ATE314763T1 - Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system - Google Patents

Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system

Info

Publication number
ATE314763T1
ATE314763T1 AT03743944T AT03743944T ATE314763T1 AT E314763 T1 ATE314763 T1 AT E314763T1 AT 03743944 T AT03743944 T AT 03743944T AT 03743944 T AT03743944 T AT 03743944T AT E314763 T1 ATE314763 T1 AT E314763T1
Authority
AT
Austria
Prior art keywords
party
devices
polynom
authentication process
key generation
Prior art date
Application number
AT03743944T
Other languages
English (en)
Inventor
Pim T Tuyls
Thomas A M Kevenaar
Geert J Schrijen
Dijk Marten E Van
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Application granted granted Critical
Publication of ATE314763T1 publication Critical patent/ATE314763T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2805Home Audio Video Interoperability [HAVI] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)
AT03743944T 2002-03-13 2003-02-14 Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system ATE314763T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP02075983 2002-03-13
PCT/IB2003/000655 WO2003077470A1 (en) 2002-03-13 2003-02-14 Polynomial-based multi-user key generation and authentication method and system

Publications (1)

Publication Number Publication Date
ATE314763T1 true ATE314763T1 (de) 2006-01-15

Family

ID=27798863

Family Applications (1)

Application Number Title Priority Date Filing Date
AT03743944T ATE314763T1 (de) 2002-03-13 2003-02-14 Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system

Country Status (9)

Country Link
US (1) US20050265550A1 (de)
EP (1) EP1486027B1 (de)
JP (1) JP2005520395A (de)
KR (1) KR20040093128A (de)
CN (1) CN1643840A (de)
AT (1) ATE314763T1 (de)
AU (1) AU2003252817A1 (de)
DE (1) DE60303018T2 (de)
WO (1) WO2003077470A1 (de)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7840806B2 (en) * 2002-10-16 2010-11-23 Enterprise Information Management, Inc. System and method of non-centralized zero knowledge authentication for a computer network
US8239917B2 (en) * 2002-10-16 2012-08-07 Enterprise Information Management, Inc. Systems and methods for enterprise security with collaborative peer to peer architecture
JP2007510947A (ja) * 2003-11-03 2007-04-26 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 多数当事者の効率的な乗算のための方法及び装置
ES2297338T3 (es) * 2004-04-30 2008-05-01 Research In Motion Limited Autentificacion criptografica de un dispositivo.
US7647498B2 (en) 2004-04-30 2010-01-12 Research In Motion Limited Device authentication
CN1981477A (zh) * 2004-07-08 2007-06-13 皇家飞利浦电子股份有限公司 用于提供数字证书功能的方法
US7730319B2 (en) 2004-08-27 2010-06-01 Ntt Docomo, Inc. Provisional signature schemes
JP5001157B2 (ja) * 2004-09-30 2012-08-15 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 多項式に基づいた認証の方法
WO2006035374A1 (en) * 2004-09-30 2006-04-06 Koninklijke Philips Electronics N.V. Polynomial-based key distribution system and method
KR20070086052A (ko) 2004-11-12 2007-08-27 코닌클리케 필립스 일렉트로닉스 엔.브이. 헤드폰 세트를 통해 콘텐트들을 공유하는 장치 및 방법
WO2007062688A1 (en) * 2005-12-01 2007-06-07 Telefonaktiebolaget Lm Ericsson (Publ) Key management
CN101331705B (zh) * 2005-12-14 2011-06-08 皇家飞利浦电子股份有限公司 用于鉴定低资源示证者的方法和系统
JP4630826B2 (ja) * 2006-01-27 2011-02-09 株式会社東芝 復号鍵生成方法、コンテンツ提供側システム、ユーザ側システム、追跡システム、コンテンツ提供方法、暗号化コンテンツ復号方法、プログラム、暗号化装置及び復号装置
KR101537527B1 (ko) * 2006-05-02 2015-07-22 코닌클리케 필립스 엔.브이. 도메인에 대한 개선된 액세스
US20080120558A1 (en) 2006-11-16 2008-05-22 Paco Xander Nathan Systems and methods for managing a persistent virtual avatar with migrational ability
US9253183B2 (en) 2006-11-16 2016-02-02 Mark Stephen Meadows Systems and methods for authenticating an avatar
CN100579007C (zh) * 2007-08-07 2010-01-06 上海交通大学 生成密钥的方法、通信系统、通信设备和服务器
US9398046B2 (en) 2008-03-06 2016-07-19 Qualcomm Incorporated Image-based man-in-the-middle protection in numeric comparison association models
US8245308B2 (en) * 2008-06-04 2012-08-14 Microsoft Corporation Using trusted third parties to perform DRM operations
CN101299752B (zh) * 2008-06-26 2010-12-22 上海交通大学 基于信任的新鲜性建立密码协议安全性的方法
US8345861B2 (en) * 2008-08-22 2013-01-01 Red Hat, Inc. Sharing a secret using polynomial division over GF(Q)
US20100046740A1 (en) * 2008-08-22 2010-02-25 Schneider James P Embedding a secret in a larger polynomial
US7915637B2 (en) * 2008-11-19 2011-03-29 Nantero, Inc. Switching materials comprising mixed nanoscopic particles and carbon nanotubes and method of making and using the same
CN101499908B (zh) * 2009-03-20 2011-06-22 四川长虹电器股份有限公司 一种身份认证及共享密钥产生方法
US9106414B2 (en) * 2009-09-09 2015-08-11 Edward W. Laves Method and apparatus for wirelessly transmitting high volume content to an electronic device
JP5594034B2 (ja) * 2010-07-30 2014-09-24 ソニー株式会社 認証装置、認証方法、及びプログラム
JP5790288B2 (ja) * 2011-08-12 2015-10-07 ソニー株式会社 情報処理装置、及び情報処理方法
JP5790290B2 (ja) * 2011-08-12 2015-10-07 ソニー株式会社 情報処理装置、情報処理方法、プログラム、及びプログラムを記録したコンピュータ読み取り可能な記録媒体
RU2014151791A (ru) * 2012-05-21 2016-07-20 Конинклейке Филипс Н.В. Определение криптографических ключей
CN106685980B (zh) * 2017-01-13 2019-12-20 桂林电子科技大学 一种大文件的加密方法
KR20250095647A (ko) * 2017-12-13 2025-06-26 엔체인 라이센싱 아게 암호 자료를 안전하게 공유하기 위한 시스템 및 방법
US11003777B2 (en) * 2018-04-16 2021-05-11 International Business Machines Corporation Determining a frequency at which to execute trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code
FR3085815B1 (fr) 2018-07-11 2022-07-15 Ledger Gouvernance de securite du traitement d'une requete numerique
WO2020027758A2 (en) * 2018-08-03 2020-02-06 Istanbul Teknik Universitesi Systems and methods for generating shared keys, identity authentication and data transmission based on simultaneous transmission on wireless multiple- access channels
JP2024064581A (ja) * 2022-10-28 2024-05-14 国立研究開発法人情報通信研究機構 認証システム

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4996711A (en) * 1989-06-21 1991-02-26 Chaum David L Selected-exponent signature systems
US5202921A (en) * 1991-04-01 1993-04-13 International Business Machines Corporation Method and apparatus for authenticating users of a communication system to each other
CA2169449A1 (en) * 1993-08-13 1995-02-23 Frank Thomson Leighton Secret key exchange
US5539826A (en) * 1993-12-29 1996-07-23 International Business Machines Corporation Method for message authentication from non-malleable crypto systems
US5953420A (en) * 1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users
US6076163A (en) * 1997-10-20 2000-06-13 Rsa Security Inc. Secure user identification based on constrained polynomials
US6298153B1 (en) * 1998-01-16 2001-10-02 Canon Kabushiki Kaisha Digital signature method and information communication system and apparatus using such method

Also Published As

Publication number Publication date
CN1643840A (zh) 2005-07-20
DE60303018T2 (de) 2006-08-24
EP1486027B1 (de) 2005-12-28
KR20040093128A (ko) 2004-11-04
WO2003077470A1 (en) 2003-09-18
US20050265550A1 (en) 2005-12-01
EP1486027A1 (de) 2004-12-15
JP2005520395A (ja) 2005-07-07
AU2003252817A1 (en) 2003-09-22
DE60303018D1 (de) 2006-02-02

Similar Documents

Publication Publication Date Title
ATE314763T1 (de) Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system
Mohammadali et al. A novel identity-based key establishment method for advanced metering infrastructure in smart grid
Xie A new authenticated key agreement for session initiation protocol
Yoon et al. An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
Khader et al. Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
EP1248408A3 (de) Verfahren und Vorrichtung zur Ausführung eines effizienten mittels Kennwort authentifizierten Schlüsselaustauschs
Kamto et al. Light-weight key distribution and management for advanced metering infrastructure
Li et al. Securing cluster-based ad hoc networks with distributed authorities
CN102315935A (zh) 无线传感器网与计算机网融合网络密钥管理方法
Hayati et al. A novel secure root key updating scheme for LoRaWANs based on CTR_AES DRBG 128
Tian et al. Accountable fine-grained blockchain rewriting in the permissionless setting
CN110784300A (zh) 一种基于乘法同态加密的密钥合成方法
CN107294696A (zh) 针对Leveled全同态密钥分配方法
Yin et al. Two‐Round Password‐Based Authenticated Key Exchange from Lattices
CN101677271A (zh) 一种组播密钥管理的方法、装置及系统
Kumar et al. Anonymous ID-based Group Key Agreement Protocol without Pairing.
Kim et al. A novel elliptical curve ID cryptography protocol for multi‐hop ZigBee sensor networks
CN104243504B (zh) 下一代无线网络安全通信实现方法
Hwang et al. A secure protocol for bluetooth piconets using elliptic curve cryptography
WO2000005836A1 (en) A key-agreement system and method
Hu et al. An efficient designated verifier signature scheme with pairing‐free and low cost
Lin et al. Strongly password-based three-party authenticated key exchange protocol
Naresh et al. Secure lightweight multi‐party key agreement based on hyperelliptic curve Diffie–Hellman for constraint networks
Chung The design of authentication key protocol in certificate‐free public key cryptosystem
Zhong Identity-based mix: Anonymous communications without public key certificates

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties