[go: up one dir, main page]

IN2013MU01234A - - Google Patents

Info

Publication number
IN2013MU01234A
IN2013MU01234A IN1234MU2013A IN2013MU01234A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A IN 1234MU2013 A IN1234MU2013 A IN 1234MU2013A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A
Authority
IN
India
Prior art keywords
igtable
private
public
user
key
Prior art date
Application number
Inventor
Ravishankara Shastry
Barkur Suryanarayana Adiga
Bhattachar Rajan Mindigal Alasingara
Shivraj Vijayshankar Lokamathe
Balamuralidhar Purushotaman
Original Assignee
Tata Consultancy Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tata Consultancy Services Ltd filed Critical Tata Consultancy Services Ltd
Priority to IN1234MU2013 priority Critical patent/IN2013MU01234A/en
Priority to US14/228,396 priority patent/US9590807B2/en
Publication of IN2013MU01234A publication Critical patent/IN2013MU01234A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (ф(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ф(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
IN1234MU2013 2013-03-28 2013-03-28 IN2013MU01234A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28
US14/228,396 US9590807B2 (en) 2013-03-28 2014-03-28 Identity based public key cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28

Publications (1)

Publication Number Publication Date
IN2013MU01234A true IN2013MU01234A (en) 2015-04-10

Family

ID=51620869

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28

Country Status (2)

Country Link
US (1) US9590807B2 (en)
IN (1) IN2013MU01234A (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8271106B2 (en) 2009-04-17 2012-09-18 Hospira, Inc. System and method for configuring a rule set for medical event management and responses
EP2769357B1 (en) 2011-10-21 2023-08-30 ICU Medical, Inc. Medical device update system
WO2014138446A1 (en) 2013-03-06 2014-09-12 Hospira,Inc. Medical device communication method
JP6621748B2 (en) 2013-08-30 2019-12-18 アイシーユー・メディカル・インコーポレーテッド System and method for monitoring and managing a remote infusion regimen
US9662436B2 (en) 2013-09-20 2017-05-30 Icu Medical, Inc. Fail-safe drug infusion therapy system
US10311972B2 (en) 2013-11-11 2019-06-04 Icu Medical, Inc. Medical device system performance index
AU2015253001A1 (en) 2014-04-30 2016-10-20 Icu Medical, Inc. Patient care system with conditional alarm forwarding
US9724470B2 (en) 2014-06-16 2017-08-08 Icu Medical, Inc. System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy
US9539383B2 (en) 2014-09-15 2017-01-10 Hospira, Inc. System and method that matches delayed infusion auto-programs with manually entered infusion programs and analyzes differences therein
CN105915520B (en) * 2016-04-18 2019-02-12 深圳大学 File storage, search method and storage system based on public key searchable encryption
EP3484541A4 (en) 2016-07-14 2020-03-25 ICU Medical, Inc. MULTI-COMMUNICATION PATH SELECTION AND MEDICAL DEVICE SECURITY SYSTEM
CN110120927B (en) * 2018-02-05 2022-03-25 华为技术有限公司 Method and device for generating private key
US10741280B2 (en) 2018-07-17 2020-08-11 Icu Medical, Inc. Tagging pump messages with identifiers that facilitate restructuring
EP3824383B1 (en) 2018-07-17 2023-10-11 ICU Medical, Inc. Systems and methods for facilitating clinical messaging in a network environment
WO2020018388A1 (en) 2018-07-17 2020-01-23 Icu Medical, Inc. Updating infusion pump drug libraries and operational software in a networked environment
CN108599951B (en) * 2018-08-10 2021-10-01 北京奇虎科技有限公司 Encryption method, encryption device, computing device and computer storage medium
EP3664361B1 (en) * 2018-12-06 2024-05-22 Secure-IC SAS Methods and devices for secured identity-based encryption systems with two trusted centers
US11005656B2 (en) * 2018-12-07 2021-05-11 Arris Enterprises Llc Embedding information in elliptic curve base point
WO2020227403A1 (en) 2019-05-08 2020-11-12 Icu Medical, Inc. Threshold signature based medical device management
CN110995716B (en) * 2019-12-06 2022-09-02 国网浙江省电力有限公司电力科学研究院 Data transmission encryption and decryption method and system for transformer substation inspection robot
US11590057B2 (en) 2020-04-03 2023-02-28 Icu Medical, Inc. Systems, methods, and components for transferring medical fluids
NZ798640A (en) 2020-09-05 2025-09-26 Icu Medical Inc Identity-based secure medical device communications
CN113352318B (en) * 2021-04-29 2022-06-24 国网浙江省电力有限公司嘉兴供电公司 Intelligent robot communication link self-checking selection method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE119726T1 (en) 1990-10-24 1995-03-15 Omnisec Ag SECRET TRANSMISSION SYSTEM WITH THE POSSIBILITY OF ENCRYPTED COMMUNICATION BETWEEN USERS WITH A SECURED KEY, WHICH IS DETERMINED WITHOUT USER INTERVENTION.
FR2737369A1 (en) * 1995-07-26 1997-01-31 Trt Telecom Radio Electr SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A.
US7088821B2 (en) * 2001-05-03 2006-08-08 Cheman Shaik Absolute public key cryptographic system and method surviving private-key compromise with other advantages
CA2598811A1 (en) 2005-02-25 2006-08-31 Qualcomm Incorporated Small public-key based digital signatures for authentication

Also Published As

Publication number Publication date
US9590807B2 (en) 2017-03-07
US20140294177A1 (en) 2014-10-02

Similar Documents

Publication Publication Date Title
IN2013MU01234A (en)
MX2022003019A (en) Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography.
MX2021014176A (en) Method and system for blockchain variant using digital signatures.
ZA202000307B (en) Methods and systems for blockchain-implemented event-lock encryption
MX2016005800A (en) System and method for updating an encryption key across a network.
GB2572088A8 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
TN2015000274A1 (en) Method and apparatus for marking manufactured items using physical characteristic
MX336828B (en) Key sharing device and system for configuration thereof.
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
GB2512249A (en) Secure peer discovery and authentication using a shared secret
JP2016527844A5 (en)
JP2017034661A5 (en)
WO2015008158A3 (en) Securing method for lawful interception
WO2008146546A1 (en) Key generating apparatus, encrypting apparatus and decrypting apparatus
GB2453091A (en) Ad-hoc network key management
UA122327C2 (en) Nado cryptography with key generators
MX375166B (en) NADO CRYPTOGRAPHY USING ONE-WAY FUNCTIONS.
BR112017003063A2 (en) methods for generating a cryptographic checksum and for authenticating a message, computer program, computer program product, checksum generator, sender and receiver devices, mobile terminal, and radio access node.
MX345371B (en) Key sharing network device and configuration thereof.
MX340269B (en) Determination of cryptographic keys.
GB2610560B (en) Generating shared cryptographic keys
GB2500557A (en) Data encryption
SG10201606165SA (en) A key generation and distribution method based on identity-based cryptography
CN108933659B (en) An identity verification system and verification method for a smart grid
WO2013016736A3 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function