagate Technology Llc Encryption key in a storage system
JP4664850B2 (ja) * 2006-03-30 2011-04-06 株式会社東芝 鍵生成装置、プログラム及び方法
CN105450396B (zh) * 2016-01-11 2017-03-29 长沙市迪曼森信息科技有限公司 一种无证书的组合密钥产生及应用方法
CN105915520B (zh) * 2016-04-18 2019-02-12 深圳大学 基于公钥可搜索加密的文件存储、搜索方法及存储系统
US10341098B2 (en) * 2017-01-24 2019-07-02 Nxp B.V. Method of generating cryptographic key pairs
EP3379766B1 (de) * 2017-03-20 2019-06-26 Huawei Technologies Co., Ltd. Drahtloskommunikationsvorrichtung für kommunikation in einem drahtloskommunikationsnetz
EP3664005B1 (de) * 2017-06-07 2021-12-08 Nchain Holdings Limited Verfahren und system zur erzeugung und verteilung von zugangsdaten für ein blockchain-netzwerk

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5272755A (en) * 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5917911A (en) * 1997-01-23 1999-06-29 Motorola, Inc. Method and system for hierarchical key access and recovery
NL1005919C1 (nl) 1997-04-28 1998-10-29 Eric Robert Verheul Een methode voor Publiekelijk verifieerbare örecoveryö van Diffie-Hellman, RSA en Rabin gerelateerde asymmetrische versleuteling.
IL125222A0 (en) 1998-07-06 1999-03-12 L P K Information Integrity Lt A key-agreement system and method
JP2001320356A (ja) 2000-02-29 2001-11-16 Sony Corp 公開鍵系暗号を使用したデータ通信システムおよびデータ通信システム構築方法
US20020049910A1 (en) * 2000-07-25 2002-04-25 Salomon Allen Michael Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage and exchange of information
JP3588042B2 (ja) 2000-08-30 2004-11-10 株式会社日立製作所 証明書の有効性確認方法および装置
US7149310B2 (en) * 2000-12-19 2006-12-12 Tricipher, Inc. Method and system for authorizing generation of asymmetric crypto-keys
ATE465571T1 (de) 2001-08-13 2010-05-15 Univ Leland Stanford Junior Systeme und verfahren zur verschlüsselung auf identitätsbasis und damit zusammenhängende kryptografische techniken
CA2365441C (en) * 2001-12-19 2010-02-16 Diversinet Corp. Method of establishing secure communications in a digital network using pseudonymic digital identifiers
US7353395B2 (en) * 2002-03-21 2008-04-01 Ntt Docomo Inc. Authenticated ID-based cryptosystem with no key escrow
US7349538B2 (en) * 2002-03-21 2008-03-25 Ntt Docomo Inc. Hierarchical identity-based encryption and signature schemes

Also Published As

Publication number Publication date
US7397917B2 (en) 2008-07-08
GB0315697D0 (en) 2003-08-13
EP1379024A1 (de) 2004-01-07
US20040131191A1 (en) 2004-07-08
GB2390516A (en) 2004-01-07
GB0215524D0 (en) 2002-08-14
EP1379024B1 (de) 2007-05-09
DE60313704T2 (de) 2008-01-17

Similar Documents

Publication Publication Date Title
DE60313704D1 (de) Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels
DE60231473D1 (de) Verfahren und vorrichtung zur erzeugung eines magnetfeldes
DE60205756T2 (de) Verfahren und Vorrichtung zur Erzeugung eines GPS Simulationsszenarios
DE50007158D1 (de) Vorrichtung und verfahren zur erzeugung eines reduktionsmittel-luftgemisches
DE60333327D1 (de) Verfahren, System und Vorrichtung zum Authentifizieren eines elektronischen Wertes
DE60016589D1 (de) Verfahren und vorrichtung zur erzeugung eines zusammengesetzten fingerabdruckbildes
DE60119410D1 (de) Vorrichtung und Verfahren zur Blockverschlüsselung und zur Entschlüsselung
DE602004008147D1 (de) Vorrichtung zur kombinierten Energieerzeugung und Entsalzung sowie dazugehöriges Verfahren
DE60138083D1 (de) Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion
DE50105721D1 (de) Vorrichtung und verfahren zur erzeugung von atmungsbedingten messdaten
DE602004014672D1 (de) Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung
DE60107634D1 (de) Verfahren und Vorrichtung zur Authentifizierung der Gültigkeit eines Zertifikats
DE60010220D1 (de) Verfahren und Vorrichtung zur Erzeugung und Verwendung eines virenfreien Dateizertifikats
DE60108252D1 (de) Verfahren und vorrichtung zur erzeugung von nanostrukturen
ATE411843T1 (de) Verfahren und vorrichtung zur behandlung eines einsatzgases
DE60121284D1 (de) Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion
DE60037411D1 (de) Verfahren und vorrichtung zur erzeugung eines rahmensynchronisierungswortes und überprüfung des rahmensynchronisierungswortes in einem w-cdma system
DE602004015710D1 (de) Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung
DE60026189D1 (de) Verfahren und Vorrichtung zur Wellenformkomprimierung und Erzeugung
DE60027531D1 (de) Verfahren und Vorrichtung zur Schlüsselverteilung unter Verwendung eines Basisschlüssels
DE60306247D1 (de) Vorrichtung und Verfahren zum Sterilisieren
DE60315538D1 (de) Vorrichtung und Verfahren zur Erzeugung von Gas in einer Brennstoffzelle
DE60303556D1 (de) Vorrichtung und Verfahren zur Kontrolle eines Gassacks
DE60125673D1 (de) Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion
DE60212248D1 (de) Informationssicherheitsvorrichtung, Vorrichtung und Verfahren zur Erzeugung einer Primzahl

Legal Events

Date Code Title Description
8364 No opposition during term of opposition