Implicitly certified digital signatures

    公开(公告)号:US10110386B2

    公开(公告)日:2018-10-23

    申请号:US13464007

    申请日:2012-05-04

    IPC分类号: H04L9/32

    摘要: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.

    Key agreement for wireless communication
    2.
    发明授权
    Key agreement for wireless communication 有权
    无线通信的主要协议

    公开(公告)号:US08971851B2

    公开(公告)日:2015-03-03

    申请号:US13536747

    申请日:2012-06-28

    IPC分类号: H04M3/16

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    Assessing cryptographic entropy
    3.
    发明授权
    Assessing cryptographic entropy 有权
    评估加密熵

    公开(公告)号:US08787564B2

    公开(公告)日:2014-07-22

    申请号:US13307078

    申请日:2011-11-30

    IPC分类号: H04K1/00 H04L9/00

    摘要: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.

    摘要翻译: 描述了用于评估加密系统中的熵的系统,方法,软件及其组合。 在某些方面,样本值由熵源系统产生。 可以为每个样本值确定典型性。 根据样本值的典型值确定预选分布的分级。 基于分级选择预选分布的子集。 基于多个分布的子集来计算熵源系统的熵。

    KEY AGREEMENT FOR WIRELESS COMMUNICATION
    4.
    发明申请
    KEY AGREEMENT FOR WIRELESS COMMUNICATION 有权
    无线通信的主要协议

    公开(公告)号:US20140004824A1

    公开(公告)日:2014-01-02

    申请号:US13536747

    申请日:2012-06-28

    IPC分类号: H04W12/06

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    ASSESSING CRYPTOGRAPHIC ENTROPY
    5.
    发明申请
    ASSESSING CRYPTOGRAPHIC ENTROPY 有权
    评估CRYPTOGRAPHIC熵

    公开(公告)号:US20130136255A1

    公开(公告)日:2013-05-30

    申请号:US13307078

    申请日:2011-11-30

    IPC分类号: H04L9/28

    摘要: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.

    摘要翻译: 描述了用于评估加密系统中的熵的系统,方法,软件及其组合。 在某些方面,样本值由熵源系统产生。 可以为每个样本值确定典型性。 根据样本值的典型值确定预选分布的分级。 基于分级选择预选分布的子集。 基于多个分布的子集来计算熵源系统的熵。

    INCORPORATING DATA INTO CRYPTOGRAPHIC COMPONENTS OF AN ECQV CERTIFICATE
    6.
    发明申请
    INCORPORATING DATA INTO CRYPTOGRAPHIC COMPONENTS OF AN ECQV CERTIFICATE 有权
    将数据纳入ECQV认证的CRYPTOGRAPHIC COMPONENTS

    公开(公告)号:US20120246465A1

    公开(公告)日:2012-09-27

    申请号:US13070178

    申请日:2011-03-23

    IPC分类号: H04L9/30

    摘要: During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information.

    摘要翻译: 在为请求者生成隐式证书期间,证书颁发机构将公钥重构数据中的信息合并在一起,其中公钥重构数据将用于计算请求者的公开密钥。 信息可能与请求者,证书颁发机构和隐含证书中的一个或多个有关。 证书颁发机构对隐含证书中的公钥重构数据进行可逆编码,并将其发送给请求者。 从认证机构收到隐含证书后,请求者可以从公钥重构数据中提取合并信息。 隐式证书可以提供给收件人,收件人还可以提取合并的信息。

    Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
    8.
    发明授权
    Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption 有权
    椭圆曲线上的Trapdoor单向函数及其对较短签名和非对称加密的应用

    公开(公告)号:US08213605B2

    公开(公告)日:2012-07-03

    申请号:US12945234

    申请日:2010-11-12

    IPC分类号: H04L9/30

    摘要: The present invention provides a new trapdoor one-way function. In a general sense, some quadratic algebraic integer z is used. One then finds a curve E and a rational map defining [z] on E. The rational map [z] is the trapdoor one-way function. A judicious selection of z will ensure that [z] can be efficiently computed, that it is difficult to invert, that determination of [z] from the rational functions defined by [z] is difficult, and knowledge of z allows one to invert [z] on a certain set of elliptic curve points. Every rational map is a composition of a translation and an endomorphism. The most secure part of the rational map is the endomorphism as the translation is easy to invert. If the problem of inverting the endomorphism and thus [z] is as hard as the discrete logarithm problem in E, then the size of the cryptographic group can be smaller than the group used for RSA trapdoor one-way functions.

    摘要翻译: 本发明提供了一种新的陷门单向功能。 在一般意义上,使用一些二次代数整数z。 然后找到曲线E和在E上定义[z]的有理图。有理图[z]是陷门单向函数。 z的明智选择将确保可以有效地计算[z],难以反转,[z]定义的[z]的确定是困难的,而z的知识允许反转[ z]在一组椭圆曲线点上。 每一个合理的地图都是一个翻译和一个同化的组合。 理性地图中最安全的部分是翻译易翻译的同化。 如果反转内生的问题,因此[z]与E中的离散对数问题一样困难,则密码组的大小可以小于用于RSA陷门单向函数的组的大小。

    Method and apparatus for performing elliptic curve arithmetic
    9.
    发明授权
    Method and apparatus for performing elliptic curve arithmetic 有权
    执行椭圆曲线运算的方法和装置

    公开(公告)号:US08189772B2

    公开(公告)日:2012-05-29

    申请号:US12836101

    申请日:2010-07-14

    IPC分类号: H04L9/00 H04L9/14

    摘要: A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use the information. The computations produce an incorrect result if the point is not on the elliptic curve.

    摘要翻译: 使用椭圆曲线对椭圆曲线密码系统中的点执行密码操作的方法。 该方法包括以下步骤:获得唯一地识别椭圆曲线的信息,并在点上执行计算以获得密码操作的结果。 计算使用信息。 如果点不在椭圆曲线上,计算将产生不正确的结果。

    ELGAMAL SIGNATURE SCHEMES
    10.
    发明申请
    ELGAMAL SIGNATURE SCHEMES 有权
    ELGAMAL签名计划

    公开(公告)号:US20110213982A1

    公开(公告)日:2011-09-01

    申请号:US12714116

    申请日:2010-02-26

    IPC分类号: H04L9/32 H04L9/28

    摘要: There is disclosed a method of generating a digital signature of a message m. A signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive operation to combine the key d with a first value. The masked value is then multiplied by a second value to obtain component s. The first value is calculated using the message m and another component of the digital signature, and the second value is derived using the inverse of a component of the first value. In this way, the signature component s is generated using a method that counters the effectiveness of side channel attacks, such as differential side channel analysis, by avoiding a direct multiplication using long-term private key d.

    摘要翻译: 公开了一种生成消息m的数字签名的方法。 通过使用单个加法运算首先掩蔽长期私钥d来计算数字签名的签名组件,以将密钥d与第一值组合。 然后将掩蔽值乘以第二个值以获得组件s。 使用消息m和数字签名的另一个分量计算第一个值,并且使用第一个值的分量的倒数导出第二个值。 以这种方式,使用通过避免使用长期私钥d的直接乘法来计算侧信道攻击的有效性的方法来产生签名组件s,例如差分侧信道分析。