Abstract:
The present invention relates to a cryptographic method of protecting an electronic chip against fraud and a device including an electronic chip which is adapted to protect the electronic chip against fraud. The method includes: mixing some or all of the input parameters (Em) to supply an output data item E′=(e′1, e′2, . . . , e′n, . . . , e′N), changing the state of a finite state automaton from an old state to a new state as a function of the data item E′=(e′1, e′2, . . . , e′n, . . . , e′N), and calculating a certificate (S) by means of an output function having at least one state of the automaton as an input argument. The device includes: mixing means, a finite state automaton, and output means for calculating a certificate (S).
Abstract:
A public key cryptographic method based on groups of braids. The method employs a secret key defined by a representative s of a given braid S in a braid group G, a public key defined by a representative v of the braid T(S) converted from the braid S by an operator T, and an operation of verifying the equality of two braids, i.e. the equivalence of representatives of the two braids.
Abstract:
A technique for secure delegation of calculation of a value f(X,Y) of a bilinear application in a computational server. The technique comprises: selection of two secret parameters a and b; calculation of the numbers Xa and Yb; supply of the two numbers Xa and Yb to the computational server; calculation of f(Xa,Yb) by said server; receipt of the value of f(Xa,Yb) from the server; extraction of the abth root of f(Xa,Yb).
Abstract translation:一种用于在计算服务器中安全地委派计算双线性应用的值f(X,Y)的技术。 该技术包括:选择两个秘密参数a和b; 数字X< a>和< b>的计算; 向计算服务器提供两个数字X a和/或SUP> b SUP>; 由所述服务器计算f(X a SUP>,Y ); 从服务器接收f(X a SUP>,Y )的值; 提取f(X SUP>, SUP> B)的ab SUP>根。
Abstract:
The present invention relates to an authentication method using small-sized commitments and systems thereof.According to the invention the size of the commitment is reduced but the time the entity to be authenticated takes to respond to the authenticating entity is checked and said time is required to be lower than a certain value. The security level is maintained.Application to methods of authentication (of entities or messages) or message signature.
Abstract:
A cryptographic method and apparatus for anonymously signing a message. Added to the anonymous signature is another signature which is calculated (operation 13) using a private key common to all the members of a group authorized to sign and unknown to all revoked members. The private key is updated (operations 8, 11) at group level on each revocation within the group and at member level only on anonymous signing of a message by the member.
Abstract:
A secured system of access checking using a portable storage carrier (C) on which there is recorded an electronic key (CL), a digital data processing instrument (LE) for the production of keys, and an electronic lock (L) function capable of authorizing access should the storage carrier have the requisite electronic key. To transfer an entitlement to produce keys (CL) from one production digital data processing instrument (LE) to another, it is loaded with a new public key (K′) and the signature (CER′) of this key.
Abstract:
A method for performing electronic transactions between a card, a service provider having at least one terminal configured to accept the card and a centralized system configured to be connected to the terminal. The terminal transmits to the card a parameter M including the sum of the transaction and its identity. The card produces two signatures, a first signature (z) depending on a secret debit key (k) and on the parameter (M), this first signature being a proof that the card balance has been debited; and a second signature (y) depending on the first signature (z), the second signature being produced either by an RSA algorithm or by an interactive algorithm. The terminal checks the second signature (y) but not the first one because it is unable to recover the secret debit key (k). The terminal stores the different first signatures (proofs) (z) and the parameters (M) for the different transactions. The centralized system can collect the first signatures and the parameters. The centralized system can recover the secret debit key (k) based on the card identities and can credit the service provider.
Abstract:
The invention relates to systems for checking access limited to authorized time slots renewable by means of a portable storage device. The system comprises, for this purpose, an element (LE) producing electronic keys formed by a data element pertaining to a time slot and by the signature of this data element. These keys are loaded into devices such as memory cards (C). Electronic locks (L) capable of verifying the signatures are implanted in the different (physical or logical) locations, the access to which has to be guarded. Application to the checking of access to buildings or computer systems.
Abstract:
The invention concerns a microcircuit card of the kind comprising:a communication interface;an internal memorypa wired processor unit allowing this internal memory to be addressed from the outside.According to the main characteristic of the invention, provision is made for a secret internal memory zone not addressable from the outside, and the processor unit comprises a wired circuit capable of using the contents of the secret memory for establishing a first serial cryptographic function of two operands and means reacting to the interrogation of predetermined addresses of the internal memory, accompanied by a keyword by applying this keyword and the output of the internal memory as operands of the wired circuit, whilst the output of the wired circuit is applied to the interface.
Abstract:
A technique for secure delegation of calculation of a value f(X,Y) of a bilinear application in a computational server. The technique comprises selection of two secret parameters a and b; calculation of the numbers Xa and Yb; supply of the two numbers Xa and Yb to the computational server; calculation of f(Xa, Yb) by said server; receipt of the value of f(Xa,Yb) from the server; extraction of the abth root of f(Xa,Yb).