IN2013MU01234A - - Google Patents
Info
- Publication number
- IN2013MU01234A IN2013MU01234A IN1234MU2013A IN2013MU01234A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A IN 1234MU2013 A IN1234MU2013 A IN 1234MU2013A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A
- Authority
- IN
- India
- Prior art keywords
- igtable
- private
- public
- user
- key
- Prior art date
Links
- 239000002131 composite material Substances 0.000 abstract 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (ф(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ф(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 | |
| US14/228,396 US9590807B2 (en) | 2013-03-28 | 2014-03-28 | Identity based public key cryptosystem |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2013MU01234A true IN2013MU01234A (en) | 2015-04-10 |
Family
ID=51620869
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US9590807B2 (en) |
| IN (1) | IN2013MU01234A (en) |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8271106B2 (en) | 2009-04-17 | 2012-09-18 | Hospira, Inc. | System and method for configuring a rule set for medical event management and responses |
| EP2769357B1 (en) | 2011-10-21 | 2023-08-30 | ICU Medical, Inc. | Medical device update system |
| WO2014138446A1 (en) | 2013-03-06 | 2014-09-12 | Hospira,Inc. | Medical device communication method |
| JP6621748B2 (en) | 2013-08-30 | 2019-12-18 | アイシーユー・メディカル・インコーポレーテッド | System and method for monitoring and managing a remote infusion regimen |
| US9662436B2 (en) | 2013-09-20 | 2017-05-30 | Icu Medical, Inc. | Fail-safe drug infusion therapy system |
| US10311972B2 (en) | 2013-11-11 | 2019-06-04 | Icu Medical, Inc. | Medical device system performance index |
| AU2015253001A1 (en) | 2014-04-30 | 2016-10-20 | Icu Medical, Inc. | Patient care system with conditional alarm forwarding |
| US9724470B2 (en) | 2014-06-16 | 2017-08-08 | Icu Medical, Inc. | System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy |
| US9539383B2 (en) | 2014-09-15 | 2017-01-10 | Hospira, Inc. | System and method that matches delayed infusion auto-programs with manually entered infusion programs and analyzes differences therein |
| CN105915520B (en) * | 2016-04-18 | 2019-02-12 | 深圳大学 | File storage, search method and storage system based on public key searchable encryption |
| EP3484541A4 (en) | 2016-07-14 | 2020-03-25 | ICU Medical, Inc. | MULTI-COMMUNICATION PATH SELECTION AND MEDICAL DEVICE SECURITY SYSTEM |
| CN110120927B (en) * | 2018-02-05 | 2022-03-25 | 华为技术有限公司 | Method and device for generating private key |
| US10741280B2 (en) | 2018-07-17 | 2020-08-11 | Icu Medical, Inc. | Tagging pump messages with identifiers that facilitate restructuring |
| EP3824383B1 (en) | 2018-07-17 | 2023-10-11 | ICU Medical, Inc. | Systems and methods for facilitating clinical messaging in a network environment |
| WO2020018388A1 (en) | 2018-07-17 | 2020-01-23 | Icu Medical, Inc. | Updating infusion pump drug libraries and operational software in a networked environment |
| CN108599951B (en) * | 2018-08-10 | 2021-10-01 | 北京奇虎科技有限公司 | Encryption method, encryption device, computing device and computer storage medium |
| EP3664361B1 (en) * | 2018-12-06 | 2024-05-22 | Secure-IC SAS | Methods and devices for secured identity-based encryption systems with two trusted centers |
| US11005656B2 (en) * | 2018-12-07 | 2021-05-11 | Arris Enterprises Llc | Embedding information in elliptic curve base point |
| WO2020227403A1 (en) | 2019-05-08 | 2020-11-12 | Icu Medical, Inc. | Threshold signature based medical device management |
| CN110995716B (en) * | 2019-12-06 | 2022-09-02 | 国网浙江省电力有限公司电力科学研究院 | Data transmission encryption and decryption method and system for transformer substation inspection robot |
| US11590057B2 (en) | 2020-04-03 | 2023-02-28 | Icu Medical, Inc. | Systems, methods, and components for transferring medical fluids |
| NZ798640A (en) | 2020-09-05 | 2025-09-26 | Icu Medical Inc | Identity-based secure medical device communications |
| CN113352318B (en) * | 2021-04-29 | 2022-06-24 | 国网浙江省电力有限公司嘉兴供电公司 | Intelligent robot communication link self-checking selection method |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ATE119726T1 (en) | 1990-10-24 | 1995-03-15 | Omnisec Ag | SECRET TRANSMISSION SYSTEM WITH THE POSSIBILITY OF ENCRYPTED COMMUNICATION BETWEEN USERS WITH A SECURED KEY, WHICH IS DETERMINED WITHOUT USER INTERVENTION. |
| FR2737369A1 (en) * | 1995-07-26 | 1997-01-31 | Trt Telecom Radio Electr | SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A. |
| US7088821B2 (en) * | 2001-05-03 | 2006-08-08 | Cheman Shaik | Absolute public key cryptographic system and method surviving private-key compromise with other advantages |
| CA2598811A1 (en) | 2005-02-25 | 2006-08-31 | Qualcomm Incorporated | Small public-key based digital signatures for authentication |
-
2013
- 2013-03-28 IN IN1234MU2013 patent/IN2013MU01234A/en unknown
-
2014
- 2014-03-28 US US14/228,396 patent/US9590807B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US9590807B2 (en) | 2017-03-07 |
| US20140294177A1 (en) | 2014-10-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2013MU01234A (en) | ||
| MX2022003019A (en) | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography. | |
| MX2021014176A (en) | Method and system for blockchain variant using digital signatures. | |
| ZA202000307B (en) | Methods and systems for blockchain-implemented event-lock encryption | |
| MX2016005800A (en) | System and method for updating an encryption key across a network. | |
| GB2572088A8 (en) | Controlling access to a locked space using cryptographic keys stored on a blockchain | |
| TN2015000274A1 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
| MX336828B (en) | Key sharing device and system for configuration thereof. | |
| WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
| GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
| JP2016527844A5 (en) | ||
| JP2017034661A5 (en) | ||
| WO2015008158A3 (en) | Securing method for lawful interception | |
| WO2008146546A1 (en) | Key generating apparatus, encrypting apparatus and decrypting apparatus | |
| GB2453091A (en) | Ad-hoc network key management | |
| UA122327C2 (en) | Nado cryptography with key generators | |
| MX375166B (en) | NADO CRYPTOGRAPHY USING ONE-WAY FUNCTIONS. | |
| BR112017003063A2 (en) | methods for generating a cryptographic checksum and for authenticating a message, computer program, computer program product, checksum generator, sender and receiver devices, mobile terminal, and radio access node. | |
| MX345371B (en) | Key sharing network device and configuration thereof. | |
| MX340269B (en) | Determination of cryptographic keys. | |
| GB2610560B (en) | Generating shared cryptographic keys | |
| GB2500557A (en) | Data encryption | |
| SG10201606165SA (en) | A key generation and distribution method based on identity-based cryptography | |
| CN108933659B (en) | An identity verification system and verification method for a smart grid | |
| WO2013016736A3 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function |