DE60315853D1 - Verfahren zur Entschlüsselung einer Nachricht - Google Patents

Verfahren zur Entschlüsselung einer Nachricht

Info

Publication number
DE60315853D1
DE60315853D1 DE60315853T DE60315853T DE60315853D1 DE 60315853 D1 DE60315853 D1 DE 60315853D1 DE 60315853 T DE60315853 T DE 60315853T DE 60315853 T DE60315853 T DE 60315853T DE 60315853 D1 DE60315853 D1 DE 60315853D1
Authority
DE
Germany
Prior art keywords
decrypting
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60315853T
Other languages
English (en)
Inventor
Roberto Valerio Sannino
Fabio Sozzani
Guido Marco Bertoni
Gerardo Pelosi
Pasqualina Fragneto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
STMicroelectronics SRL
Original Assignee
STMicroelectronics SRL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by STMicroelectronics SRL filed Critical STMicroelectronics SRL
Application granted granted Critical
Publication of DE60315853D1 publication Critical patent/DE60315853D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
DE60315853T 2003-12-24 2003-12-24 Verfahren zur Entschlüsselung einer Nachricht Expired - Lifetime DE60315853D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP03425824A EP1548976B1 (de) 2003-12-24 2003-12-24 Verfahren zur Entschlüsselung einer Nachricht

Publications (1)

Publication Number Publication Date
DE60315853D1 true DE60315853D1 (de) 2007-10-04

Family

ID=34530879

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60315853T Expired - Lifetime DE60315853D1 (de) 2003-12-24 2003-12-24 Verfahren zur Entschlüsselung einer Nachricht

Country Status (3)

Country Link
US (2) US7925010B2 (de)
EP (1) EP1548976B1 (de)
DE (1) DE60315853D1 (de)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7349538B2 (en) * 2002-03-21 2008-03-25 Ntt Docomo Inc. Hierarchical identity-based encryption and signature schemes
US7657748B2 (en) 2002-08-28 2010-02-02 Ntt Docomo, Inc. Certificate-based encryption and public key infrastructure
CA2458123C (en) * 2003-03-13 2012-05-15 Synodon Inc. Remote sensing of gas leaks
EP1533971A1 (de) * 2003-11-18 2005-05-25 STMicroelectronics S.r.l. Vorrichtung und Verfahren zum Aufbau einer sicheren Kommunikation
DE60315853D1 (de) 2003-12-24 2007-10-04 St Microelectronics Srl Verfahren zur Entschlüsselung einer Nachricht
US20060078790A1 (en) * 2004-10-05 2006-04-13 Polyplus Battery Company Solid electrolytes based on lithium hafnium phosphate for active metal anode protection
US20100046755A1 (en) * 2005-12-07 2010-02-25 Fiske Software Llc Cryptography related to keys with signature
CN101371613B (zh) * 2006-01-11 2013-04-10 高通股份有限公司 涉及包括无线终端信标信号使用的时基和/或同步的方法和装置
US8811369B2 (en) 2006-01-11 2014-08-19 Qualcomm Incorporated Methods and apparatus for supporting multiple communications modes of operation
FI20065564A0 (fi) * 2006-09-13 2006-09-13 Eads Secure Networks Oy Matkaviestimen autentikointi
FI118841B (fi) * 2006-09-13 2008-03-31 Eads Secure Networks Oy Matkaviestimen autentikointi
WO2009108373A2 (en) * 2008-02-27 2009-09-03 Fisher-Rosemount Systems, Inc. Join key provisioning of wireless devices
US8595501B2 (en) * 2008-05-09 2013-11-26 Qualcomm Incorporated Network helper for authentication between a token and verifiers
US8675864B2 (en) * 2010-09-14 2014-03-18 CompuGroup Medical AG Apparatus for encrypting data
US20120191977A1 (en) * 2011-01-25 2012-07-26 Merquery Financial Systems, Llc Secure transaction facilitator
US8661240B2 (en) 2011-04-29 2014-02-25 International Business Machines Corporation Joint encryption of data
US8526604B2 (en) * 2011-09-23 2013-09-03 Gainspan Corporation Enabling wireless clients for low-power operation when clients require control messages from external sources for communication
KR101301609B1 (ko) * 2012-05-31 2013-08-29 서울대학교산학협력단 비밀키 생성 장치 및 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
EP3320647B1 (de) * 2015-07-09 2020-11-18 Nokia Technologies Oy Auf token basierende authentifizierung
CN105978691B (zh) * 2016-07-26 2019-02-01 西安酷派软件科技有限公司 私钥备份方法、Softsim在终端间切换的方法及相关装置
US10230700B2 (en) * 2016-08-09 2019-03-12 Lenovo (Singapore) Pte. Ltd. Transaction based message security
CN109039599B (zh) * 2018-07-06 2021-02-23 山东师范大学 支持盲密钥发行的属性基加解密方法及加解密系统
WO2020242614A1 (en) 2019-05-30 2020-12-03 Kim Bong Mann Quantum safe cryptography and advanced encryption and key exchange (aeke) method for symmetric key encryption/exchange

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623546A (en) * 1995-06-23 1997-04-22 Motorola, Inc. Encryption method and system for portable data
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
WO1997031449A1 (fr) * 1996-02-21 1997-08-28 Card Call Service Co., Ltd. Methode de communication utilisant une cle cryptographique commune
US7366900B2 (en) 1997-02-12 2008-04-29 Verizon Laboratories, Inc. Platform-neutral system and method for providing secure remote operations over an insecure computer network
US5922074A (en) 1997-02-28 1999-07-13 Xcert Software, Inc. Method of and apparatus for providing secure distributed directory services and public key infrastructure
US6131090A (en) * 1997-03-04 2000-10-10 Pitney Bowes Inc. Method and system for providing controlled access to information stored on a portable recording medium
JPH1115373A (ja) * 1997-06-20 1999-01-22 Fuji Xerox Co Ltd 公開鍵暗号方式
US7194092B1 (en) 1998-10-26 2007-03-20 Microsoft Corporation Key-based secure storage
US7142676B1 (en) 1999-06-08 2006-11-28 Entrust Limited Method and apparatus for secure communications using third-party key provider
US6940980B2 (en) 2000-12-19 2005-09-06 Tricipher, Inc. High security cryptosystem
JP2003016397A (ja) 2001-04-23 2003-01-17 Sony Corp データ処理システム、メモリデバイス、データ処理装置、およびデータ処理方法、並びにプログラム
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
CA2849630C (en) 2002-03-08 2016-01-26 Certicom Corp. Local area network
US7353395B2 (en) 2002-03-21 2008-04-01 Ntt Docomo Inc. Authenticated ID-based cryptosystem with no key escrow
US6792534B2 (en) 2002-03-22 2004-09-14 General Instrument Corporation End-to end protection of media stream encryption keys for voice-over-IP systems
GB0215524D0 (en) * 2002-07-05 2002-08-14 Hewlett Packard Co Method and apparatus for generating a cryptographic key
GB0216690D0 (en) 2002-07-18 2002-08-28 Hewlett Packard Co Method and appatatus for encrypting data
SG145524A1 (en) 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
GB0221639D0 (en) 2002-09-17 2002-10-30 Hewlett Packard Co Method and apparatus for printing
US7373138B2 (en) 2002-11-21 2008-05-13 Motorola Inc. Mobile wireless communications device enablement and methods therefor
GB2399906B (en) 2003-03-22 2006-10-04 Hewlett Packard Development Co Method and system for delegating authority and access control methods based on delegated authority
EP1533971A1 (de) 2003-11-18 2005-05-25 STMicroelectronics S.r.l. Vorrichtung und Verfahren zum Aufbau einer sicheren Kommunikation
DE60315853D1 (de) 2003-12-24 2007-10-04 St Microelectronics Srl Verfahren zur Entschlüsselung einer Nachricht

Also Published As

Publication number Publication date
EP1548976A1 (de) 2005-06-29
US7925010B2 (en) 2011-04-12
EP1548976B1 (de) 2007-08-22
US8223970B2 (en) 2012-07-17
US20110058672A1 (en) 2011-03-10
US20050169464A1 (en) 2005-08-04

Similar Documents

Publication Publication Date Title
DE60315853D1 (de) Verfahren zur Entschlüsselung einer Nachricht
DE60328844D1 (de) Verfahren zur Tonererstellung
DE60136755D1 (de) Verfahren zur effizienten reaktiven Überwachung
DE60116949D1 (de) Verfahren zur Gesichtsfindung
DE60328623D1 (de) Verfahren zur farbauswahl
DE60334066D1 (de) Verfahren zur weiterreichung einer datensitzung
DE60214921D1 (de) Verfahren zur Entgasung einer Tinte
DE602004014623D1 (de) System zur Einführung einer Prothese
DE60130944D1 (de) Verfahren zur Datenübertragung
DE602005003758D1 (de) Verfahren und System zur Generierung einer gemeinsamen Information
DE60321883D1 (de) Verfahren zur Herstellung einer Vorrichtung
DE502004003498D1 (de) Verfahren zur ermittlung einer parklücke
DE602005003082D1 (de) Verfahren zur Herstellung einer Vorrichtung
DE50114485D1 (de) Verfahren zur sichtweitenbestimmung
DE60215762D1 (de) Verfahren zur Herstellung einer Mehrfachlodplatte
DE60138344D1 (de) Verfahren zur Mutagenese
DE60124884D1 (de) Verfahren zur verbesserung der fotomaskengeometrie
DE60323051D1 (de) Verfahren zur Herstellung einer Vorrichtung
DE60239830D1 (de) Verfahren zur herstellung einer hitzebeständigen stahlfeder
DE50110859D1 (de) Verfahren zur Datenübertragung
DE602005012184D1 (de) Verfahren und Vorrichtung zur Auswahl einer Kodierungsart
DE60301147D1 (de) RC4 Verfahren zur Verschlüsselung von Paketen
DE60215484D1 (de) Verfahren zur herstellung einer flanschverbindung
DE502004012455D1 (de) Verfahren zur Herstellung einer Lötstoppbarriere
DE50312546D1 (de) Verfahren zur Zylindergleichstellung

Legal Events

Date Code Title Description
8332 No legal effect for de