DE60313704D1 - Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels - Google Patents
Verfahren und Vorrichtung zur Erzeugung eines GeheimschlüsselsInfo
- Publication number
- DE60313704D1 DE60313704D1 DE60313704T DE60313704T DE60313704D1 DE 60313704 D1 DE60313704 D1 DE 60313704D1 DE 60313704 T DE60313704 T DE 60313704T DE 60313704 T DE60313704 T DE 60313704T DE 60313704 D1 DE60313704 D1 DE 60313704D1
- Authority
- DE
- Germany
- Prior art keywords
- generating
- secret key
- secret
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB0215524.0A GB0215524D0 (en) | 2002-07-05 | 2002-07-05 | Method and apparatus for generating a cryptographic key |
| GB0215524 | 2002-07-05 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| DE60313704D1 true DE60313704D1 (de) | 2007-06-21 |
| DE60313704T2 DE60313704T2 (de) | 2008-01-17 |
Family
ID=9939859
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE60313704T Expired - Lifetime DE60313704T2 (de) | 2002-07-05 | 2003-07-04 | Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US7397917B2 (de) |
| EP (1) | EP1379024B1 (de) |
| DE (1) | DE60313704T2 (de) |
| GB (2) | GB0215524D0 (de) |
Families Citing this family (44)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
| US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
| US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
| US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
| US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
| US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
| US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
| US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
| US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
| US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
| US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
| US8176334B2 (en) * | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
| GB0215590D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
| US20050089173A1 (en) * | 2002-07-05 | 2005-04-28 | Harrison Keith A. | Trusted authority for identifier-based cryptography |
| SG145524A1 (en) * | 2002-08-07 | 2008-09-29 | Mobilastic Technologies Pte Lt | Secure transfer of digital tokens |
| CA2458123C (en) * | 2003-03-13 | 2012-05-15 | Synodon Inc. | Remote sensing of gas leaks |
| US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
| US7769167B2 (en) | 2003-07-25 | 2010-08-03 | Microsoft Corporation | Weil and Tate pairing techniques using parabolas |
| US7298839B2 (en) | 2003-07-25 | 2007-11-20 | Microsoft Corporation | Squared Weil and Tate pairing techniques for use with elliptic curves |
| US7440569B2 (en) * | 2003-07-28 | 2008-10-21 | Microsoft Corporation | Tate pairing techniques for use with hyperelliptic curves |
| US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
| US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
| KR100571820B1 (ko) * | 2003-10-20 | 2006-04-17 | 삼성전자주식회사 | 신원 정보를 기반으로 하는 암호 시스템에서의 컨퍼런스세션 키 분배 방법 |
| CN102868528B (zh) * | 2003-10-28 | 2015-09-09 | 塞尔蒂卡姆公司 | 一种公开密钥的可验证生成的设备和对应认证中心 |
| GB0325527D0 (en) * | 2003-11-01 | 2003-12-03 | Hewlett Packard Development Co | Identifier-based signcryption |
| EP1533971A1 (de) * | 2003-11-18 | 2005-05-25 | STMicroelectronics S.r.l. | Vorrichtung und Verfahren zum Aufbau einer sicheren Kommunikation |
| DE60315853D1 (de) * | 2003-12-24 | 2007-10-04 | St Microelectronics Srl | Verfahren zur Entschlüsselung einer Nachricht |
| GB2416282B (en) * | 2004-07-15 | 2007-05-16 | Hewlett Packard Development Co | Identifier-based signcryption with two trusted authorities |
| GB2419787B (en) * | 2004-10-28 | 2007-07-04 | Hewlett Packard Development Co | Method and apparatus for providing short-term private keys in public-key cryptographic systems |
| EP1813051B1 (de) | 2004-11-12 | 2017-09-13 | Dublin City University | Auf identität basierende verschlüsselung |
| EP1675299B1 (de) * | 2004-12-23 | 2018-08-01 | Hewlett-Packard Development Company, L.P. | Authentifizierungsverfahren unter Verwendung bilinearer Abbildungen |
| ATE533103T1 (de) * | 2005-01-18 | 2011-11-15 | Certicom Corp | Beschleunigte verifikation digitaler signaturen und öffentlicher schlüssel |
| US7680268B2 (en) | 2005-03-15 | 2010-03-16 | Microsoft Corporation | Elliptic curve point octupling using single instruction multiple data processing |
| US7702098B2 (en) * | 2005-03-15 | 2010-04-20 | Microsoft Corporation | Elliptic curve point octupling for weighted projective coordinates |
| US8180047B2 (en) * | 2006-01-13 | 2012-05-15 | Microsoft Corporation | Trapdoor pairings |
| US8234505B2 (en) * | 2006-01-20 | 2012-07-31 | Seagate Technology Llc | Encryption key in a storage system |
| JP4664850B2 (ja) * | 2006-03-30 | 2011-04-06 | 株式会社東芝 | 鍵生成装置、プログラム及び方法 |
| CN105450396B (zh) * | 2016-01-11 | 2017-03-29 | 长沙市迪曼森信息科技有限公司 | 一种无证书的组合密钥产生及应用方法 |
| CN105915520B (zh) * | 2016-04-18 | 2019-02-12 | 深圳大学 | 基于公钥可搜索加密的文件存储、搜索方法及存储系统 |
| US10341098B2 (en) * | 2017-01-24 | 2019-07-02 | Nxp B.V. | Method of generating cryptographic key pairs |
| EP3379766B1 (de) * | 2017-03-20 | 2019-06-26 | Huawei Technologies Co., Ltd. | Drahtloskommunikationsvorrichtung für kommunikation in einem drahtloskommunikationsnetz |
| EP3664005B1 (de) * | 2017-06-07 | 2021-12-08 | Nchain Holdings Limited | Verfahren und system zur erzeugung und verteilung von zugangsdaten für ein blockchain-netzwerk |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
| US5917911A (en) * | 1997-01-23 | 1999-06-29 | Motorola, Inc. | Method and system for hierarchical key access and recovery |
| NL1005919C1 (nl) | 1997-04-28 | 1998-10-29 | Eric Robert Verheul | Een methode voor Publiekelijk verifieerbare örecoveryö van Diffie-Hellman, RSA en Rabin gerelateerde asymmetrische versleuteling. |
| IL125222A0 (en) | 1998-07-06 | 1999-03-12 | L P K Information Integrity Lt | A key-agreement system and method |
| JP2001320356A (ja) | 2000-02-29 | 2001-11-16 | Sony Corp | 公開鍵系暗号を使用したデータ通信システムおよびデータ通信システム構築方法 |
| US20020049910A1 (en) * | 2000-07-25 | 2002-04-25 | Salomon Allen Michael | Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage and exchange of information |
| JP3588042B2 (ja) | 2000-08-30 | 2004-11-10 | 株式会社日立製作所 | 証明書の有効性確認方法および装置 |
| US7149310B2 (en) * | 2000-12-19 | 2006-12-12 | Tricipher, Inc. | Method and system for authorizing generation of asymmetric crypto-keys |
| ATE465571T1 (de) | 2001-08-13 | 2010-05-15 | Univ Leland Stanford Junior | Systeme und verfahren zur verschlüsselung auf identitätsbasis und damit zusammenhängende kryptografische techniken |
| CA2365441C (en) * | 2001-12-19 | 2010-02-16 | Diversinet Corp. | Method of establishing secure communications in a digital network using pseudonymic digital identifiers |
| US7353395B2 (en) * | 2002-03-21 | 2008-04-01 | Ntt Docomo Inc. | Authenticated ID-based cryptosystem with no key escrow |
| US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
-
2002
- 2002-07-05 GB GBGB0215524.0A patent/GB0215524D0/en not_active Ceased
-
2003
- 2003-07-03 US US10/613,750 patent/US7397917B2/en not_active Expired - Lifetime
- 2003-07-04 DE DE60313704T patent/DE60313704T2/de not_active Expired - Lifetime
- 2003-07-04 EP EP03254262A patent/EP1379024B1/de not_active Expired - Lifetime
- 2003-07-04 GB GB0315697A patent/GB2390516A/en not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| US7397917B2 (en) | 2008-07-08 |
| GB0315697D0 (en) | 2003-08-13 |
| EP1379024A1 (de) | 2004-01-07 |
| US20040131191A1 (en) | 2004-07-08 |
| GB2390516A (en) | 2004-01-07 |
| GB0215524D0 (en) | 2002-08-14 |
| EP1379024B1 (de) | 2007-05-09 |
| DE60313704T2 (de) | 2008-01-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60313704D1 (de) | Verfahren und Vorrichtung zur Erzeugung eines Geheimschlüssels | |
| DE60231473D1 (de) | Verfahren und vorrichtung zur erzeugung eines magnetfeldes | |
| DE60205756T2 (de) | Verfahren und Vorrichtung zur Erzeugung eines GPS Simulationsszenarios | |
| DE50007158D1 (de) | Vorrichtung und verfahren zur erzeugung eines reduktionsmittel-luftgemisches | |
| DE60333327D1 (de) | Verfahren, System und Vorrichtung zum Authentifizieren eines elektronischen Wertes | |
| DE60016589D1 (de) | Verfahren und vorrichtung zur erzeugung eines zusammengesetzten fingerabdruckbildes | |
| DE60119410D1 (de) | Vorrichtung und Verfahren zur Blockverschlüsselung und zur Entschlüsselung | |
| DE602004008147D1 (de) | Vorrichtung zur kombinierten Energieerzeugung und Entsalzung sowie dazugehöriges Verfahren | |
| DE60138083D1 (de) | Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion | |
| DE50105721D1 (de) | Vorrichtung und verfahren zur erzeugung von atmungsbedingten messdaten | |
| DE602004014672D1 (de) | Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung | |
| DE60107634D1 (de) | Verfahren und Vorrichtung zur Authentifizierung der Gültigkeit eines Zertifikats | |
| DE60010220D1 (de) | Verfahren und Vorrichtung zur Erzeugung und Verwendung eines virenfreien Dateizertifikats | |
| DE60108252D1 (de) | Verfahren und vorrichtung zur erzeugung von nanostrukturen | |
| ATE411843T1 (de) | Verfahren und vorrichtung zur behandlung eines einsatzgases | |
| DE60121284D1 (de) | Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion | |
| DE60037411D1 (de) | Verfahren und vorrichtung zur erzeugung eines rahmensynchronisierungswortes und überprüfung des rahmensynchronisierungswortes in einem w-cdma system | |
| DE602004015710D1 (de) | Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung | |
| DE60026189D1 (de) | Verfahren und Vorrichtung zur Wellenformkomprimierung und Erzeugung | |
| DE60027531D1 (de) | Verfahren und Vorrichtung zur Schlüsselverteilung unter Verwendung eines Basisschlüssels | |
| DE60306247D1 (de) | Vorrichtung und Verfahren zum Sterilisieren | |
| DE60315538D1 (de) | Vorrichtung und Verfahren zur Erzeugung von Gas in einer Brennstoffzelle | |
| DE60303556D1 (de) | Vorrichtung und Verfahren zur Kontrolle eines Gassacks | |
| DE60125673D1 (de) | Verfahren und Vorrichtung zur Ausführung einer kryptographischen Funktion | |
| DE60212248D1 (de) | Informationssicherheitsvorrichtung, Vorrichtung und Verfahren zur Erzeugung einer Primzahl |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 8364 | No opposition during term of opposition |