ATE501559T1 - Digitales signaturverfahren auf der basis von flechtgruppen-konjugiertheit und verifizierverfahren dafür - Google Patents

Digitales signaturverfahren auf der basis von flechtgruppen-konjugiertheit und verifizierverfahren dafür

Info

Publication number
ATE501559T1
ATE501559T1 AT04797321T AT04797321T ATE501559T1 AT E501559 T1 ATE501559 T1 AT E501559T1 AT 04797321 T AT04797321 T AT 04797321T AT 04797321 T AT04797321 T AT 04797321T AT E501559 T1 ATE501559 T1 AT E501559T1
Authority
AT
Austria
Prior art keywords
signature
braid
message
sign
digital signature
Prior art date
Application number
AT04797321T
Other languages
English (en)
Inventor
Yong Ding
Jianyong Chen
Zhiwei Peng
Original Assignee
Zte Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corp filed Critical Zte Corp
Application granted granted Critical
Publication of ATE501559T1 publication Critical patent/ATE501559T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/68Special signature format, e.g. XML format

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Algebra (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Investigating Or Analysing Biological Materials (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
AT04797321T 2003-11-13 2004-11-12 Digitales signaturverfahren auf der basis von flechtgruppen-konjugiertheit und verifizierverfahren dafür ATE501559T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2003101136049A CN1545242A (zh) 2003-11-13 2003-11-13 一种基于辫群共轭问题的数字签名方法
PCT/CN2004/001289 WO2005048525A1 (en) 2003-11-13 2004-11-12 A digital signature method based on braid groups conjugacy and verify method thereof

Publications (1)

Publication Number Publication Date
ATE501559T1 true ATE501559T1 (de) 2011-03-15

Family

ID=34336936

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04797321T ATE501559T1 (de) 2003-11-13 2004-11-12 Digitales signaturverfahren auf der basis von flechtgruppen-konjugiertheit und verifizierverfahren dafür

Country Status (6)

Country Link
US (1) US7725724B2 (de)
EP (1) EP1691503B1 (de)
CN (1) CN1545242A (de)
AT (1) ATE501559T1 (de)
DE (1) DE602004031755D1 (de)
WO (1) WO2005048525A1 (de)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7716139B2 (en) * 2004-10-29 2010-05-11 Research In Motion Limited System and method for verifying digital signatures on certificates
JP2007004461A (ja) * 2005-06-23 2007-01-11 Nec Corp サービス提供システム、アウトソーシング業者装置、サービス提供方法およびプログラム
US7849037B2 (en) * 2006-10-09 2010-12-07 Brooks Roger K Method for using the fundamental homotopy group in assessing the similarity of sets of data
US7822700B2 (en) * 2006-12-29 2010-10-26 Brooks Roger K Method for using lengths of data paths in assessing the morphological similarity of sets of data by using equivalence signatures
US7890763B1 (en) * 2007-09-14 2011-02-15 The United States Of America As Represented By The Director, National Security Agency Method of identifying invalid digital signatures involving batch verification
WO2011119137A1 (en) 2010-03-22 2011-09-29 Lrdc Systems, Llc A method of identifying and protecting the integrity of a set of source data
CN102340483B (zh) * 2010-07-15 2015-05-06 航天信息股份有限公司 民主群签名的生成、验证、追踪方法和民主群签名系统
RU2450457C1 (ru) * 2011-05-20 2012-05-10 Государственное образовательное учреждение высшего профессионального образования Марийский государственный технический университет Способ шифрования
US8832450B2 (en) * 2012-05-31 2014-09-09 Apple Inc. Methods and apparatus for data hashing based on non-linear operations
US10148285B1 (en) 2012-07-25 2018-12-04 Erich Schmitt Abstraction and de-abstraction of a digital data stream
CN105814859B (zh) * 2013-12-31 2019-04-19 华为终端(东莞)有限公司 一种网络配置方法、相关装置及系统
US10795858B1 (en) 2014-02-18 2020-10-06 Erich Schmitt Universal abstraction and de-abstraction of a digital data stream
US20190215148A1 (en) * 2018-01-11 2019-07-11 Shenzhen University Method of establishing anti-attack public key cryptogram
WO2021223090A1 (zh) * 2020-05-06 2021-11-11 深圳大学 建立共享密钥的方法及装置
US12452084B2 (en) * 2021-05-06 2025-10-21 University Of South Florida Lightweight post-quantum authentication
CN113312654B (zh) * 2021-06-29 2023-05-12 重庆交通大学 一种基于csp问题的同态密文编码与计算方法
CN115484018B (zh) * 2022-08-19 2024-11-05 天津理工大学 一种基于共轭搜索问题的leveled同态加密方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6493449B2 (en) 1998-02-26 2002-12-10 Arithmetica, Inc. Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids
CN1256463A (zh) * 1999-11-25 2000-06-14 赵风光 一种新型数字签名体制和装置
FR2831738B1 (fr) 2001-10-25 2003-12-19 France Telecom Procede cryptographique a cle publique base sur les groupes de tresses
ATE448645T1 (de) 2002-03-06 2009-11-15 Ericsson Telefon Ab L M Dienstbereitstellung in einem telekommunikationssystem mit verbindungssteuerdienstfähigkeitsservern
US7133523B2 (en) * 2002-12-20 2006-11-07 Pitney Bowes Inc. Method and system for solving the word problem in braid group cryptosystems

Also Published As

Publication number Publication date
EP1691503A1 (de) 2006-08-16
US20070104322A1 (en) 2007-05-10
DE602004031755D1 (de) 2011-04-21
EP1691503A4 (de) 2007-06-20
US7725724B2 (en) 2010-05-25
WO2005048525A1 (en) 2005-05-26
CN1545242A (zh) 2004-11-10
EP1691503B1 (de) 2011-03-09

Similar Documents

Publication Publication Date Title
ATE501559T1 (de) Digitales signaturverfahren auf der basis von flechtgruppen-konjugiertheit und verifizierverfahren dafür
CN109067524B (zh) 一种公私钥对生成方法及系统
ATE419690T1 (de) Hierarchische verchlüsselung auf identitätsbasis und signaturschemata
EP2951949B1 (de) Modifizierter sm2-signaturalgorithmus mit elliptischer kurve zur nachrichtenwiederherstellung
KR100966071B1 (ko) 겹선형 사상을 이용한 다자간 키 공유 방법 및 그 시스템
CN110225023B (zh) 一种可追踪的匿名认证方法和系统
CN110971411B (zh) 一种基于sotp技术对私钥乘加密的sm2同态签名方法
DE60326899D1 (de) Sicheres Digitaldatenformat und kodeerzwungene Verfahrensweise
Shankar et al. Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm
CN109728896A (zh) 一种基于区块链的来电认证和溯源方法及流程
Nia et al. An introduction to digital signature schemes
CA2305896A1 (en) Key validation scheme
CN111010265A (zh) 基于分层密钥和bls数字签名的区块链组织密钥管理方法
CN105656634A (zh) 车载自组织网络中无配对运算的隐私保护批量认证方法
CN102291396A (zh) 可信平台远程证明的匿名认证算法
CN111431715B (zh) 一种支持隐私保护的策略控制签名方法
CN1700639A (zh) 导出和导入无线局域网鉴别与保密基础结构证书信息方法
Huang et al. Leakage-resilient ring signature schemes
KR100974628B1 (ko) 무선 센서 네트워크에서의 브로드 캐스팅 메시지 인증을 통한 그룹키 분배 방법, 그 시스템 및 이를 기록한 기록매체
Jiang et al. An anonymous communication scheme based on ring signature in VANETs
US20100082974A1 (en) Parallel document processing
CN105703903B (zh) 一种基于公钥密码的多因素防伪方法及系统
US20050289349A1 (en) Method for generating and/or validating electronic signatures
CN118870348A (zh) 一种基于可编辑区块链的匿名车辆公告方法
CN115174101B (zh) 一种基于sm2算法的可否认环签名生成方法及系统

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties