WO2003017559A2 - Systems and methods for identity-based encryption and related cryptographic techniques - Google Patents
Systems and methods for identity-based encryption and related cryptographic techniques Download PDFInfo
- Publication number
- WO2003017559A2 WO2003017559A2 PCT/US2002/027155 US0227155W WO03017559A2 WO 2003017559 A2 WO2003017559 A2 WO 2003017559A2 US 0227155 W US0227155 W US 0227155W WO 03017559 A2 WO03017559 A2 WO 03017559A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- message
- receiver
- computing
- sender
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
- Facsimile Transmission Control (AREA)
- Detergent Compositions (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE60236094T DE60236094D1 (en) | 2001-08-13 | 2002-08-13 | Identity-based encryption systems and methods and related cryptographic techniques |
JP2003521528A JP2005500740A (en) | 2001-08-13 | 2002-08-13 | ID-based encryption and related cryptosystem systems and methods |
EP02794941A EP1425874B1 (en) | 2001-08-13 | 2002-08-13 | Systems and methods for identity-based encryption and related cryptographic techniques |
AU2002332671A AU2002332671A1 (en) | 2001-08-13 | 2002-08-13 | Systems and methods for identity-based encryption and related cryptographic techniques |
AT02794941T ATE465571T1 (en) | 2001-08-13 | 2002-08-13 | SYSTEMS AND METHODS FOR IDENTITY-BASED ENCRYPTION AND RELATED CRYPTOGRAPHIC TECHNIQUES |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US31194601P | 2001-08-13 | 2001-08-13 | |
US60/311,946 | 2001-08-13 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2003017559A2 true WO2003017559A2 (en) | 2003-02-27 |
WO2003017559A3 WO2003017559A3 (en) | 2003-07-10 |
Family
ID=23209176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/027155 WO2003017559A2 (en) | 2001-08-13 | 2002-08-13 | Systems and methods for identity-based encryption and related cryptographic techniques |
Country Status (7)
Country | Link |
---|---|
US (4) | US7113594B2 (en) |
EP (3) | EP2429116B1 (en) |
JP (4) | JP2005500740A (en) |
AT (1) | ATE465571T1 (en) |
AU (1) | AU2002332671A1 (en) |
DE (1) | DE60236094D1 (en) |
WO (1) | WO2003017559A2 (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2390516A (en) * | 2002-07-05 | 2004-01-07 | Hewlett Packard Development Co | Generating a cryptographic key |
GB2390515A (en) * | 2002-07-05 | 2004-01-07 | Hewlett Packard Development Co | Verifying An Association Between Two Parties |
GB2401009A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier-based encryption |
GB2401015A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Security method and apparatus using biometric data |
GB2401012A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier-based encryption |
EP1471680A1 (en) * | 2003-04-23 | 2004-10-27 | Hewlett-Packard Development Company, L.P. | Identifier-Based Encryption method and apparatus |
GB2401008A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier based encryption |
GB2401763A (en) * | 2002-07-05 | 2004-11-17 | Hewlett Packard Development Co | Trusted Authority for Identifier-Based Cryptography |
GB2402852A (en) * | 2003-06-13 | 2004-12-15 | Hewlett Packard Development Co | Mediated RSA cryptographic method and system using blinding |
GB2407740A (en) * | 2003-11-01 | 2005-05-04 | Hewlett Packard Development Co | Identifier-based signcryption |
WO2005065141A2 (en) | 2003-12-22 | 2005-07-21 | Voltage Security, Inc. | Identity-based-encryption message management system |
WO2005096545A1 (en) * | 2004-03-30 | 2005-10-13 | Dublin City University | Verification of identity based signatures |
EP1621956A1 (en) * | 2004-07-30 | 2006-02-01 | Irdeto Access B.V. | Method of providing rights data objects |
WO2006051517A1 (en) * | 2004-11-12 | 2006-05-18 | Dublin City University | Identity based encryption |
GB2421097A (en) * | 2004-12-10 | 2006-06-14 | Hewlett Packard Development Co | Identity based encryption for software distribution |
EP1675300A1 (en) * | 2004-12-23 | 2006-06-28 | Hewlett-Packard Development Company, L.P. | Improvements in the use of bilinear mappings in cryptographic applications |
JP2006184831A (en) * | 2004-12-28 | 2006-07-13 | Nippon Telegr & Teleph Corp <Ntt> | Key generating device, encryption device, inspection device, decryption device, and key generating program, encryption program, inspection program, decryption program |
WO2007011071A1 (en) * | 2005-07-22 | 2007-01-25 | Nec Corporation | Time apparatus, encrypting apparatus, decrypting apparatus, and encrypting/decrypting system |
JP2007507175A (en) * | 2003-09-25 | 2007-03-22 | ボルテージ セキュリティー, インコーポレイテッド | Secure message system with remote decryption service |
WO2007042419A1 (en) * | 2005-10-14 | 2007-04-19 | Gemplus | Cryptographic method using an identity-based encryption system |
WO2007138182A1 (en) * | 2006-05-31 | 2007-12-06 | Oberthur Technologies | Process of generation of a private key and coding/decoding processes of a message |
JP2007336241A (en) * | 2006-06-15 | 2007-12-27 | Toyo Networks & System Integration Co Ltd | Electronic check collation system |
US7382877B2 (en) | 2003-06-13 | 2008-06-03 | Hewlett-Packard Development Company, L.P. | RSA cryptographic method and system |
EP1971072A1 (en) * | 2005-12-01 | 2008-09-17 | NEC Corporation | Electronic bidding system and electronic bidding method |
AU2004218638B2 (en) * | 2003-11-03 | 2009-07-30 | Microsoft Technology Licensing, Llc | Use of isogenies for design of cryptosystems |
US7650498B2 (en) * | 2003-04-17 | 2010-01-19 | Hewlett-Packard Development Company, L.P. | Secure data provision method and apparatus and data recovery method and system |
US7693279B2 (en) | 2003-04-23 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Security method and apparatus using biometric data |
EP2222016A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
WO2010044056A3 (en) * | 2008-10-14 | 2010-09-16 | Koninklijke Philips Electronics N.V. | Method and apparatus for pseudonym generation and authentication |
US7801302B2 (en) | 2004-06-11 | 2010-09-21 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
CN101420303B (en) * | 2008-12-12 | 2011-02-02 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
US7986778B2 (en) | 2004-06-23 | 2011-07-26 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
US8111826B2 (en) | 2006-01-11 | 2012-02-07 | Mitsubishi Electric Corporation | Apparatus for generating elliptic curve cryptographic parameter, apparatus for processing elliptic curve cryptograph, program for generating elliptic curve cryptographic parameter, and program for processing elliptic cyptograph |
US8285996B2 (en) | 2005-03-30 | 2012-10-09 | Dublin City University | Verification of identity based signatures |
JP2013140402A (en) * | 2003-10-28 | 2013-07-18 | Certicom Corp | Method and apparatus for verifiably generating public keys |
US8510558B2 (en) | 2009-02-17 | 2013-08-13 | Alcatel Lucent | Identity based authenticated key agreement protocol |
US8589679B2 (en) | 2004-07-15 | 2013-11-19 | Hewlett-Packard Development Company, L.P. | Identifier-based signcryption with two trusted authorities |
US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
WO2018224941A1 (en) * | 2017-06-07 | 2018-12-13 | nChain Holdings Limited | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network |
CN111698095A (en) * | 2020-06-17 | 2020-09-22 | 南京如般量子科技有限公司 | Data chain quantum computation resistant communication method and system based on ID cryptography and symmetric key pool |
CN112019335A (en) * | 2020-09-18 | 2020-12-01 | 上海市数字证书认证中心有限公司 | Multi-party cooperative encryption and decryption method, device, system and medium based on SM2 algorithm |
CN112528312A (en) * | 2020-12-24 | 2021-03-19 | 贵州大学 | Signcryption method and system based on Cocks identity cryptosystem |
CN113312608A (en) * | 2021-04-23 | 2021-08-27 | 中国电力科学研究院有限公司 | Electric power metering terminal identity authentication method and system based on timestamp |
CN114065171A (en) * | 2021-11-11 | 2022-02-18 | 北京海泰方圆科技股份有限公司 | Identity authentication method, device, system, equipment and medium |
EP3879747A4 (en) * | 2018-12-29 | 2022-08-10 | Shanghai Weilian Information Technology Co., Ltd. | Key security management system and method, medium, and computer program |
Families Citing this family (363)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10114157A1 (en) * | 2001-03-22 | 2002-09-26 | Deutsche Telekom Ag | Computer-aided encryption key generation method provides public encryption key with common first part and second part specific to each receiver |
US7577250B2 (en) | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
US8077861B2 (en) | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
US7564970B2 (en) * | 2004-08-12 | 2009-07-21 | Cmla, Llc | Exponential data transform to enhance security |
WO2003017559A2 (en) * | 2001-08-13 | 2003-02-27 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
JP3901484B2 (en) * | 2001-10-05 | 2007-04-04 | 株式会社ジェイテクト | Electric power steering device |
GB0124681D0 (en) * | 2001-10-15 | 2001-12-05 | Hewlett Packard Co | Method and apparatus for encrypting data |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7921450B1 (en) * | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
CN101483523A (en) * | 2002-04-15 | 2009-07-15 | 株式会社Ntt都科摩 | Signature schemes using bilinear mappings |
GB0208858D0 (en) * | 2002-04-18 | 2002-05-29 | Hewlett Packard Co | Method and apparatus for encrypting/decrypting data |
GB2390703A (en) * | 2002-07-02 | 2004-01-14 | Ascent Group Ltd | Storage and authentication of data transactions |
US20050089173A1 (en) * | 2002-07-05 | 2005-04-28 | Harrison Keith A. | Trusted authority for identifier-based cryptography |
SG145524A1 (en) * | 2002-08-07 | 2008-09-29 | Mobilastic Technologies Pte Lt | Secure transfer of digital tokens |
US20040044734A1 (en) * | 2002-08-27 | 2004-03-04 | Mark Beck | Enhanced services electronic mail |
AU2003262908A1 (en) * | 2002-08-28 | 2004-03-19 | Docomo Communications Laboratories Usa, Inc. | Certificate-based encryption and public key infrastructure |
KR100489327B1 (en) * | 2002-09-18 | 2005-05-12 | 학교법인 한국정보통신학원 | Identification scheme based on the bilinear diffie-hellman problem |
US7486795B2 (en) * | 2002-09-20 | 2009-02-03 | University Of Maryland | Method and apparatus for key management in distributed sensor networks |
US7412059B1 (en) | 2002-11-27 | 2008-08-12 | Voltage Security, Inc. | Public-key encryption system |
KR20030008182A (en) * | 2002-12-24 | 2003-01-24 | 학교법인 한국정보통신학원 | Method of id-based blind signature by using bilinear parings |
KR20030008183A (en) * | 2002-12-24 | 2003-01-24 | 학교법인 한국정보통신학원 | Method of id-based ring signature by using bilinear parings |
ATE444617T1 (en) * | 2003-01-07 | 2009-10-15 | Qualcomm Inc | SYSTEM, APPARATUS AND METHOD FOR EXCHANGING A CRYPTOGRAPHIC KEY |
US7003117B2 (en) | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
US8108678B1 (en) * | 2003-02-10 | 2012-01-31 | Voltage Security, Inc. | Identity-based signcryption system |
US7480384B2 (en) * | 2003-02-10 | 2009-01-20 | International Business Machines Corporation | Method for distributing and authenticating public keys using random numbers and Diffie-Hellman public keys |
US7783044B2 (en) * | 2003-02-20 | 2010-08-24 | Proofpoint, Inc. | System for on-line and off-line decryption |
GB2398713B (en) * | 2003-02-22 | 2005-11-30 | Hewlett Packard Development Co | Limiting service provision to group members |
US7571321B2 (en) * | 2003-03-14 | 2009-08-04 | Voltage Security, Inc. | Identity-based-encryption messaging system |
KR100507809B1 (en) * | 2003-03-19 | 2005-08-17 | 학교법인 한국정보통신학원 | Anonymous fingerprinting scheme based on the bilinear pairings diffie-hellman problem |
US7921292B1 (en) | 2003-04-04 | 2011-04-05 | Voltage Security, Inc. | Secure messaging systems |
US20050021973A1 (en) * | 2003-04-23 | 2005-01-27 | Liqun Chen | Cryptographic method and apparatus |
AU2004201807A1 (en) * | 2003-05-09 | 2004-11-25 | Nor Azman Bin Abu | Method and apparatus for the generation of public key based on a user-defined ID in a cryptosystem |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7580521B1 (en) | 2003-06-25 | 2009-08-25 | Voltage Security, Inc. | Identity-based-encryption system with hidden public key attributes |
US7017181B2 (en) * | 2003-06-25 | 2006-03-21 | Voltage Security, Inc. | Identity-based-encryption messaging system with public parameter host servers |
DE10330089B4 (en) * | 2003-07-03 | 2014-02-27 | Bt Ignite Gmbh & Co. | Method and apparatus for transmitting decryption codes for freely transmitted, encrypted program content to uniquely identifiable recipients |
KR20030062401A (en) * | 2003-07-04 | 2003-07-25 | 학교법인 한국정보통신학원 | Apparatus and method for generating and verifying id-based blind signature by using bilinear parings |
US7298839B2 (en) * | 2003-07-25 | 2007-11-20 | Microsoft Corporation | Squared Weil and Tate pairing techniques for use with elliptic curves |
US7769167B2 (en) | 2003-07-25 | 2010-08-03 | Microsoft Corporation | Weil and Tate pairing techniques using parabolas |
US7440569B2 (en) * | 2003-07-28 | 2008-10-21 | Microsoft Corporation | Tate pairing techniques for use with hyperelliptic curves |
EP1519530A1 (en) * | 2003-09-29 | 2005-03-30 | STMicroelectronics S.r.l. | Method for establishing an encrypted communication by means of keys |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US7788496B2 (en) * | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US7979911B2 (en) * | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US7596704B2 (en) * | 2003-10-10 | 2009-09-29 | Jing-Jang Hwang | Partition and recovery of a verifiable digital secret |
US7487537B2 (en) * | 2003-10-14 | 2009-02-03 | International Business Machines Corporation | Method and apparatus for pervasive authentication domains |
US7103911B2 (en) * | 2003-10-17 | 2006-09-05 | Voltage Security, Inc. | Identity-based-encryption system with district policy information |
US20050135610A1 (en) * | 2003-11-01 | 2005-06-23 | Liqun Chen | Identifier-based signcryption |
US20050187863A1 (en) * | 2004-02-20 | 2005-08-25 | Whinery Christopher S. | Method and system for protecting real estate from fraudulent transactions |
US7646872B2 (en) * | 2004-04-02 | 2010-01-12 | Research In Motion Limited | Systems and methods to securely generate shared keys |
US8050409B2 (en) * | 2004-04-02 | 2011-11-01 | University Of Cincinnati | Threshold and identity-based key management and authentication for wireless ad hoc networks |
US7590236B1 (en) * | 2004-06-04 | 2009-09-15 | Voltage Security, Inc. | Identity-based-encryption system |
KR100657265B1 (en) | 2004-06-23 | 2006-12-14 | 삼성전자주식회사 | Self-enforcing method and method for transmitting and receiving contents using the same |
US20060013397A1 (en) * | 2004-07-13 | 2006-01-19 | International Business Machines Corporation | Channel adapter managed trusted queue pairs |
US7920050B2 (en) * | 2004-07-29 | 2011-04-05 | Emc Corporation | Proxy device for enhanced privacy in an RFID system |
KR101366185B1 (en) * | 2004-08-12 | 2014-02-24 | 씨엠엘에이 엘엘씨 | Permutation Data Transformation to Enhance Security |
US7742596B2 (en) * | 2004-08-24 | 2010-06-22 | General Dynamics C4 Systems, Inc. | Reliable elliptic curve cryptography computation |
WO2006034428A2 (en) * | 2004-09-20 | 2006-03-30 | Pgp Corporation | Apparatus and method for identity-based encryption within a conventional public-key infrastructure |
JP4752313B2 (en) * | 2004-09-30 | 2011-08-17 | ソニー株式会社 | Cryptographic processing operation method, cryptographic processing apparatus, and computer program |
US20060078790A1 (en) * | 2004-10-05 | 2006-04-13 | Polyplus Battery Company | Solid electrolytes based on lithium hafnium phosphate for active metal anode protection |
KR100601706B1 (en) * | 2004-10-15 | 2006-07-18 | 삼성전자주식회사 | Method and apparatus for sharing and generating system key in DRM |
US7418100B2 (en) * | 2004-10-20 | 2008-08-26 | Cisco Technology, Inc. | Enciphering method |
GB2419787B (en) * | 2004-10-28 | 2007-07-04 | Hewlett Packard Development Co | Method and apparatus for providing short-term private keys in public-key cryptographic systems |
US7660987B2 (en) * | 2004-10-29 | 2010-02-09 | Baylis Stephen W | Method of establishing a secure e-mail transmission link |
US7370202B2 (en) * | 2004-11-02 | 2008-05-06 | Voltage Security, Inc. | Security device for cryptographic communications |
FR2877453A1 (en) * | 2004-11-04 | 2006-05-05 | France Telecom | SECURE DELEGATION METHOD OF CALCULATING A BILINE APPLICATION |
EP1815636B1 (en) * | 2004-11-11 | 2012-02-22 | Certicom Corp. | New trapdoor one-way function on elliptic curves and its application to asymmetric encryption and shorter signatures |
JP4546231B2 (en) * | 2004-12-09 | 2010-09-15 | 株式会社日立製作所 | ID-based signature and encryption system and method |
US7639799B2 (en) * | 2004-12-14 | 2009-12-29 | Microsoft Corporation | Cryptographically processing data based on a Cassels-Tate pairing |
US8099598B1 (en) * | 2005-01-03 | 2012-01-17 | Gary Gang Liu | Secure messaging system with automatic recipient enrollment |
US7869593B2 (en) * | 2005-01-07 | 2011-01-11 | First Data Corporation | Software for providing based on shared knowledge public keys having same private key |
CN1262087C (en) * | 2005-01-14 | 2006-06-28 | 南相浩 | Method and apparatus for cipher key generation based on identification |
US20060159269A1 (en) * | 2005-01-20 | 2006-07-20 | Matsushita Electric Industrial Co., Ltd. | Cryptographic system for resource starved CE device secure upgrade and re-configuration |
EP1844392B1 (en) * | 2005-01-21 | 2012-07-04 | Certicom Corp. | Elliptic curve random number generation |
US7860802B2 (en) * | 2005-02-01 | 2010-12-28 | Microsoft Corporation | Flexible licensing architecture in content rights management systems |
US7594261B2 (en) * | 2005-02-08 | 2009-09-22 | Microsoft Corporation | Cryptographic applications of the Cartier pairing |
EP1851902A1 (en) * | 2005-02-25 | 2007-11-07 | QUALCOMM Incorporated | Small public-key based digital signatures for authentication |
US7822200B2 (en) * | 2005-03-07 | 2010-10-26 | Microsoft Corporation | Method and system for asymmetric key security |
US7739500B2 (en) * | 2005-03-07 | 2010-06-15 | Microsoft Corporation | Method and system for consistent recognition of ongoing digital relationships |
US7702098B2 (en) * | 2005-03-15 | 2010-04-20 | Microsoft Corporation | Elliptic curve point octupling for weighted projective coordinates |
US7680268B2 (en) | 2005-03-15 | 2010-03-16 | Microsoft Corporation | Elliptic curve point octupling using single instruction multiple data processing |
US7657456B2 (en) | 2005-03-18 | 2010-02-02 | Pitney Bowes Inc. | Method and system for electronic voting using identity based encryption |
US7634085B1 (en) * | 2005-03-25 | 2009-12-15 | Voltage Security, Inc. | Identity-based-encryption system with partial attribute matching |
US20060238303A1 (en) * | 2005-04-21 | 2006-10-26 | Sean Loving | Adaptable RFID reader |
US20060253415A1 (en) * | 2005-04-21 | 2006-11-09 | Sayan Chakraborty | Data-defined communication device |
US20070046467A1 (en) * | 2005-08-31 | 2007-03-01 | Sayan Chakraborty | System and method for RFID reader to reader communication |
US20060238304A1 (en) * | 2005-04-21 | 2006-10-26 | Sean Loving | System and method for adapting an FRID tag reader to its environment |
US7570164B2 (en) * | 2005-12-30 | 2009-08-04 | Skyetek, Inc. | System and method for implementing virtual RFID tags |
US20060238305A1 (en) * | 2005-04-21 | 2006-10-26 | Sean Loving | Configurable RFID reader |
US7659819B2 (en) | 2005-04-21 | 2010-02-09 | Skyetek, Inc. | RFID reader operating system and associated architecture |
US20070046431A1 (en) * | 2005-08-31 | 2007-03-01 | Skyetek, Inc. | System and method for combining RFID tag memory |
US20060238302A1 (en) * | 2005-04-21 | 2006-10-26 | Sean Loving | System and method for configuring an RFID reader |
US8091142B2 (en) * | 2005-04-26 | 2012-01-03 | Microsoft Corporation | Supplementary trust model for software licensing/commercial digital distribution policy |
KR100635280B1 (en) * | 2005-04-27 | 2006-10-19 | 삼성전자주식회사 | Security method using electronic signature |
JP4646691B2 (en) * | 2005-05-10 | 2011-03-09 | 株式会社エヌ・ティ・ティ・データ | Encrypted communication system, secret key issuing device, and program |
US7720221B2 (en) * | 2005-05-20 | 2010-05-18 | Certicom Corp. | Privacy-enhanced e-passport authentication protocol |
JP4723909B2 (en) * | 2005-05-27 | 2011-07-13 | 株式会社日立製作所 | Data exchange method, data exchange management device, and data exchange management program |
US7649999B2 (en) * | 2005-06-08 | 2010-01-19 | Iris Anshel | Method and apparatus for establishing a key agreement protocol |
US8356175B2 (en) * | 2005-06-29 | 2013-01-15 | Intel Corporation | Methods and apparatus to perform associated security protocol extensions |
US8189788B2 (en) * | 2005-07-15 | 2012-05-29 | Tyfone, Inc. | Hybrid symmetric/asymmetric cryptography with user authentication |
US8477940B2 (en) * | 2005-07-15 | 2013-07-02 | Tyfone, Inc. | Symmetric cryptography with user authentication |
US7627760B2 (en) * | 2005-07-21 | 2009-12-01 | Microsoft Corporation | Extended authenticated key exchange |
US7694141B2 (en) | 2005-07-26 | 2010-04-06 | Microsoft Corporation | Extended authenticated key exchange with key confirmation |
US7908482B2 (en) * | 2005-08-18 | 2011-03-15 | Microsoft Corporation | Key confirmed authenticated key exchange with derived ephemeral keys |
US8190895B2 (en) * | 2005-08-18 | 2012-05-29 | Microsoft Corporation | Authenticated key exchange with derived ephemeral keys |
FR2890201A1 (en) * | 2005-08-31 | 2007-03-02 | Proton World Internatinal Nv | Digital data e.g. music files, storing method for e.g. digital floppy disk, involves encrypting digital data using symmetric algorithm with encryption key independent to recorder, and transferring key onto physical medium or microcircuit |
US20070206786A1 (en) * | 2005-08-31 | 2007-09-06 | Skyetek, Inc. | Rfid security system |
US20070104323A1 (en) * | 2005-11-04 | 2007-05-10 | Pitney Bowes Incorporated | Method and system for providing privacy to sender of a mail piece |
US9165411B2 (en) * | 2005-12-16 | 2015-10-20 | Pitney Bowes Inc. | Method and system for embedding mailer specified mailing instructions on a mail piece to automate mail processing |
US20080022160A1 (en) * | 2005-12-30 | 2008-01-24 | Skyetek, Inc. | Malware scanner for rfid tags |
US20070206797A1 (en) * | 2006-03-01 | 2007-09-06 | Skyetek, Inc. | Seamless rfid tag security system |
US8180047B2 (en) | 2006-01-13 | 2012-05-15 | Microsoft Corporation | Trapdoor pairings |
US9137012B2 (en) * | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
US8094810B2 (en) * | 2006-02-03 | 2012-01-10 | Massachusetts Institute Of Technology | Unidirectional proxy re-encryption |
GB2436910B (en) * | 2006-04-03 | 2011-02-16 | Identum Ltd | Electronic Data Communication System |
US8311214B2 (en) * | 2006-04-24 | 2012-11-13 | Motorola Mobility Llc | Method for elliptic curve public key cryptographic validation |
US9002018B2 (en) * | 2006-05-09 | 2015-04-07 | Sync Up Technologies Corporation | Encryption key exchange system and method |
US7434726B2 (en) * | 2006-05-15 | 2008-10-14 | Pitney Bowes Inc. | Method and system for postdating of financial transactions |
EP2022207B1 (en) * | 2006-05-31 | 2018-10-10 | Orange | Cryptographic method with integrated encryption and revocation, system, device and programs for implementing this method |
US9769158B2 (en) * | 2006-06-07 | 2017-09-19 | Red Hat, Inc. | Guided enrollment and login for token users |
JP4556917B2 (en) * | 2006-06-22 | 2010-10-06 | 日本電気株式会社 | Determination system, determination method, determination apparatus, and program |
US8670564B1 (en) | 2006-08-14 | 2014-03-11 | Key Holdings, LLC | Data encryption system and method |
EP1890493A1 (en) * | 2006-08-17 | 2008-02-20 | Nagracard S.A. | Method for revocating security modules used to secure broadcast messages |
JP5144991B2 (en) * | 2006-08-22 | 2013-02-13 | 株式会社エヌ・ティ・ティ・データ | Ciphertext decryption authority delegation system |
US20080065729A1 (en) * | 2006-09-08 | 2008-03-13 | Pitney Bowes Incorporated | Method and system for service provider to be compensated for delivering e-mail messages while reducing amount of unsolicited e-mail messages |
US7885406B2 (en) * | 2006-10-10 | 2011-02-08 | Microsoft Corporation | Computing endomorphism rings of Abelian surfaces over finite fields |
US8271788B2 (en) * | 2006-10-17 | 2012-09-18 | Trend Micro Incorporated | Software registration system |
US20080137859A1 (en) * | 2006-12-06 | 2008-06-12 | Ramanathan Jagadeesan | Public key passing |
JP2008152737A (en) * | 2006-12-20 | 2008-07-03 | Nippon Telegr & Teleph Corp <Ntt> | Service provision server, authentication server, and authentication system |
CN101617351B (en) * | 2007-01-19 | 2011-06-22 | 三菱电机株式会社 | Cryptogram generating device, cryptogram communication system, and group parameter generating device |
GB0705494D0 (en) * | 2007-03-22 | 2007-05-02 | Ibm | A method and system for a subscription to a symmetric key |
US20080290995A1 (en) * | 2007-03-30 | 2008-11-27 | Skyetek, Inc. | System and method for optimizing communication between an rfid reader and an rfid tag |
US8669845B1 (en) | 2007-03-30 | 2014-03-11 | Vail Resorts, Inc. | RFID skier monitoring systems and methods |
US7859411B2 (en) | 2007-03-30 | 2010-12-28 | Skyetek, Inc. | RFID tagged item trajectory and location estimation system and method |
US20080297326A1 (en) * | 2007-03-30 | 2008-12-04 | Skyetek, Inc. | Low Cost RFID Tag Security And Privacy System And Method |
WO2008122923A2 (en) * | 2007-04-05 | 2008-10-16 | International Business Machines Corporation | System and method for distribution of credentials |
US8705744B2 (en) * | 2007-04-05 | 2014-04-22 | Koninklijke Philips N.V. | Wireless sensor network key distribution |
JP2008301391A (en) * | 2007-06-04 | 2008-12-11 | Murata Mach Ltd | Broadcasting encryption system, encryption communication method, decoder and decoding program |
US8676715B2 (en) * | 2007-06-06 | 2014-03-18 | Pitney Bowes Inc. | System and method for authenticating indicia using identity-based signature scheme |
US9847977B2 (en) * | 2007-06-29 | 2017-12-19 | Microsoft Technology Licensing, Llc | Confidential mail with tracking and authentication |
US8631419B2 (en) * | 2007-06-29 | 2014-01-14 | Microsoft Corporation | System and methods for disruption detection, management, and recovery |
DE102007033848A1 (en) | 2007-07-18 | 2009-01-22 | Freisleben, Bernd, Prof. Dr. | Method for verification of ownership of terminal address of communications device in network, involves verifying ownership of terminal address by communications device belonging to it, by private cryptographic key |
DE102007033846A1 (en) | 2007-07-18 | 2009-01-22 | Freisleben, Bernd, Prof. Dr. | Cryptographic key generating method for encrypted digital communication between communication devices, involves converting end product address of communication device into part of key, and utilizing address for key agreement |
DE102007033847A1 (en) | 2007-07-18 | 2009-01-22 | Bernd Prof. Dr. Freisleben | Method for cryptographic key agreement between two communication devices in Internet protocol communications networks, involves arranging one or multiple Network address translation routers between two communication devices |
DE102007033845A1 (en) | 2007-07-18 | 2009-01-22 | Bernd Prof. Dr. Freisleben | Public/private cryptographic key producing method for executing key agreement in digital data carrier, involves converting terminal end point address into key portion by applying inverse function of trap door one-way function for agreement |
WO2009014735A2 (en) * | 2007-07-23 | 2009-01-29 | Motivepath, Inc. | System, method and apparatus for secure multiparty located based services |
KR101490687B1 (en) * | 2007-08-20 | 2015-02-06 | 삼성전자주식회사 | Method and apparatus for sharing secret information between devices in home network |
US7890763B1 (en) * | 2007-09-14 | 2011-02-15 | The United States Of America As Represented By The Director, National Security Agency | Method of identifying invalid digital signatures involving batch verification |
US8700894B2 (en) * | 2007-10-17 | 2014-04-15 | Pitney Bowes Inc. | Method and system for securing routing information of a communication using identity-based encryption scheme |
CA2703719C (en) * | 2007-10-26 | 2014-07-08 | Telcordia Technologies, Inc. | Method and system for secure session establishment using identity-based encryption (vdtls) |
JP5286748B2 (en) * | 2007-11-09 | 2013-09-11 | ソニー株式会社 | Information processing apparatus, key setting method, and program |
CN101179380A (en) * | 2007-11-19 | 2008-05-14 | 上海交通大学 | Bidirectional authentication method, system and network terminal |
JP4907502B2 (en) * | 2007-11-20 | 2012-03-28 | 日本電信電話株式会社 | Action certificate issuing method, action certificate issuing device, action certificate issuing program, and action certificate issuing / verifying system |
KR20090052199A (en) * | 2007-11-20 | 2009-05-25 | 삼성전자주식회사 | Storage device, terminal device using the storage device, and, method thereof |
JP5365072B2 (en) * | 2007-12-11 | 2013-12-11 | ソニー株式会社 | KEY GENERATION DEVICE, ENCRYPTION DEVICE, RECEPTION DEVICE, KEY GENERATION METHOD, ENCRYPTION METHOD, KEY PROCESSING METHOD, AND PROGRAM |
US20090153290A1 (en) * | 2007-12-14 | 2009-06-18 | Farpointe Data, Inc., A California Corporation | Secure interface for access control systems |
KR20100133953A (en) * | 2007-12-21 | 2010-12-22 | 코쿤 데이터 홀딩스 리미티드 | System and method for securing data |
CN101521569B (en) * | 2008-02-28 | 2013-04-24 | 华为技术有限公司 | Method, equipment and system for realizing service access |
KR101484110B1 (en) * | 2008-02-29 | 2015-01-28 | 삼성전자주식회사 | Memory controller and memory device thereof |
US8090108B2 (en) * | 2008-04-15 | 2012-01-03 | Adaptive Chips, Inc. | Secure debug interface and memory of a media security circuit and method |
US8045708B2 (en) * | 2008-05-21 | 2011-10-25 | Apple Inc. | Discrete key generation method and apparatus |
RU2505855C2 (en) * | 2008-05-23 | 2014-01-27 | Конинклейке Филипс Электроникс Н.В. | Identification-based data entity encryption for safe access thereof |
US8259949B2 (en) * | 2008-05-27 | 2012-09-04 | Intel Corporation | Methods and apparatus for protecting digital content |
JP5118556B2 (en) * | 2008-06-04 | 2013-01-16 | 日本電信電話株式会社 | Key distribution method, key distribution system, client device, key server device, and program thereof |
JP5027742B2 (en) * | 2008-06-19 | 2012-09-19 | 日本電信電話株式会社 | Secret information transmission system, secret information transmission method, secret information management server, encryption device, secret information transmission program |
US8656177B2 (en) * | 2008-06-23 | 2014-02-18 | Voltage Security, Inc. | Identity-based-encryption system |
US8761390B2 (en) * | 2008-06-30 | 2014-06-24 | Gm Global Technology Operations | Production of cryptographic keys for an embedded processing device |
US8737614B1 (en) * | 2008-07-07 | 2014-05-27 | Voltage Security, Inc. | Document imaging system with identity-based encryption |
CN101350060B (en) * | 2008-07-23 | 2011-06-01 | 西安西电捷通无线网络通信股份有限公司 | Data safety access method being suitable for electronic label |
US8108777B2 (en) | 2008-08-11 | 2012-01-31 | Microsoft Corporation | Sections of a presentation having user-definable properties |
WO2010019593A1 (en) | 2008-08-11 | 2010-02-18 | Assa Abloy Ab | Secure wiegand communications |
ES2485501T3 (en) * | 2008-08-14 | 2014-08-13 | Assa Abloy Ab | RFID reader with built-in attack detection heuristics |
US7995764B2 (en) * | 2008-08-28 | 2011-08-09 | Red Hat, Inc. | Sharing a secret using hyperplanes over GF(2m) |
US7995765B2 (en) * | 2008-08-28 | 2011-08-09 | Red Hat, Inc. | Sharing a secret using hyperplanes over GF(q) |
US8520854B2 (en) * | 2008-08-28 | 2013-08-27 | Red Hat, Inc. | Sharing a secret using polynomials over polynomials |
US8675877B2 (en) * | 2008-08-29 | 2014-03-18 | Red Hat, Inc. | Sharing a secret via linear interpolation |
US8559637B2 (en) | 2008-09-10 | 2013-10-15 | Verizon Patent And Licensing Inc. | Securing information exchanged via a network |
JP5491015B2 (en) * | 2008-09-25 | 2014-05-14 | Kddi株式会社 | Mediation apparatus and program for setting wireless communication channel |
JP4748206B2 (en) * | 2008-11-11 | 2011-08-17 | ソニー株式会社 | Information processing apparatus, information processing method, and program |
JP5097102B2 (en) * | 2008-12-25 | 2012-12-12 | 日本電信電話株式会社 | Hierarchical ID-based encryption device and decryption device, method thereof, program, and recording medium |
JP5134555B2 (en) * | 2009-01-07 | 2013-01-30 | 日本電信電話株式会社 | Key generation device, encryption device, decryption device, encryption system, key generation method, encryption method, decryption method, program, and recording medium |
JP5268066B2 (en) * | 2009-01-16 | 2013-08-21 | 日本電信電話株式会社 | Conversion operation device, method, program, and recording medium |
US8341427B2 (en) * | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
US8837718B2 (en) * | 2009-03-27 | 2014-09-16 | Microsoft Corporation | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store |
US9704159B2 (en) * | 2009-05-15 | 2017-07-11 | Entit Software Llc | Purchase transaction system with encrypted transaction information |
US8166203B1 (en) * | 2009-05-29 | 2012-04-24 | Google Inc. | Server selection based upon time and query dependent hashing |
EP2438580A2 (en) | 2009-06-02 | 2012-04-11 | Voltage Security, Inc. | Purchase transaction system with encrypted payment card data |
CN102474412A (en) * | 2009-07-17 | 2012-05-23 | 上海贝尔股份有限公司 | Digital rights management (DRM) method and equipment in small and medium enterprise (SME) and method for providing DRM service |
US8850203B2 (en) | 2009-08-28 | 2014-09-30 | Alcatel Lucent | Secure key management in multimedia communication system |
US8301883B2 (en) * | 2009-08-28 | 2012-10-30 | Alcatel Lucent | Secure key management in conferencing system |
US8510835B1 (en) | 2009-09-18 | 2013-08-13 | Trend Micro Incorporated | Techniques for protecting data in cloud computing environments |
US8826013B1 (en) | 2009-09-23 | 2014-09-02 | Trend Micro Incorporated | Protection of customer data in cloud virtual machines using a central management server |
US8219792B2 (en) * | 2009-10-06 | 2012-07-10 | Dell Products L.P. | System and method for safe information handling system boot |
JP4802274B2 (en) * | 2009-10-30 | 2011-10-26 | インターナショナル・ビジネス・マシーンズ・コーポレーション | How to send and receive messages |
US8666812B1 (en) * | 2009-11-10 | 2014-03-04 | Google Inc. | Distributing content based on transaction information |
US8219810B2 (en) * | 2009-11-13 | 2012-07-10 | Palo Alto Research Center Incorporated | Method and system for facilitating throttling of interpolation-based authentication |
JP5325755B2 (en) * | 2009-12-11 | 2013-10-23 | 株式会社エヌ・ティ・ティ・データ | Ciphertext decryption authority delegation system, ciphertext decryption authority delegation method, ciphertext conversion apparatus, decryption authority holder apparatus, and ciphertext conversion program |
EP2348447B1 (en) | 2009-12-18 | 2014-07-16 | CompuGroup Medical AG | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device |
EP2348452B1 (en) | 2009-12-18 | 2014-07-02 | CompuGroup Medical AG | A computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system |
EP2348450B1 (en) * | 2009-12-18 | 2013-11-06 | CompuGroup Medical AG | Database system, computer system, and computer-readable storage medium for decrypting a data record |
CN102713996A (en) * | 2010-01-13 | 2012-10-03 | 三菱电机株式会社 | Secret retrieval system, public parameter generation device, encryption device, user secret key generation device, query issue device, retrieval device, computer program, secret retrieval method, public parameter generation method, encryption method, user secret key generation method, query issue method, and retrieval method |
EP2525340B1 (en) | 2010-01-15 | 2018-06-06 | Mitsubishi Electric Corporation | Confidential search system and encryption processing system |
US8488783B2 (en) * | 2010-02-19 | 2013-07-16 | Nokia | Method and apparatus for applying recipient criteria in identity-based encryption |
EP2543158B1 (en) * | 2010-03-03 | 2014-09-17 | Nagravision S.A. | Method to manage revocations in a group of terminals |
EP2365456B1 (en) | 2010-03-11 | 2016-07-20 | CompuGroup Medical SE | Data structure, method and system for predicting medical conditions |
US9025767B2 (en) * | 2010-03-24 | 2015-05-05 | Nokia Corporation | Method and apparatus for querying content protected by identity-based encryption |
US8553878B2 (en) * | 2010-04-14 | 2013-10-08 | Apple Inc. | Data transformation system using cyclic groups |
JP5424974B2 (en) * | 2010-04-27 | 2014-02-26 | 三菱電機株式会社 | Cryptographic processing system, key generation device, encryption device, decryption device, signature processing system, signature device, and verification device |
US9772834B2 (en) * | 2010-04-27 | 2017-09-26 | Red Hat, Inc. | Exportable encoded identifications of networked machines |
US8423764B2 (en) | 2010-06-23 | 2013-04-16 | Motorola Solutions, Inc. | Method and apparatus for key revocation in an attribute-based encryption scheme |
RU2452111C1 (en) * | 2010-11-17 | 2012-05-27 | ЗАО Институт инфокоммуникационных технологий | Method for threshold key generating for protection system based on identity data |
US8656484B2 (en) | 2010-12-28 | 2014-02-18 | Authernative, Inc. | System and method for mutually authenticated cryptographic key exchange using matrices |
US8621227B2 (en) | 2010-12-28 | 2013-12-31 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
JP5612494B2 (en) * | 2011-01-21 | 2014-10-22 | 日本電信電話株式会社 | Timed cryptographic system, timed cryptographic method, apparatus, and program using function encryption |
US20130042112A1 (en) * | 2011-02-12 | 2013-02-14 | CertiVox Ltd. | Use of non-interactive identity based key agreement derived secret keys with authenticated encryption |
EP2700189B1 (en) * | 2011-04-01 | 2020-01-22 | BlackBerry Limited | Identity-based decryption |
US8661240B2 (en) | 2011-04-29 | 2014-02-25 | International Business Machines Corporation | Joint encryption of data |
JP6041864B2 (en) * | 2011-04-29 | 2016-12-14 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method, computer program, and apparatus for data encryption |
US8644510B2 (en) * | 2011-05-11 | 2014-02-04 | Alcatel Lucent | Discovery of security associations for key management relying on public keys |
US9219714B2 (en) * | 2011-05-31 | 2015-12-22 | Samsung Sds Co., Ltd. | ID-based encryption and signature method and terminal |
US10318932B2 (en) | 2011-06-07 | 2019-06-11 | Entit Software Llc | Payment card processing system with structure preserving encryption |
US8627508B2 (en) | 2011-06-17 | 2014-01-07 | Microsoft Corporation | Cloud key directory for federating data exchanges |
US8891772B2 (en) * | 2011-06-17 | 2014-11-18 | Microsoft Corporation | Cloud key escrow system |
US9203621B2 (en) * | 2011-07-11 | 2015-12-01 | Hewlett-Packard Development Company, L.P. | Policy-based data management |
JP5784833B2 (en) * | 2011-07-15 | 2015-09-24 | アルカテル−ルーセント | Secure group messaging |
US8619986B2 (en) * | 2011-07-21 | 2013-12-31 | Patton Protection Systems LLC | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier |
US8892875B1 (en) | 2011-07-29 | 2014-11-18 | Trend Micro Incorporated | Methods and apparatus for controlling access to encrypted computer files |
JP2013042315A (en) * | 2011-08-12 | 2013-02-28 | Sony Corp | Information processing device and information processing method |
US8948381B2 (en) * | 2011-09-09 | 2015-02-03 | Fujitsu Limited | Conditional key generation based on expiration date of data |
US9203613B2 (en) | 2011-09-29 | 2015-12-01 | Amazon Technologies, Inc. | Techniques for client constructed sessions |
JP6082015B2 (en) * | 2011-09-29 | 2017-02-15 | アマゾン テクノロジーズ インコーポレイテッド | Parameter-based key derivation |
AU2011378110B2 (en) * | 2011-09-30 | 2015-05-21 | Ranganath C. ABEYWEERA | Method, system and apparatus for a communications client program and an associated transfer server for onymous and secure communications |
US9065637B2 (en) * | 2012-01-25 | 2015-06-23 | CertiVox Ltd. | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes |
US9154302B2 (en) | 2012-01-25 | 2015-10-06 | CertiVox Ltd. | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number |
EP2810402B1 (en) * | 2012-02-03 | 2018-07-25 | Qredo Limited | A method and database system for secure storage and communication of information |
US8694771B2 (en) | 2012-02-10 | 2014-04-08 | Connect In Private Panama Corp. | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption |
ES2530625T3 (en) * | 2012-04-06 | 2015-03-04 | Kapsch Trafficcom Ag | Method to detect violations of the speed limit of a vehicle |
KR101329007B1 (en) * | 2012-05-31 | 2013-11-12 | 삼성에스디에스 주식회사 | Apparatus and method for generating secret key for encryption system based on id and recording medium storing program for executing method of the same in computer |
JP5985894B2 (en) * | 2012-06-06 | 2016-09-06 | 株式会社東海理化電機製作所 | Electronic key registration method |
JP5990406B2 (en) * | 2012-06-06 | 2016-09-14 | 株式会社東海理化電機製作所 | Electronic key registration method |
FR2992509B1 (en) * | 2012-06-21 | 2017-05-26 | Commissariat Energie Atomique | DEVICE AND METHOD FOR GENERATING A SESSION KEY |
US10984415B2 (en) * | 2012-06-25 | 2021-04-20 | Li Tan | System and methods for using limit-use encrypted code to transfer values securely among users |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
JP6057150B2 (en) * | 2012-07-30 | 2017-01-11 | 雅浩 満保 | Public key encryption system, receiving apparatus, public key encryption method, program, and recording medium |
CN103780385B (en) * | 2012-10-23 | 2017-02-15 | 航天信息股份有限公司 | Blind signature method based on elliptic curve and device thereof |
US10007803B2 (en) * | 2012-10-26 | 2018-06-26 | Infosys Limited | Searching over encrypted keywords in a database |
KR101493212B1 (en) * | 2012-10-31 | 2015-02-23 | 삼성에스디에스 주식회사 | Method and system for id-based encryption and decryption |
US9230072B1 (en) * | 2012-12-17 | 2016-01-05 | Creative Information Technology, Inc. | Dynamic identity program templates |
US8763085B1 (en) | 2012-12-19 | 2014-06-24 | Trend Micro Incorporated | Protection of remotely managed virtual machines |
US9197422B2 (en) * | 2013-01-24 | 2015-11-24 | Raytheon Company | System and method for differential encryption |
US9020151B1 (en) | 2013-03-04 | 2015-04-28 | Trend Micro Incorporated | Secure real-time data replication with disk encryption and key management system |
US9106644B2 (en) | 2013-05-30 | 2015-08-11 | CertiVox Ltd. | Authentication |
GB201309702D0 (en) | 2013-05-30 | 2013-07-17 | Certivox Ltd | Security |
US8971540B2 (en) | 2013-05-30 | 2015-03-03 | CertiVox Ltd. | Authentication |
CN104219047B (en) * | 2013-05-31 | 2017-12-15 | 华为技术有限公司 | A kind of method and apparatus of signature verification |
KR101460541B1 (en) * | 2013-07-15 | 2014-11-11 | 고려대학교 산학협력단 | Public encryption method based on user ID |
US9197419B1 (en) | 2013-10-14 | 2015-11-24 | Trend Micro Incorporated | Security system for data stored in the cloud |
US9275242B1 (en) | 2013-10-14 | 2016-03-01 | Trend Micro Incorporated | Security system for cloud-based emails |
US10019519B2 (en) * | 2013-10-30 | 2018-07-10 | Gordon E. Seay | Methods and systems for utilizing global entities in software applications |
JP5915629B2 (en) * | 2013-11-28 | 2016-05-11 | トヨタ自動車株式会社 | Communication method, data sharing system, and communication node in data sharing system |
US9219722B2 (en) | 2013-12-11 | 2015-12-22 | Globalfoundries Inc. | Unclonable ID based chip-to-chip communication |
US9628516B2 (en) | 2013-12-12 | 2017-04-18 | Hewlett Packard Enterprise Development Lp | Policy-based data management |
IN2014CH00681A (en) | 2014-02-13 | 2015-08-14 | Infosys Ltd | |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US9672342B2 (en) | 2014-05-05 | 2017-06-06 | Analog Devices, Inc. | System and device binding metadata with hardware intrinsic properties |
US9946858B2 (en) * | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
CN105099897B (en) * | 2014-05-13 | 2020-01-21 | 中兴通讯股份有限公司 | Method and gateway for communication between browser and telecommunication network |
US9703979B1 (en) * | 2014-06-13 | 2017-07-11 | BicDroid Inc. | Methods and computer program products for encryption key generation and management |
US9619667B2 (en) | 2014-06-13 | 2017-04-11 | BicDroid Inc. | Methods, systems and computer program product for providing encryption on a plurality of devices |
CN104506483A (en) * | 2014-10-21 | 2015-04-08 | 中兴通讯股份有限公司 | Method for encrypting and decrypting information and managing secret key as well as terminal and network server |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
US10020940B2 (en) * | 2015-02-23 | 2018-07-10 | Oracle International Corporation | Identity-based encryption for securing access to stored messages |
US10015017B2 (en) * | 2015-04-09 | 2018-07-03 | Qualcomm Incorporated | Proof of work based user identification system |
SG10201504240VA (en) * | 2015-05-29 | 2016-12-29 | Huawei Internat Pte Ltd | A method and system for secure sms communications |
GB201509499D0 (en) * | 2015-06-02 | 2015-07-15 | Certivox Ltd | Zkd |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
CN105530087B (en) * | 2015-12-28 | 2019-05-10 | 北京航空航天大学 | The attribute base encryption method of adaptability selection ciphertext safety |
JP6925346B2 (en) | 2016-02-23 | 2021-08-25 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | Exchange using blockchain-based tokenization |
CA3014752A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | System and method for controlling asset-related actions via a blockchain |
CN108292402B (en) | 2016-02-23 | 2022-10-04 | 恩链控股有限公司 | Determination of a common secret and hierarchical deterministic keys for the secure exchange of information |
CN109314636B (en) | 2016-02-23 | 2022-01-11 | 区块链控股有限公司 | Cryptographic method and system for secure extraction of data from blockchains |
WO2017145002A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
SG10202007907PA (en) | 2016-02-23 | 2020-09-29 | Nchain Holdings Ltd | Blockchain-implemented method for control and distribution of digital content |
EP3420675B1 (en) | 2016-02-23 | 2020-03-11 | Nchain Holdings Limited | Blockchain implemented counting system and method for use in secure voting and distribution |
CA3013185A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | A method and system for securing computer software using a distributed hash table and a blockchain |
BR112018016234A2 (en) | 2016-02-23 | 2019-01-02 | Nchain Holdings Ltd | computer-implemented method for controlling access to a resource, computer-based systems and method for controlling access to a digital wallet |
JP2019518642A (en) * | 2016-04-14 | 2019-07-04 | ロンバス システムズ グループ, インコーポレイテッドRhombus Systems Group, Inc. | System for verifying the integrity of an unmanned aerial vehicle |
JP6844411B2 (en) * | 2016-05-17 | 2021-03-17 | 富士通株式会社 | Relationship encryption |
US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
JP6719339B2 (en) * | 2016-08-30 | 2020-07-08 | 三菱電機株式会社 | Cryptographic system, cryptographic method, and cryptographic program |
US11283626B2 (en) * | 2016-09-06 | 2022-03-22 | Huawei Technologies Co., Ltd. | Apparatus and methods for distributed certificate enrollment |
US10389719B2 (en) | 2016-10-28 | 2019-08-20 | Entit Software Llc | Parameter based data access on a security information sharing platform |
CN106570405B (en) * | 2016-11-04 | 2020-10-27 | 北京百度网讯科技有限公司 | Method and device for encrypting/decrypting characters in input method |
US10452877B2 (en) | 2016-12-16 | 2019-10-22 | Assa Abloy Ab | Methods to combine and auto-configure wiegand and RS485 |
US10341098B2 (en) * | 2017-01-24 | 2019-07-02 | Nxp B.V. | Method of generating cryptographic key pairs |
US11356427B1 (en) | 2017-02-15 | 2022-06-07 | Wells Fargo Bank, N.A. | Signcrypted envelope message |
US10484379B2 (en) * | 2017-03-16 | 2019-11-19 | Motorola Solutions, Inc. | System and method for providing least privilege access in a microservices architecture |
EP3379766B1 (en) * | 2017-03-20 | 2019-06-26 | Huawei Technologies Co., Ltd. | A wireless communication device for communication in a wireless communication network |
US11354660B1 (en) | 2017-04-27 | 2022-06-07 | Wells Fargo Bank, N.A. | Encapsulation of payment information |
US10425235B2 (en) | 2017-06-02 | 2019-09-24 | Analog Devices, Inc. | Device and system with global tamper resistance |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
CN107257279B (en) * | 2017-06-29 | 2020-02-11 | 广东浩云长盛网络股份有限公司 | Plaintext data encryption method and device |
JP7043203B2 (en) * | 2017-08-29 | 2022-03-29 | Kddi株式会社 | Cryptographic device, decryption device, encryption system, encryption method and encryption program |
WO2019074479A1 (en) * | 2017-10-09 | 2019-04-18 | Hewlett-Packard Development Company, L.P. | Encrypted transaction receipts |
US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
US10846412B2 (en) | 2017-11-14 | 2020-11-24 | Blackberry Limited | Electronic device including display and method of encrypting and decrypting information |
US10594666B2 (en) * | 2017-12-19 | 2020-03-17 | Micron Technology, Inc. | Secure message including a vehicle private key |
WO2019124953A1 (en) * | 2017-12-20 | 2019-06-27 | Lg Electronics Inc. | Cryptographic methods and systems for authentication in connected vehicle systems and for other uses |
SG10201801094VA (en) | 2018-02-08 | 2019-09-27 | Huawei Int Pte Ltd | System and method for computing an escrow session key and a private session key for encoding digital communications between two devices |
US10911227B2 (en) * | 2018-04-12 | 2021-02-02 | Mastercard International Incorporated | Method and system for managing centralized encryption and data format validation for secure real time multi-party data distribution |
US20190378121A1 (en) * | 2018-05-25 | 2019-12-12 | Finco Services, Inc. | Cryptographic technology platform and methods for providers to enable users to monetize their data |
KR102304831B1 (en) * | 2018-11-13 | 2021-09-27 | (주)블루팝콘 | Encryption systems and method using permutaion group based cryptographic techniques |
EP3664361A1 (en) * | 2018-12-06 | 2020-06-10 | Secure-IC SAS | Methods and devices for secured identity-based encryption systems with two trusted centers |
FR3091107A1 (en) * | 2018-12-24 | 2020-06-26 | Orange | Method and system for generating keys for an anonymous signature scheme |
US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
US11139982B2 (en) * | 2019-01-30 | 2021-10-05 | Rsa Security Llc | Communication-efficient device delegation |
CN110166254B (en) * | 2019-05-27 | 2020-09-29 | 国家电网有限公司 | Method and device for realizing identity-based key management by using intelligent contract |
JP2020195100A (en) * | 2019-05-29 | 2020-12-03 | 株式会社bitFlyer Blockchain | Device and method for proving reliability of public key, and program therefor |
US11128454B2 (en) | 2019-05-30 | 2021-09-21 | Bong Mann Kim | Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange |
US11588646B2 (en) | 2019-09-05 | 2023-02-21 | Cisco Technology, Inc. | Identity-based application and file verification |
JP7338405B2 (en) | 2019-10-31 | 2023-09-05 | 凸版印刷株式会社 | Payment authentication system and payment authentication method |
KR20220106740A (en) | 2019-11-28 | 2022-07-29 | 바이브 사이버시큐어리티 아이앤씨. | Method and system for verifiable ISD-based encryption (VEA) using certificateless authentication encryption (CLA) |
JP7254296B2 (en) * | 2019-12-12 | 2023-04-10 | 日本電信電話株式会社 | Key exchange system, information processing device, key exchange method and program |
CN115812136A (en) * | 2020-05-12 | 2023-03-17 | Bae系统信息和电子系统集成有限公司 | Wireless multi-fuze setter interface |
US11405200B1 (en) | 2020-05-21 | 2022-08-02 | Workday, Inc. | Multilevel split keys for wallet recovery |
US11870898B2 (en) * | 2020-05-21 | 2024-01-09 | Workday, Inc. | Split keys for wallet recovery |
CN111740958A (en) * | 2020-05-22 | 2020-10-02 | 卓望数码技术(深圳)有限公司 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
US11122021B1 (en) | 2020-06-25 | 2021-09-14 | Bank Of America Corporation | Server for handling multi-encrypted messages |
US11757846B2 (en) | 2020-06-25 | 2023-09-12 | Bank Of America Corporation | Cognitive multi-encrypted mail platform |
US11451389B2 (en) | 2020-06-25 | 2022-09-20 | Bank Of America Corporation | Multi-encrypted message response manager |
WO2022008940A1 (en) | 2020-07-07 | 2022-01-13 | Vibe Cybersecurity Inc. | Method and system for a verifiable identity based encryption (vibe) using certificate-less authentication encryption (clae) |
US11621837B2 (en) * | 2020-09-03 | 2023-04-04 | Theon Technology Llc | Secure encryption of data using partial-key cryptography |
US11310042B2 (en) | 2020-09-11 | 2022-04-19 | Crown Sterling Limited, LLC | Methods of storing and distributing large keys |
CN112583590B (en) * | 2020-12-14 | 2022-06-17 | 联芸科技(杭州)有限公司 | Information issuing method and system based on group shared key |
CN113094675B (en) * | 2021-04-29 | 2023-03-28 | 香港中文大学(深圳) | User authentication method and device based on distributed model training |
JPWO2022259495A1 (en) * | 2021-06-10 | 2022-12-15 | ||
JPWO2022259494A1 (en) * | 2021-06-10 | 2022-12-15 | ||
CA3226534A1 (en) * | 2021-07-22 | 2023-01-26 | Howard University | Hybrid public-key and private-key cryptographic systems based on iso-rsa encryption scheme |
CN113794702A (en) * | 2021-08-31 | 2021-12-14 | 杭州控客信息技术有限公司 | Communication high-level encryption method in intelligent household system |
US11755772B2 (en) | 2021-09-20 | 2023-09-12 | Crown Sterling Limited, LLC | Securing data in a blockchain with a one-time pad |
CN113890730A (en) * | 2021-09-23 | 2022-01-04 | 上海华兴数字科技有限公司 | Data transmission method and system |
US11943336B2 (en) | 2021-11-22 | 2024-03-26 | Theon Technology Llc | Use of gradient decent function in cryptography |
US11791988B2 (en) | 2021-11-22 | 2023-10-17 | Theon Technology Llc | Use of random entropy in cryptography |
US11902420B2 (en) | 2021-11-23 | 2024-02-13 | Theon Technology Llc | Partial cryptographic key transport using one-time pad encryption |
EP4195581A1 (en) * | 2021-12-08 | 2023-06-14 | Nagravision Sàrl | Improvements in and relating to cryptography |
CN114679262A (en) * | 2021-12-31 | 2022-06-28 | 广东国腾量子科技有限公司 | Quantum key distribution system and method fusing asymmetric system |
CN114422220B (en) * | 2022-01-06 | 2024-02-27 | 浙江数秦科技有限公司 | Ciphertext non-unique data encryption transmission method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146500A (en) * | 1991-03-14 | 1992-09-08 | Omnisec A.G. | Public key cryptographic system using elliptic curves over rings |
US5150411A (en) * | 1990-10-24 | 1992-09-22 | Omnisec | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction |
US5179301A (en) * | 1989-09-06 | 1993-01-12 | U.S. Philips Corporation | Switched current differentiator circuit for differentiating an input signal in the form of a sampled analog current |
US6307935B1 (en) * | 1991-09-17 | 2001-10-23 | Apple Computer, Inc. | Method and apparatus for fast elliptic encryption with direct embedding |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4748668A (en) | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
DE3789769T2 (en) * | 1986-07-31 | 1994-08-11 | Advance Kk | SYSTEM FOR GENERATING A COMMON SECRETARY KEY AND COMMUNICATION SYSTEM USING THE COMMON SECRET KEY. |
US5202921A (en) | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
US5271061A (en) * | 1991-09-17 | 1993-12-14 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
US5159632A (en) * | 1991-09-17 | 1992-10-27 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
EP0917781A4 (en) * | 1996-08-07 | 2003-08-13 | Silvio Micali | Simultaneous electronic transactions with visible trusted parties |
US5982898A (en) * | 1997-03-07 | 1999-11-09 | At&T Corp. | Certification process |
US6061448A (en) * | 1997-04-01 | 2000-05-09 | Tumbleweed Communications Corp. | Method and system for dynamic server document encryption |
JP3542895B2 (en) * | 1997-08-22 | 2004-07-14 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Time-constrained cryptosystem |
JP3275812B2 (en) * | 1997-12-12 | 2002-04-22 | 日本電気株式会社 | ID-authenticated key distribution method and apparatus, and machine-readable recording medium recording program |
AU2452699A (en) * | 1998-01-09 | 1999-07-26 | Cybersafe Corporation | Client side public key authentication method and apparatus with short-lived certificates |
US6446205B1 (en) * | 1998-12-10 | 2002-09-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
JP2001209313A (en) * | 2000-01-25 | 2001-08-03 | Canon Inc | Certificate issuing device, information processor, information communication system, attribute certifying method and storage medium |
JP4450969B2 (en) | 2000-05-02 | 2010-04-14 | 村田機械株式会社 | Key sharing system, secret key generation device, common key generation system, encryption communication method, encryption communication system, and recording medium |
US7239701B1 (en) * | 2000-05-02 | 2007-07-03 | Murata Machinery Ltd. | Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem |
JP2002164877A (en) * | 2000-09-14 | 2002-06-07 | Advanced Mobile Telecommunications Security Technology Research Lab Co Ltd | Key escrow and group communication method |
US6970562B2 (en) * | 2000-12-19 | 2005-11-29 | Tricipher, Inc. | System and method for crypto-key generation and use in cryptosystem |
GB2370471B (en) | 2000-12-20 | 2004-06-23 | Director Government Comm Headq | Directoryless Public Key Cryptographic System and Method |
WO2003017559A2 (en) * | 2001-08-13 | 2003-02-27 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
US6886096B2 (en) * | 2002-11-14 | 2005-04-26 | Voltage Security, Inc. | Identity-based encryption system |
FR2892251A1 (en) * | 2005-10-14 | 2007-04-20 | Gemplus Sa | CRYPTOGRAPHIC METHOD IMPLEMENTING AN IDENTITY-BASED ENCRYPTION SYSTEM |
US8694771B2 (en) * | 2012-02-10 | 2014-04-08 | Connect In Private Panama Corp. | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption |
-
2002
- 2002-08-13 WO PCT/US2002/027155 patent/WO2003017559A2/en active Application Filing
- 2002-08-13 US US10/218,697 patent/US7113594B2/en active Active
- 2002-08-13 JP JP2003521528A patent/JP2005500740A/en active Pending
- 2002-08-13 EP EP11191699.5A patent/EP2429116B1/en not_active Expired - Lifetime
- 2002-08-13 DE DE60236094T patent/DE60236094D1/en not_active Expired - Lifetime
- 2002-08-13 EP EP02794941A patent/EP1425874B1/en not_active Expired - Lifetime
- 2002-08-13 EP EP10001505.6A patent/EP2224637B1/en not_active Expired - Lifetime
- 2002-08-13 AU AU2002332671A patent/AU2002332671A1/en not_active Abandoned
- 2002-08-13 AT AT02794941T patent/ATE465571T1/en not_active IP Right Cessation
-
2006
- 2006-05-09 US US11/431,410 patent/US7634087B2/en not_active Expired - Lifetime
-
2009
- 2009-10-28 US US12/589,880 patent/US8130964B2/en not_active Expired - Lifetime
-
2011
- 2011-05-09 JP JP2011104479A patent/JP2011151866A/en active Pending
- 2011-11-16 JP JP2011250508A patent/JP2012032843A/en active Pending
-
2012
- 2012-02-08 US US13/369,165 patent/US9356779B2/en not_active Expired - Lifetime
-
2015
- 2015-05-15 JP JP2015099791A patent/JP5933786B2/en not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5179301A (en) * | 1989-09-06 | 1993-01-12 | U.S. Philips Corporation | Switched current differentiator circuit for differentiating an input signal in the form of a sampled analog current |
US5150411A (en) * | 1990-10-24 | 1992-09-22 | Omnisec | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction |
US5146500A (en) * | 1991-03-14 | 1992-09-08 | Omnisec A.G. | Public key cryptographic system using elliptic curves over rings |
US6307935B1 (en) * | 1991-09-17 | 2001-10-23 | Apple Computer, Inc. | Method and apparatus for fast elliptic encryption with direct embedding |
Non-Patent Citations (1)
Title |
---|
See also references of EP1425874A2 * |
Cited By (90)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2401763A (en) * | 2002-07-05 | 2004-11-17 | Hewlett Packard Development Co | Trusted Authority for Identifier-Based Cryptography |
GB2390515A (en) * | 2002-07-05 | 2004-01-07 | Hewlett Packard Development Co | Verifying An Association Between Two Parties |
GB2401763B (en) * | 2002-07-05 | 2005-08-10 | Hewlett Packard Development Co | Trusted authority for identifer-based cryptography |
GB2390515B (en) * | 2002-07-05 | 2005-08-03 | Hewlett Packard Development Co | Method and apparatus for use in relation to verifying an association between two parties |
GB2390516A (en) * | 2002-07-05 | 2004-01-07 | Hewlett Packard Development Co | Generating a cryptographic key |
US7397917B2 (en) | 2002-07-05 | 2008-07-08 | Hewlett-Packard Development Company, L.P. | Method and apparatus for generating a cryptographic key |
US7650498B2 (en) * | 2003-04-17 | 2010-01-19 | Hewlett-Packard Development Company, L.P. | Secure data provision method and apparatus and data recovery method and system |
EP1471680A1 (en) * | 2003-04-23 | 2004-10-27 | Hewlett-Packard Development Company, L.P. | Identifier-Based Encryption method and apparatus |
GB2401012A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier-based encryption |
GB2401014A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier based encryption method using an encrypted condition and a trusted party |
US7574596B2 (en) | 2003-04-23 | 2009-08-11 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
GB2401008A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier based encryption |
GB2401012B (en) * | 2003-04-23 | 2005-07-06 | Hewlett Packard Development Co | Cryptographic method and apparatus |
US7380138B2 (en) | 2003-04-23 | 2008-05-27 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
WO2004095770A1 (en) * | 2003-04-23 | 2004-11-04 | Hewlett-Packard Development Company, L.P. | Biometric based identity based encryption method and apparatus |
GB2401015A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Security method and apparatus using biometric data |
GB2401014B (en) * | 2003-04-23 | 2005-09-14 | Hewlett Packard Development Co | Cryptographic method and apparatus |
GB2401009A (en) * | 2003-04-23 | 2004-10-27 | Hewlett Packard Development Co | Identifier-based encryption |
US7693279B2 (en) | 2003-04-23 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Security method and apparatus using biometric data |
JP2006524352A (en) * | 2003-04-23 | 2006-10-26 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | Identity-based encryption method and apparatus based on biometrics |
GB2401015B (en) * | 2003-04-23 | 2006-01-04 | Hewlett Packard Development Co | Security method and apparatus using biometric data |
GB2402852A (en) * | 2003-06-13 | 2004-12-15 | Hewlett Packard Development Co | Mediated RSA cryptographic method and system using blinding |
GB2402852B (en) * | 2003-06-13 | 2005-11-02 | Hewlett Packard Development Co | Mediated RSA cryptographic method and system |
US7382877B2 (en) | 2003-06-13 | 2008-06-03 | Hewlett-Packard Development Company, L.P. | RSA cryptographic method and system |
US8171563B2 (en) | 2003-09-25 | 2012-05-01 | Voltage Security, Inc. | Secure message system with remote decryption service |
JP2012010398A (en) * | 2003-09-25 | 2012-01-12 | Voltage Security Inc | Secure message system with remote decryption service |
JP2007507175A (en) * | 2003-09-25 | 2007-03-22 | ボルテージ セキュリティー, インコーポレイテッド | Secure message system with remote decryption service |
JP2013140402A (en) * | 2003-10-28 | 2013-07-18 | Certicom Corp | Method and apparatus for verifiably generating public keys |
GB2407740A (en) * | 2003-11-01 | 2005-05-04 | Hewlett Packard Development Co | Identifier-based signcryption |
GB2407740B (en) * | 2003-11-01 | 2005-12-14 | Hewlett Packard Development Co | Identifier-based signcryption |
AU2004218638B2 (en) * | 2003-11-03 | 2009-07-30 | Microsoft Technology Licensing, Llc | Use of isogenies for design of cryptosystems |
WO2005065141A2 (en) | 2003-12-22 | 2005-07-21 | Voltage Security, Inc. | Identity-based-encryption message management system |
WO2005065141A3 (en) * | 2003-12-22 | 2007-11-15 | Voltage Security Inc | Identity-based-encryption message management system |
US8041953B2 (en) | 2003-12-22 | 2011-10-18 | Voltage Security, Inc. | Identity-based-encryption message management system |
EP1698091A2 (en) | 2003-12-22 | 2006-09-06 | Voltage Security, Inc. | Identity-based-encryption message management system |
US8353023B2 (en) | 2003-12-22 | 2013-01-08 | Voltage Security, Inc. | Identity-based-encryption message management system |
US7523314B2 (en) | 2003-12-22 | 2009-04-21 | Voltage Security, Inc. | Identity-based-encryption message management system |
WO2005096545A1 (en) * | 2004-03-30 | 2005-10-13 | Dublin City University | Verification of identity based signatures |
US7801302B2 (en) | 2004-06-11 | 2010-09-21 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
US7986778B2 (en) | 2004-06-23 | 2011-07-26 | Hewlett-Packard Development Company, L.P. | Cryptographic method and apparatus |
US8589679B2 (en) | 2004-07-15 | 2013-11-19 | Hewlett-Packard Development Company, L.P. | Identifier-based signcryption with two trusted authorities |
EP1621956A1 (en) * | 2004-07-30 | 2006-02-01 | Irdeto Access B.V. | Method of providing rights data objects |
WO2006051517A1 (en) * | 2004-11-12 | 2006-05-18 | Dublin City University | Identity based encryption |
US7860247B2 (en) | 2004-11-12 | 2010-12-28 | Dublin City University | Identity based encryption |
GB2421097B (en) * | 2004-12-10 | 2009-07-01 | Hewlett Packard Development Co | Methods, devices and computer programs for creating ciphertext, plaintext and a cryptographic key |
GB2421097A (en) * | 2004-12-10 | 2006-06-14 | Hewlett Packard Development Co | Identity based encryption for software distribution |
US8812845B2 (en) | 2004-12-23 | 2014-08-19 | Stmicroelectronics S.R.L. | Authentication method |
EP1675300A1 (en) * | 2004-12-23 | 2006-06-28 | Hewlett-Packard Development Company, L.P. | Improvements in the use of bilinear mappings in cryptographic applications |
US8352736B2 (en) | 2004-12-23 | 2013-01-08 | Stmicroelectronics S.R.L. | Authentication method |
EP1675299A1 (en) * | 2004-12-23 | 2006-06-28 | Hewlett-Packard Development Company, L.P. | Authentication method using bilinear mappings |
US7929691B2 (en) | 2004-12-23 | 2011-04-19 | Hewlett-Packard Development Company, L.P. | Use of bilinear mappings in cryptographic applications |
JP2006184831A (en) * | 2004-12-28 | 2006-07-13 | Nippon Telegr & Teleph Corp <Ntt> | Key generating device, encryption device, inspection device, decryption device, and key generating program, encryption program, inspection program, decryption program |
US8285996B2 (en) | 2005-03-30 | 2012-10-09 | Dublin City University | Verification of identity based signatures |
WO2007011071A1 (en) * | 2005-07-22 | 2007-01-25 | Nec Corporation | Time apparatus, encrypting apparatus, decrypting apparatus, and encrypting/decrypting system |
FR2892251A1 (en) * | 2005-10-14 | 2007-04-20 | Gemplus Sa | CRYPTOGRAPHIC METHOD IMPLEMENTING AN IDENTITY-BASED ENCRYPTION SYSTEM |
WO2007042419A1 (en) * | 2005-10-14 | 2007-04-19 | Gemplus | Cryptographic method using an identity-based encryption system |
EP1971072A1 (en) * | 2005-12-01 | 2008-09-17 | NEC Corporation | Electronic bidding system and electronic bidding method |
US10797867B2 (en) | 2005-12-01 | 2020-10-06 | Nec Corporation | System and method for electronic bidding |
EP1971072A4 (en) * | 2005-12-01 | 2012-07-25 | Nec Corp | Electronic bidding system and electronic bidding method |
US8111826B2 (en) | 2006-01-11 | 2012-02-07 | Mitsubishi Electric Corporation | Apparatus for generating elliptic curve cryptographic parameter, apparatus for processing elliptic curve cryptograph, program for generating elliptic curve cryptographic parameter, and program for processing elliptic cyptograph |
WO2007138182A1 (en) * | 2006-05-31 | 2007-12-06 | Oberthur Technologies | Process of generation of a private key and coding/decoding processes of a message |
FR2901940A1 (en) * | 2006-05-31 | 2007-12-07 | Oberthur Card Syst Sa | METHOD OF GENERATING A PRIVATE KEY AND METHODS OF ENCRYPTING AND DE-CREATING A MESSAGE |
JP2007336241A (en) * | 2006-06-15 | 2007-12-27 | Toyo Networks & System Integration Co Ltd | Electronic check collation system |
WO2010044056A3 (en) * | 2008-10-14 | 2010-09-16 | Koninklijke Philips Electronics N.V. | Method and apparatus for pseudonym generation and authentication |
US8683209B2 (en) | 2008-10-14 | 2014-03-25 | Koninklijke Philips N.V. | Method and apparatus for pseudonym generation and authentication |
CN101420303B (en) * | 2008-12-12 | 2011-02-02 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
US8510558B2 (en) | 2009-02-17 | 2013-08-13 | Alcatel Lucent | Identity based authenticated key agreement protocol |
US9106410B2 (en) | 2009-02-17 | 2015-08-11 | Alcatel Lucent | Identity based authenticated key agreement protocol |
EP2222016A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for hashing onto points of an elliptic curve |
KR101699893B1 (en) * | 2009-02-19 | 2017-02-13 | 톰슨 라이센싱 | Method and device for hashing onto points of an elliptic curve |
KR20100094939A (en) * | 2009-02-19 | 2010-08-27 | 톰슨 라이센싱 | Method and device for hashing onto points of an elliptic curve |
WO2018224941A1 (en) * | 2017-06-07 | 2018-12-13 | nChain Holdings Limited | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network |
EP4210271A1 (en) * | 2017-06-07 | 2023-07-12 | nChain Licensing AG | Credential generation and distribution method and system for a blockchain network |
EP4254301A3 (en) * | 2017-06-07 | 2023-10-11 | nChain Licensing AG | Credential generation and distribution method and system for a blockchain network |
WO2018224945A1 (en) * | 2017-06-07 | 2018-12-13 | nChain Holdings Limited | Credential generation and distribution method and system for a blockchain network |
EP3664005A1 (en) * | 2017-06-07 | 2020-06-10 | Nchain Holdings Limited | Credential generation and distribution method and system for a blockchain network |
EP3979553A1 (en) * | 2017-06-07 | 2022-04-06 | Nchain Holdings Limited | Credential generation and distribution method and system for a blockchain network |
US11296873B2 (en) | 2017-06-07 | 2022-04-05 | Nchain Licensing Ag | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network |
TWI744532B (en) | 2017-06-07 | 2021-11-01 | 安地卡及巴布達商區塊鏈控股有限公司 | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network |
EP3879747A4 (en) * | 2018-12-29 | 2022-08-10 | Shanghai Weilian Information Technology Co., Ltd. | Key security management system and method, medium, and computer program |
CN111698095A (en) * | 2020-06-17 | 2020-09-22 | 南京如般量子科技有限公司 | Data chain quantum computation resistant communication method and system based on ID cryptography and symmetric key pool |
CN112019335A (en) * | 2020-09-18 | 2020-12-01 | 上海市数字证书认证中心有限公司 | Multi-party cooperative encryption and decryption method, device, system and medium based on SM2 algorithm |
CN112019335B (en) * | 2020-09-18 | 2023-12-29 | 上海市数字证书认证中心有限公司 | SM2 algorithm-based multiparty collaborative encryption and decryption method, device, system and medium |
CN112528312A (en) * | 2020-12-24 | 2021-03-19 | 贵州大学 | Signcryption method and system based on Cocks identity cryptosystem |
CN112528312B (en) * | 2020-12-24 | 2023-10-03 | 贵州大学 | Signcryption method and system based on Cocks identity cryptosystem |
CN113312608A (en) * | 2021-04-23 | 2021-08-27 | 中国电力科学研究院有限公司 | Electric power metering terminal identity authentication method and system based on timestamp |
CN113312608B (en) * | 2021-04-23 | 2024-03-08 | 中国电力科学研究院有限公司 | Electric power metering terminal identity authentication method and system based on time stamp |
CN114065171A (en) * | 2021-11-11 | 2022-02-18 | 北京海泰方圆科技股份有限公司 | Identity authentication method, device, system, equipment and medium |
CN114065171B (en) * | 2021-11-11 | 2022-07-08 | 北京海泰方圆科技股份有限公司 | Identity authentication method, device, system, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
US8130964B2 (en) | 2012-03-06 |
ATE465571T1 (en) | 2010-05-15 |
AU2002332671A1 (en) | 2003-03-03 |
EP1425874A4 (en) | 2009-04-15 |
EP2224637A2 (en) | 2010-09-01 |
US7634087B2 (en) | 2009-12-15 |
US20120159188A1 (en) | 2012-06-21 |
JP2005500740A (en) | 2005-01-06 |
JP2012032843A (en) | 2012-02-16 |
JP2011151866A (en) | 2011-08-04 |
EP1425874B1 (en) | 2010-04-21 |
US20030081785A1 (en) | 2003-05-01 |
US20090034714A9 (en) | 2009-02-05 |
US20070041583A1 (en) | 2007-02-22 |
JP5933786B2 (en) | 2016-06-15 |
US7113594B2 (en) | 2006-09-26 |
US9356779B2 (en) | 2016-05-31 |
US20100208895A1 (en) | 2010-08-19 |
EP2429116A2 (en) | 2012-03-14 |
EP1425874A2 (en) | 2004-06-09 |
WO2003017559A3 (en) | 2003-07-10 |
EP2429116A3 (en) | 2012-05-30 |
DE60236094D1 (en) | 2010-06-02 |
EP2429116B1 (en) | 2013-07-10 |
EP2224637A3 (en) | 2012-05-23 |
JP2015144495A (en) | 2015-08-06 |
EP2224637B1 (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7113594B2 (en) | Systems and methods for identity-based encryption and related cryptographic techniques | |
Boneh et al. | Identity-based encryption from the Weil pairing | |
Gentry | Certificate-based encryption and the certificate revocation problem | |
Baek et al. | Identity-based threshold decryption | |
US7590236B1 (en) | Identity-based-encryption system | |
US7751558B2 (en) | Certificate-based encryption and public key infrastructure | |
Galindo et al. | Improved certificate-based encryption in the standard model | |
Gorantla et al. | A survey on id-based cryptographic primitives | |
Lai et al. | Self-generated-certificate public key encryption without pairing and its application | |
Sarier | A new biometric identity based encryption scheme secure against DoS attacks | |
Chen | An interpretation of identity-based cryptography | |
Yang et al. | Efficient mediated certificates public-key encryption scheme without pairings | |
Libert et al. | What is possible with identity based cryptography for PKIs and what still must be improved | |
Ahmad et al. | TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet | |
an Wang et al. | On the role of pkg for proxy re-encryption in identity based setting | |
Yong et al. | Identity-based threshold signature and mediated proxy signature schemes | |
Elkamchouchi et al. | An efficient ID-based proxy signcryption scheme without bilinear pairings | |
Lee et al. | Efficient and robust secure key issuing protocol in id-based cryptography | |
Elashry et al. | Generic mediated encryption | |
Karatop et al. | An identity-based key infrastructure suitable for messaging applications | |
Long et al. | Provably Secure Identity-based Threshold Key Escrow from Pairing. | |
Penev | Identity Based Public Key Infrastructures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KP KR KZ LC LK LR LS LT LU LV MD MK MN MW MX NO NZ PL PT RO RU SE SG SI SK SL TJ TM TR TT TZ UA UZ VN YU ZA Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003521528 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002794941 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002794941 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |