Use of Bilinear mappings in cryptographic applications
    21.
    发明申请
    Use of Bilinear mappings in cryptographic applications 有权
    在加密应用程序中使用双线性映射

    公开(公告)号:US20080016346A1

    公开(公告)日:2008-01-17

    申请号:US11316412

    申请日:2005-12-21

    CPC classification number: H04L9/08 H04L9/3073 H04L9/321 H04L2209/80 H04W12/06

    Abstract: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.

    Abstract translation: 已知密码学方法涉及计算第一和第二元素的非简并双线性映射,其中之一包括第一实体的秘密。 对于实现为例如Tate配对的映射,可以通过将预定函数应用于第一和第二元素然后用已知指数对结果进行指数来计算该映射。 通过安排第一实体仅执行部分映射,使第一方能够进行关于计算负载,输出大小和安全性的改进,第二实体用于完成映射的计算。 还公开了使用这些改进的加密应用。

    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED
    22.
    发明申请
    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED 有权
    处理信息的方法被保密传输

    公开(公告)号:US20070244944A1

    公开(公告)日:2007-10-18

    申请号:US11548251

    申请日:2006-10-10

    CPC classification number: G06F7/725 H04L9/3073 H04L2209/08

    Abstract: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P). This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of said scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.

    Abstract translation: 一种处理从第一模块到第二模块被保密地发送的信息的方法,提供可以执行第一标量乘法以获得第一结果P。 该第一标量乘法包括有序因子的多个生成步骤,需要构建多个第一部分和。 该方法还包括执行第二标量乘法以获得第二结果。 该第二乘法规定可以构建多个第二部分和。 通过基于所述标量乘法的结果处理该信息来获得加密信息。 第二标量乘法的第二部分和使用通过第一标量乘法的生成步骤获得的相同有序因子。

    Authentication method
    23.
    发明申请
    Authentication method 有权
    认证方式

    公开(公告)号:US20070180241A1

    公开(公告)日:2007-08-02

    申请号:US11315633

    申请日:2005-12-22

    CPC classification number: H04L9/08 H04L9/3073 H04L9/321 H04L2209/80 H04W12/06

    Abstract: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.

    Abstract translation: 通过第二模块的第一模块的认证方法包括以下步骤:由第二模块生成要发送到第一模块的第一随机数据,由第一模块从第一数据开始生成第一数字,并通过 私钥,并且由第二模块生成与第一号码进行比较的第二号码,以便认证第一模块。 从公共参数开始执行产生第二数量的步骤,并且独立于生成第一个数字的步骤。

Patent Agency Ranking