ATE314763T1 - Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system - Google Patents
Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns systemInfo
- Publication number
- ATE314763T1 ATE314763T1 AT03743944T AT03743944T ATE314763T1 AT E314763 T1 ATE314763 T1 AT E314763T1 AT 03743944 T AT03743944 T AT 03743944T AT 03743944 T AT03743944 T AT 03743944T AT E314763 T1 ATE314763 T1 AT E314763T1
- Authority
- AT
- Austria
- Prior art keywords
- party
- devices
- polynom
- authentication process
- key generation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2805—Home Audio Video Interoperability [HAVI] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP02075983 | 2002-03-13 | ||
| PCT/IB2003/000655 WO2003077470A1 (en) | 2002-03-13 | 2003-02-14 | Polynomial-based multi-user key generation and authentication method and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE314763T1 true ATE314763T1 (de) | 2006-01-15 |
Family
ID=27798863
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT03743944T ATE314763T1 (de) | 2002-03-13 | 2003-02-14 | Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20050265550A1 (de) |
| EP (1) | EP1486027B1 (de) |
| JP (1) | JP2005520395A (de) |
| KR (1) | KR20040093128A (de) |
| CN (1) | CN1643840A (de) |
| AT (1) | ATE314763T1 (de) |
| AU (1) | AU2003252817A1 (de) |
| DE (1) | DE60303018T2 (de) |
| WO (1) | WO2003077470A1 (de) |
Families Citing this family (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7840806B2 (en) * | 2002-10-16 | 2010-11-23 | Enterprise Information Management, Inc. | System and method of non-centralized zero knowledge authentication for a computer network |
| US8239917B2 (en) * | 2002-10-16 | 2012-08-07 | Enterprise Information Management, Inc. | Systems and methods for enterprise security with collaborative peer to peer architecture |
| JP2007510947A (ja) * | 2003-11-03 | 2007-04-26 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 多数当事者の効率的な乗算のための方法及び装置 |
| ES2297338T3 (es) * | 2004-04-30 | 2008-05-01 | Research In Motion Limited | Autentificacion criptografica de un dispositivo. |
| US7647498B2 (en) | 2004-04-30 | 2010-01-12 | Research In Motion Limited | Device authentication |
| CN1981477A (zh) * | 2004-07-08 | 2007-06-13 | 皇家飞利浦电子股份有限公司 | 用于提供数字证书功能的方法 |
| US7730319B2 (en) | 2004-08-27 | 2010-06-01 | Ntt Docomo, Inc. | Provisional signature schemes |
| JP5001157B2 (ja) * | 2004-09-30 | 2012-08-15 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 多項式に基づいた認証の方法 |
| WO2006035374A1 (en) * | 2004-09-30 | 2006-04-06 | Koninklijke Philips Electronics N.V. | Polynomial-based key distribution system and method |
| KR20070086052A (ko) | 2004-11-12 | 2007-08-27 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 헤드폰 세트를 통해 콘텐트들을 공유하는 장치 및 방법 |
| WO2007062688A1 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Key management |
| CN101331705B (zh) * | 2005-12-14 | 2011-06-08 | 皇家飞利浦电子股份有限公司 | 用于鉴定低资源示证者的方法和系统 |
| JP4630826B2 (ja) * | 2006-01-27 | 2011-02-09 | 株式会社東芝 | 復号鍵生成方法、コンテンツ提供側システム、ユーザ側システム、追跡システム、コンテンツ提供方法、暗号化コンテンツ復号方法、プログラム、暗号化装置及び復号装置 |
| KR101537527B1 (ko) * | 2006-05-02 | 2015-07-22 | 코닌클리케 필립스 엔.브이. | 도메인에 대한 개선된 액세스 |
| US20080120558A1 (en) | 2006-11-16 | 2008-05-22 | Paco Xander Nathan | Systems and methods for managing a persistent virtual avatar with migrational ability |
| US9253183B2 (en) | 2006-11-16 | 2016-02-02 | Mark Stephen Meadows | Systems and methods for authenticating an avatar |
| CN100579007C (zh) * | 2007-08-07 | 2010-01-06 | 上海交通大学 | 生成密钥的方法、通信系统、通信设备和服务器 |
| US9398046B2 (en) | 2008-03-06 | 2016-07-19 | Qualcomm Incorporated | Image-based man-in-the-middle protection in numeric comparison association models |
| US8245308B2 (en) * | 2008-06-04 | 2012-08-14 | Microsoft Corporation | Using trusted third parties to perform DRM operations |
| CN101299752B (zh) * | 2008-06-26 | 2010-12-22 | 上海交通大学 | 基于信任的新鲜性建立密码协议安全性的方法 |
| US8345861B2 (en) * | 2008-08-22 | 2013-01-01 | Red Hat, Inc. | Sharing a secret using polynomial division over GF(Q) |
| US20100046740A1 (en) * | 2008-08-22 | 2010-02-25 | Schneider James P | Embedding a secret in a larger polynomial |
| US7915637B2 (en) * | 2008-11-19 | 2011-03-29 | Nantero, Inc. | Switching materials comprising mixed nanoscopic particles and carbon nanotubes and method of making and using the same |
| CN101499908B (zh) * | 2009-03-20 | 2011-06-22 | 四川长虹电器股份有限公司 | 一种身份认证及共享密钥产生方法 |
| US9106414B2 (en) * | 2009-09-09 | 2015-08-11 | Edward W. Laves | Method and apparatus for wirelessly transmitting high volume content to an electronic device |
| JP5594034B2 (ja) * | 2010-07-30 | 2014-09-24 | ソニー株式会社 | 認証装置、認証方法、及びプログラム |
| JP5790288B2 (ja) * | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、及び情報処理方法 |
| JP5790290B2 (ja) * | 2011-08-12 | 2015-10-07 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、及びプログラムを記録したコンピュータ読み取り可能な記録媒体 |
| RU2014151791A (ru) * | 2012-05-21 | 2016-07-20 | Конинклейке Филипс Н.В. | Определение криптографических ключей |
| CN106685980B (zh) * | 2017-01-13 | 2019-12-20 | 桂林电子科技大学 | 一种大文件的加密方法 |
| KR20250095647A (ko) * | 2017-12-13 | 2025-06-26 | 엔체인 라이센싱 아게 | 암호 자료를 안전하게 공유하기 위한 시스템 및 방법 |
| US11003777B2 (en) * | 2018-04-16 | 2021-05-11 | International Business Machines Corporation | Determining a frequency at which to execute trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code |
| FR3085815B1 (fr) | 2018-07-11 | 2022-07-15 | Ledger | Gouvernance de securite du traitement d'une requete numerique |
| WO2020027758A2 (en) * | 2018-08-03 | 2020-02-06 | Istanbul Teknik Universitesi | Systems and methods for generating shared keys, identity authentication and data transmission based on simultaneous transmission on wireless multiple- access channels |
| JP2024064581A (ja) * | 2022-10-28 | 2024-05-14 | 国立研究開発法人情報通信研究機構 | 認証システム |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4996711A (en) * | 1989-06-21 | 1991-02-26 | Chaum David L | Selected-exponent signature systems |
| US5202921A (en) * | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
| CA2169449A1 (en) * | 1993-08-13 | 1995-02-23 | Frank Thomson Leighton | Secret key exchange |
| US5539826A (en) * | 1993-12-29 | 1996-07-23 | International Business Machines Corporation | Method for message authentication from non-malleable crypto systems |
| US5953420A (en) * | 1996-10-25 | 1999-09-14 | International Business Machines Corporation | Method and apparatus for establishing an authenticated shared secret value between a pair of users |
| US6076163A (en) * | 1997-10-20 | 2000-06-13 | Rsa Security Inc. | Secure user identification based on constrained polynomials |
| US6298153B1 (en) * | 1998-01-16 | 2001-10-02 | Canon Kabushiki Kaisha | Digital signature method and information communication system and apparatus using such method |
-
2003
- 2003-02-14 WO PCT/IB2003/000655 patent/WO2003077470A1/en not_active Ceased
- 2003-02-14 AT AT03743944T patent/ATE314763T1/de not_active IP Right Cessation
- 2003-02-14 US US10/507,190 patent/US20050265550A1/en not_active Abandoned
- 2003-02-14 EP EP03743944A patent/EP1486027B1/de not_active Expired - Lifetime
- 2003-02-14 DE DE60303018T patent/DE60303018T2/de not_active Expired - Lifetime
- 2003-02-14 AU AU2003252817A patent/AU2003252817A1/en not_active Abandoned
- 2003-02-14 JP JP2003575553A patent/JP2005520395A/ja active Pending
- 2003-02-14 CN CNA038059126A patent/CN1643840A/zh active Pending
- 2003-02-14 KR KR10-2004-7014259A patent/KR20040093128A/ko not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| CN1643840A (zh) | 2005-07-20 |
| DE60303018T2 (de) | 2006-08-24 |
| EP1486027B1 (de) | 2005-12-28 |
| KR20040093128A (ko) | 2004-11-04 |
| WO2003077470A1 (en) | 2003-09-18 |
| US20050265550A1 (en) | 2005-12-01 |
| EP1486027A1 (de) | 2004-12-15 |
| JP2005520395A (ja) | 2005-07-07 |
| AU2003252817A1 (en) | 2003-09-22 |
| DE60303018D1 (de) | 2006-02-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE314763T1 (de) | Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system | |
| Mohammadali et al. | A novel identity-based key establishment method for advanced metering infrastructure in smart grid | |
| Xie | A new authenticated key agreement for session initiation protocol | |
| Yoon et al. | An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map | |
| Khader et al. | Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol | |
| EP1248408A3 (de) | Verfahren und Vorrichtung zur Ausführung eines effizienten mittels Kennwort authentifizierten Schlüsselaustauschs | |
| Kamto et al. | Light-weight key distribution and management for advanced metering infrastructure | |
| Li et al. | Securing cluster-based ad hoc networks with distributed authorities | |
| CN102315935A (zh) | 无线传感器网与计算机网融合网络密钥管理方法 | |
| Hayati et al. | A novel secure root key updating scheme for LoRaWANs based on CTR_AES DRBG 128 | |
| Tian et al. | Accountable fine-grained blockchain rewriting in the permissionless setting | |
| CN110784300A (zh) | 一种基于乘法同态加密的密钥合成方法 | |
| CN107294696A (zh) | 针对Leveled全同态密钥分配方法 | |
| Yin et al. | Two‐Round Password‐Based Authenticated Key Exchange from Lattices | |
| CN101677271A (zh) | 一种组播密钥管理的方法、装置及系统 | |
| Kumar et al. | Anonymous ID-based Group Key Agreement Protocol without Pairing. | |
| Kim et al. | A novel elliptical curve ID cryptography protocol for multi‐hop ZigBee sensor networks | |
| CN104243504B (zh) | 下一代无线网络安全通信实现方法 | |
| Hwang et al. | A secure protocol for bluetooth piconets using elliptic curve cryptography | |
| WO2000005836A1 (en) | A key-agreement system and method | |
| Hu et al. | An efficient designated verifier signature scheme with pairing‐free and low cost | |
| Lin et al. | Strongly password-based three-party authenticated key exchange protocol | |
| Naresh et al. | Secure lightweight multi‐party key agreement based on hyperelliptic curve Diffie–Hellman for constraint networks | |
| Chung | The design of authentication key protocol in certificate‐free public key cryptosystem | |
| Zhong | Identity-based mix: Anonymous communications without public key certificates |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |