Schemes for signcryption
    1.
    发明授权
    Schemes for signcryption 有权
    签密方案

    公开(公告)号:US09191208B2

    公开(公告)日:2015-11-17

    申请号:US13995312

    申请日:2012-12-18

    Abstract: Technologies are generally described for providing a signcryption scheme. In some examples, a method performed under control of a sender device may include calculating a public key of the sender device based on a system parameter, calculating a temporary public key of the sender device based on the system parameter, calculating a temporary common key of the sender device based on a temporary secret key of the sender device and a public key of a receiver device, calculating a ciphertext from a message based on the temporary common key and generating a signature of the sender device based on an intermediate parameter, the system parameter and the secret key of the sender device. The temporary secret key of the sender device, intermediate parameter and secret key of the sender device are engaged in a non-associative octonion ring.In some examples, a method performed under control of a receiver device may include calculating a public key of the receiver device based on a system parameter, calculating a temporary common key of the receiver device based on a temporary public key of the sender device and a secret key of a receiver device, deciphering the ciphertext based on the temporary common keys of receiver device, determining whether the digital signature received is generated by sender device. A temporary public key of the sender device, the secret key of the receiver device and the temporary common keys of the receiver device are engaged in a non-associative octonion ring.

    Abstract translation: 技术通常被描述为提供签密方案。 在一些示例中,在发送者设备的控制下执行的方法可以包括:基于系统参数来计算发送方设备的公开密钥;基于系统参数计算发送方设备的临时公钥;计算临时公钥; 所述发送者设备基于所述发送者设备的临时秘密密钥和接收者设备的公开密钥,基于所述临时公用密钥从消息中计算密文,并且基于中间参数生成所述发送者设备的签名,所述系统 参数和发件人设备的密钥。 发件人设备的发送者设备,中间参数和秘密密钥的临时秘密密钥参与非关联的八进制环。 在一些示例中,在接收机设备的控制下执行的方法可以包括基于系统参数来计算接收机设备的公共密钥,基于发送方设备的临时公钥来计算接收机设备的临时公用密钥,以及 接收机设备的秘密密钥,基于接收机设备的临时公共密钥解密密文,确定接收到的数字签名是否由发送者设备生成。 发件人设备的临时公钥,接收设备的秘密密钥和接收设备的临时公用密钥都参与非关联的八进制环。

    Homomorphic encryption scheme
    2.
    发明授权

    公开(公告)号:US10171230B2

    公开(公告)日:2019-01-01

    申请号:US14895060

    申请日:2014-02-28

    Abstract: Technologies are generally described for providing a fully homomorphic encryption scheme. In some examples, a method performed under control of a first device may include determining an enciphering function, based at least in part on a secret key of the first device and a system parameter; enciphering a plaintext into a first ciphertext, based at least in part on the enciphering function; transmitting, to a server, the first ciphertext and the system parameter; receiving, from a second device, a second ciphertext to which the first ciphertext has been processed by the second device without deciphering the first ciphertext; and deciphering the second ciphertext, based at least in part on the system parameter and a deciphering function.

    Anonymous signature scheme
    3.
    发明授权

    公开(公告)号:US09985966B2

    公开(公告)日:2018-05-29

    申请号:US14890022

    申请日:2014-01-07

    Abstract: Technologies are generally described for providing an anonymous signature scheme. In some examples, a method performed under control of an end device ma 320 include receiving public parameters from a central system; generating an enciphering function based at least in part on the received public parameters; calculating parameters for a signature based at least in part on the generated enciphering function; and transmitting, to a verifying device, the signature that includes a message, a key of the end device and the calculated parameters for the signature.

    Homomorphic public-key encryption scheme

    公开(公告)号:US09876636B2

    公开(公告)日:2018-01-23

    申请号:US14990028

    申请日:2016-01-07

    CPC classification number: H04L9/0618 H04L9/008 H04L9/0822 H04L9/14 H04L2209/24

    Abstract: Technologies are generally described for providing a fully homomorphic public key encryption scheme. In some examples, a method performed under control of a transmitter may include receiving, from a server, a system parameter; selecting a secret decryption key corresponding to the transmitter; generating a first public encryption key for the transmitter, based at least in part on the secret decryption key corresponding to the transmitter and the system parameter; receiving, from the server, a public encryption key corresponding to a receiver; enciphering a message into a first ciphertext, based at least in part on the public encryption key corresponding to the receiver and the secret decryption key corresponding to the transmitter; and transmitting, to a data processing device, a request to process the message by processing the first ciphertext that corresponds to the message into a second ciphertext without deciphering the first ciphertext.

Patent Agency Ranking