Method and apparatus for performing elliptic curve arithmetic
    31.
    发明授权
    Method and apparatus for performing elliptic curve arithmetic 有权
    执行椭圆曲线运算的方法和装置

    公开(公告)号:US07778412B2

    公开(公告)日:2010-08-17

    申请号:US12197667

    申请日:2008-08-25

    IPC分类号: H04L9/00 H04L9/14

    摘要: A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use the information. The computations produce an incorrect result if the point is not on the elliptic curve.

    摘要翻译: 使用椭圆曲线对椭圆曲线密码系统中的点执行密码操作的方法。 该方法包括以下步骤:获得唯一地识别椭圆曲线的信息,并在点上执行计算以获得密码操作的结果。 计算使用信息。 如果点不在椭圆曲线上,计算将产生不正确的结果。

    IMPLICIT CERTIFICATE SCHEME
    32.
    发明申请
    IMPLICIT CERTIFICATE SCHEME 有权
    隐私证明方案

    公开(公告)号:US20100166188A1

    公开(公告)日:2010-07-01

    申请号:US12627906

    申请日:2009-11-30

    IPC分类号: H04L9/08

    摘要: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding with ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate. The entity A's public key information may be reconstructed from public information, and A's implicit certificate.

    摘要翻译: 一种在安全数字通信系统中生成公共密钥的方法,其具有至少一个可信实体CA和订户实体A.对于每个实体A,可信实体选择区分实体A的唯一标识。然后,可信实体生成公共 通过数字地组合从可信实体和实体A的各私有值获得的公共值,实体A的关键重建公共数据。实体A的唯一身份和公钥重建公共数据作为A的隐式证书。 可信实体将隐式证书信息与数学函数组合以导出实体信息ƒ并通过与ƒ与可信实体的私有值绑定来生成值kA。 可信实体将值kA发送给实体,以允许A从kA,A的私有值和A的隐式证书生成私钥。 实体A的公钥信息可以从公共信息和A的隐式证书重建。

    Strengthened public key protocol
    34.
    发明申请
    Strengthened public key protocol 有权
    加强公钥协议

    公开(公告)号:US20100014663A1

    公开(公告)日:2010-01-21

    申请号:US12458468

    申请日:2009-07-13

    IPC分类号: H04L9/30 H04L9/00

    摘要: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.

    摘要翻译: 一种确定在一对记者之间交换的消息的完整性的方法。 通过将消息体现在由其中一个记者选择的私钥派生的公共密钥的功能中来保护消息。 该方法包括首先获得公钥。 然后对公钥进行至少一个数学测试,以确定公钥是否满足预定义的数学特性。 如果公钥满足预定义的数学特征,则接受使用公钥的消息。

    MASKED DIGITAL SIGNATURES
    35.
    发明申请
    MASKED DIGITAL SIGNATURES 有权
    屏蔽数字签名

    公开(公告)号:US20090319790A1

    公开(公告)日:2009-12-24

    申请号:US12488652

    申请日:2009-06-22

    IPC分类号: H04L9/00

    摘要: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual ElGamal or ECDSA type signature verification.

    摘要翻译: 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的ElGamal或ECDSA类型签名验证。

    METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE ARITHMETIC
    36.
    发明申请
    METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE ARITHMETIC 有权
    用于执行椭圆曲线算术的方法和装置

    公开(公告)号:US20090074180A1

    公开(公告)日:2009-03-19

    申请号:US12197667

    申请日:2008-08-25

    IPC分类号: H04L9/28

    摘要: A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use the information. The computations produce an incorrect result if the point is not on the elliptic curve.

    摘要翻译: 使用椭圆曲线对椭圆曲线密码系统中的点执行密码操作的方法。 该方法包括以下步骤:获得唯一地识别椭圆曲线的信息,并在点上执行计算以获得密码操作的结果。 计算使用信息。 如果点不在椭圆曲线上,计算将产生不正确的结果。

    TRANSACTION VERIFICATION PROTOCOL FOR SMART CARDS
    37.
    发明申请
    TRANSACTION VERIFICATION PROTOCOL FOR SMART CARDS 有权
    智能卡交易验证协议

    公开(公告)号:US20080183607A1

    公开(公告)日:2008-07-31

    申请号:US11959098

    申请日:2007-12-18

    申请人: Scott A. Vanstone

    发明人: Scott A. Vanstone

    IPC分类号: G06Q20/00

    摘要: A protocol appropriate for smartcard purchase applications such as those that might be completed between a terminal or ATM and a users personal card is disclosed The protocol provides a signature scheme which allows the card to authenticate the terminal without unnecessary signature verification which is an computationally intense operation for the smart card. The only signature verification required is that of the terminal identification (as signed by the certifying authority, or CA, which is essential to any such protocol). In the preferred embodiment, the protocol provides the card and terminal from fraudulent attacks from impostor devices, either a card or terminal.

    摘要翻译: 公开了适用于智能卡购买应用的协议,例如可以在终端或ATM与用户个人卡之间完成的协议的协议。该协议提供了一种签名方案,其允许该卡在不进行不必要的签名验证的情况下进行认证,该验证是计算强度的操作 为智能卡。 所需的唯一签名验证是终端标识(由认证机构签发的CA或任何此类协议必不可少的CA)。 在优选实施例中,该协议为卡和终端提供来自假冒设备(卡或终端)的欺诈攻击。

    Transaction verification protocol for smart cards
    38.
    发明授权
    Transaction verification protocol for smart cards 有权
    智能卡交易验证协议

    公开(公告)号:US07328338B1

    公开(公告)日:2008-02-05

    申请号:US09360575

    申请日:1999-07-26

    申请人: Scott A. Vanstone

    发明人: Scott A. Vanstone

    IPC分类号: H04L9/00

    摘要: A protocol appropriate for smartcard purchase applications such as those that might be completed between a terminal or ATM and a users personal card is disclosed. The protocol provides a signature scheme which allows the card to authenticate the terminal without unnecessary signature verification which is an computationally intense operation for the smart card. The only signature verification required is that of the terminal identification (as signed by the certifying authority, or CA, which is essential to any such protocol). In the preferred embodiment, the protocol provides the card and terminal from fraudulent attacks from impostor devices, either a card or terminal.

    摘要翻译: 公开了适用于智能卡购买应用的协议,例如可以在终端或ATM之间完成的协议和用户个人卡。 该协议提供了一种签名方案,其允许该卡对该终端进行认证,而不需要进行不必要的签名验证,这是针对智能卡的计算强度的操作。 所需的唯一签名验证是终端标识(由认证机构签发的CA或任何此类协议必不可少的CA)。 在优选实施例中,该协议为卡和终端提供来自假冒设备(卡或终端)的欺诈攻击。

    Masked digital signatures
    39.
    发明授权
    Masked digital signatures 有权
    蒙面的数字签名

    公开(公告)号:US07260723B2

    公开(公告)日:2007-08-21

    申请号:US09773665

    申请日:2001-02-02

    IPC分类号: H04L9/00

    摘要: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual ElGamal or ECDSA type signature verification.

    摘要翻译: 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的ElGamal或ECDSA类型签名验证。

    Implicit certificate scheme
    40.
    发明授权
    Implicit certificate scheme 有权
    隐性证书制度

    公开(公告)号:US06792530B1

    公开(公告)日:2004-09-14

    申请号:US09667819

    申请日:2000-09-22

    IPC分类号: H04L900

    摘要: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity A to permit A to generate a private key from kA, A's private value and A's implicit certificate. The entity A's public key information may be reconstructed from public information, and A's implicit certificate.

    摘要翻译: 一种在安全数字通信系统中生成公共密钥的方法,其具有至少一个可信实体CA和订户实体A.对于每个实体A,可信实体选择区分实体A的唯一标识。然后,可信实体生成公共 通过数字地组合从可信实体和实体A的各私有值获得的公共值,实体A的关键重建公共数据。实体A的唯一身份和公钥重建公共数据作为A的隐式证书。 可信实体将隐式证书信息与数学函数组合以导出实体信息f,并通过将f与可信实体的私有值绑定来生成值kA。 可信实体向实体A发送值kA以允许A从kA,A的私有值和A的隐式证书生成私钥。 实体A的公钥信息可以从公共信息和A的隐式证书重建。