-
公开(公告)号:US08712042B2
公开(公告)日:2014-04-29
申请号:US13527007
申请日:2012-06-19
申请人: Minghua Qu , Scott A. Vanstone
发明人: Minghua Qu , Scott A. Vanstone
IPC分类号: H04L9/30
CPC分类号: H04L9/3263 , H04L9/0844 , H04L9/3247
摘要: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.
摘要翻译: 一种在具有至少一个可信实体CA和订户实体A的安全数字通信系统中生成公共密钥的方法。可信实体选择区分每个实体A的唯一标识。然后,可信实体生成公共密钥重建公共数据 实体A通过数学地组合从可信实体的相应私有值和实体A获得的公共值。实体A的唯一身份和公钥重建公共数据用作A的隐式证书。 可信实体将隐式证书信息与数学函数组合以导出实体信息f,并通过将f与可信实体的私有值绑定来生成值kA。 可信实体将值kA发送给实体,以允许A从kA,A的私有值和A的隐式证书生成私钥。
-
公开(公告)号:US08634559B2
公开(公告)日:2014-01-21
申请号:US13461586
申请日:2012-05-01
申请人: Daniel R. Brown , Scott A. Vanstone
发明人: Daniel R. Brown , Scott A. Vanstone
CPC分类号: H04L9/3066 , H04L9/3252 , H04L2209/805
摘要: An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.
摘要翻译: 提供了一种经过认证的RFID系统,与传统的公共密钥实现(如RSA)相比,使用椭圆曲线密码术(ECC)来减少签名大小和读/写时间。 ECDSA或ECPVS可以用于减小签名大小,并且ECPVS可用于隐藏包含敏感产品标识信息的RFID标签的一部分。 因此,可以使用较小的标签,或者可以在制造或供应链中的不同阶段写入多个签名。 密钥管理系统用于分发验证密钥,并且聚合签名方案也被提供用于向RFID标签添加多个签名,例如在供应链中。
-
公开(公告)号:US08588409B2
公开(公告)日:2013-11-19
申请号:US11272150
申请日:2005-11-14
IPC分类号: G06F21/00
CPC分类号: G06F7/72 , G06F7/724 , G06F7/725 , G06F2207/7204 , H04L9/002 , H04L9/0841 , H04L9/3066 , H04L2209/26
摘要: Methods for choosing groups for a static Diffie-Hellman key agreement protocol to inhibit active attacks by an adversary are provided. In mod p groups, an even h is chosen of value approximately ( 9/16)(log2n)2, values r and n are determined using sieving and primality testing on r and n, and a value t is found to compute p=tn+1 wherein p is prime. In elliptic curve groups defined over a binary filed, a random curve is chosen, the number of points on the curve is counted and this number is checked for value of 2n wherein n is prime and n−1 meets preferred criteria. In elliptic curve groups defined over a prime field of order q, a value n=hr+1 is computed, wherein n is prime and n−1 meets preferred criteria, and a complex multiplication method is applied on n to produce a value q and an elliptic curve E defined over q and having an order n.
摘要翻译: 提供了用于选择静态Diffie-Hellman密钥协商协议以抑制对手的主动攻击的组的方法。 在mod p组中,偶数h被选择为大约(9/16)(log2n)2的值,使用r和n上的筛选和原色度测试来确定值r和n,并且发现值t计算p = tn +1,其中p是素数。 在二进制字段中定义的椭圆曲线组中,选择随机曲线,对曲线上的点数进行计数,并检查2n的值,其中n是素数,n-1符合优选标准。 在序列q的质场上定义的椭圆曲线组中,计算值n = hr + 1,其中n是素数,n-1满足优选标准,并且在n上应用复数乘法以产生值q和 在q上定义并具有n阶的椭圆曲线E.
-
公开(公告)号:US08522012B2
公开(公告)日:2013-08-27
申请号:US13285749
申请日:2011-10-31
申请人: Scott A. Vanstone
发明人: Scott A. Vanstone
IPC分类号: H04L29/06
CPC分类号: H04L9/3268 , H04L9/3247 , H04L2209/56 , H04L2209/64
摘要: A method of certifying a correspondent in a data communication system by a certifying authority. The certifying authority includes a cryptographic unit. The method includes generating a random number and implicit certificate components based on the random number using the cryptographic unit. The implicit certificate components have a first component and a second component. The method also includes providing the implicit certificate components for use in the data communication system and providing a public key of the certifying authority for use in derivation of a public key of the correspondent from the first component. The certifying authority recertifies the correspondent by providing implicit certificate components using a changed value for the random number.
摘要翻译: 一种由认证机构认证数据通信系统中的记者的方法。 认证机构包括加密单元。 该方法包括使用密码单元基于随机数生成随机数和隐含证书组件。 隐式证书组件具有第一组件和第二组件。 该方法还包括提供在数据通信系统中使用的隐含证书组件,并提供认证机构的公开密钥,以用于从第一组件导出对方的公开密钥。 认证机构通过为随机数使用更改的值提供隐含的证书组件来重新认证记者。
-
85.
公开(公告)号:US08457307B2
公开(公告)日:2013-06-04
申请号:US12170658
申请日:2008-07-10
申请人: Scott A. Vanstone
发明人: Scott A. Vanstone
IPC分类号: H04K1/00
CPC分类号: H04L9/3263 , H04L9/3073
摘要: The invention relates to a method of generating an implicit certificate and a method of generating a private key from a public key. The method involves a method generating an implicit certificate in three phases. The public key may be an entity's identity or derived from an entity's identify. Only the owner of the public key possesses complete information to generate the corresponding private key. No authority is required to nor able to generate an entity's private key.
-
公开(公告)号:US20130067233A1
公开(公告)日:2013-03-14
申请号:US13609153
申请日:2012-09-10
申请人: Scott A. Vanstone
发明人: Scott A. Vanstone
IPC分类号: H04L9/32
CPC分类号: G07F7/1008 , G06Q20/341 , G06Q20/3674 , G06Q20/3825 , G06Q20/401 , G06Q20/40975 , G06Q2220/00 , G07F7/1016 , H04L9/3066 , H04L9/3249 , H04L9/3252 , H04L2209/56
摘要: To verify a pair of correspondents in an. electronic transaction, each of the correspondents utilises respective parts of first and second signature schemes. The first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The first correspondent signs information according to the first signature scheme, the second correspondent verifies the first signature received from the first correspondent, using the first signature scheme. The second correspondent then signs information according to the second signature scheme and the first correspondent verifies the second signature received from the second correspondent, according to the second signature algorithm. The method thereby allows one of the correspondents in participate with relatively little computing power while maintaining security of the transaction.
摘要翻译: 验证一对记者。 电子交易,每个记者利用第一和第二签名方案的各个部分。 第一个签名方案在计算上在计算上比验证更难,而第二个签名方案在计算上比签名在计算上更加困难。 第一记录器根据第一签名方案对信息进行签名,第二通信方使用第一签名方案来验证从第一通信对方接收到的第一签名。 然后,第二记者根据第二签名方案对信息进行签名,并且根据第二签名算法,第一通信方验证从第二通信方接收到的第二签名。 因此,该方法允许参与者之一具有相对较少的计算能力,同时保持事务的安全性。
-
公开(公告)号:US08359469B2
公开(公告)日:2013-01-22
申请号:US13315509
申请日:2011-12-09
IPC分类号: H04L9/00
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
-
公开(公告)号:US20120213366A1
公开(公告)日:2012-08-23
申请号:US13461586
申请日:2012-05-01
申请人: Daniel R. Brown , Scott A. Vanstone
发明人: Daniel R. Brown , Scott A. Vanstone
IPC分类号: H04K1/00
CPC分类号: H04L9/3066 , H04L9/3252 , H04L2209/805
摘要: An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.
摘要翻译: 提供了一种经过认证的RFID系统,与传统的公共密钥实现(如RSA)相比,使用椭圆曲线密码术(ECC)来减少签名大小和读/写时间。 ECDSA或ECPVS可以用于减小签名大小,并且ECPVS可用于隐藏包含敏感产品标识信息的RFID标签的一部分。 因此,可以使用较小的标签,或者可以在制造或供应链中的不同阶段写入多个签名。 密钥管理系统用于分发验证密钥,并且聚合签名方案也被提供用于向RFID标签添加多个签名,例如在供应链中。
-
公开(公告)号:US20120131322A1
公开(公告)日:2012-05-24
申请号:US13357411
申请日:2012-01-24
申请人: Keelan Smith , Scott A. Vanstone , Daniel R. Brown , Darryl L. Parisien , Ashok Vadekar , Brian Neill
发明人: Keelan Smith , Scott A. Vanstone , Daniel R. Brown , Darryl L. Parisien , Ashok Vadekar , Brian Neill
CPC分类号: G06F21/575 , G06F21/73 , G06F2221/2109 , G07F17/32 , G07F17/323 , G07F17/3241 , H04L9/3247 , H04L63/0428 , H04L63/0823 , H04L2209/60 , H04L2463/101
摘要: A method and system are provided for authenticating and securing an embedded device using a secure boot procedure and a full non-volatile memory encryption process that implements Elliptic Curve Pinstov-Vanstone Signature (ECPV) scheme with message recovery on a personalized BIOS and master boot record. The signature includes code that is recovered in order to unlock a key that is in turn used to decrypt the non-volatile memory. The use of ECPVS provides an implicit verification that the hardware is bound to the BIOS since the encrypted memory is useless unless properly decrypted with the proper key.
摘要翻译: 提供了一种方法和系统,用于使用安全引导过程和完整的非易失性存储器加密处理来验证和保护嵌入式设备,所述完整非易失性存储器加密处理在个性化BIOS和主引导记录上实现具有消息恢复的椭圆曲线Pinstov-Vanstone签名(ECPV)方案 。 签名包括恢复的代码,以便解锁一个依次用于解密非易失性存储器的密钥。 使用ECPVS提供了硬件绑定到BIOS的隐含验证,因为加密的内存是无用的,除非使用适当的密钥进行正确的解密。
-
公开(公告)号:US20120102318A1
公开(公告)日:2012-04-26
申请号:US13285749
申请日:2011-10-31
申请人: Scott A. Vanstone
发明人: Scott A. Vanstone
IPC分类号: H04L29/06
CPC分类号: H04L9/3268 , H04L9/3247 , H04L2209/56 , H04L2209/64
摘要: A method of certifying a correspondent in data communication system by a certifying authority. The certifying authority includes a cryptographic unit. The method includes generating a random number and implicit certificate components based on the random number using the cryptographic unit. The implicit certificate components have a first component and a second component. The method also includes providing the implicit certificate components for use in the data communication system and providing a public key of the certifying authority for use in derivation of a public key of the correspondent from the first component. The certifying authority recertifies the correspondent by providing implicit certificate components using a changed value for the random number.
摘要翻译: 一种由认证机构认证数据通信系统中的记者的方法。 认证机构包括加密单元。 该方法包括使用密码单元基于随机数生成随机数和隐含证书组件。 隐式证书组件具有第一组件和第二组件。 该方法还包括提供在数据通信系统中使用的隐含证书组件,并提供认证机构的公开密钥,以用于从第一组件导出对方的公开密钥。 认证机构通过为随机数使用更改的值提供隐含的证书组件来重新认证记者。
-
-
-
-
-
-
-
-
-