Implicitly Certified Digital Signatures
    1.
    发明申请

    公开(公告)号:US20200028694A1

    公开(公告)日:2020-01-23

    申请号:US16150930

    申请日:2018-10-03

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.

    Accelerated Verification of Digital Signatures and Public Keys
    2.
    发明申请
    Accelerated Verification of Digital Signatures and Public Keys 审中-公开
    加速验证数字签名和公钥

    公开(公告)号:US20140344579A1

    公开(公告)日:2014-11-20

    申请号:US14318313

    申请日:2014-06-27

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3066 G06F7/725 H04L9/30 H04L9/3252

    Abstract: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and that v=w/z. The verification equality R=uG+vQ may then be computed as −zR+(uz mod n)+wQ=O with z and w of reduced bit length This is beneficial in digital signature verification where increased verification can be attained.

    Abstract translation: 通过将至少一个操作数布置成具有相对较小的比特长度来提供有限域中的组操作的组合的加速计算。 在椭圆曲线组中,验证表示点R的值对应于两个其他点uG和vG的和是通过导出减小位长度的整数w,z以及v = w / z获得的。 然后,验证等式R = uG + vQ可以被计算为-zR +(uz mod n)+ wQ = 0,其中z和w为减少的比特长度这对于可以获得增加的验证的数字签名验证是有益的。

    Generating Cryptographic Function Parameters From Compact Source Code

    公开(公告)号:US20190356666A1

    公开(公告)日:2019-11-21

    申请号:US16529629

    申请日:2019-08-01

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.

    Method and Apparatus for Verifiable Generation of Public Keys
    4.
    发明申请
    Method and Apparatus for Verifiable Generation of Public Keys 有权
    可验证生成公钥的方法和装置

    公开(公告)号:US20140325227A1

    公开(公告)日:2014-10-30

    申请号:US14203079

    申请日:2014-03-10

    Applicant: Certicom Corp.

    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.

    Abstract translation: 本发明提供了可验证地生成公钥的方法。 根据该方法,首先生成自签名签名,然后将其用作生成一对私钥和公钥的输入。 签名的验证证明密钥是利用签名的密钥生成过程产生的。 认证机构可以验证和验证从可验证密钥生成过程产生的公钥。

    METHOD AND SYSTEM FOR KEY AGREEMENT UTILIZING SEMIGROUPS

    公开(公告)号:US20190165936A1

    公开(公告)日:2019-05-30

    申请号:US15824398

    申请日:2017-11-28

    Applicant: Certicom Corp.

    Abstract: A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.

    METHOD AND SYSTEM FOR CHEON RESISTANT STATIC DIFFIE-HELLMAN SECURITY

    公开(公告)号:US20170324556A1

    公开(公告)日:2017-11-09

    申请号:US15145428

    申请日:2016-05-03

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3066 H04L9/002 H04L9/006 H04L9/0841 H04L9/0861

    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≦48.

    SYSTEM AND METHOD FOR AUTHENTICATING RFID TAGS
    7.
    发明申请
    SYSTEM AND METHOD FOR AUTHENTICATING RFID TAGS 有权
    用于认证RFID标签的系统和方法

    公开(公告)号:US20150002260A1

    公开(公告)日:2015-01-01

    申请号:US14319545

    申请日:2014-06-30

    Applicant: Certicom Corp.

    Abstract: A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.

    Abstract translation: 提供了一种向射频识别(RFID)标签提供真实性的系统和方法。 该方法包括生成多个数字签名,其中使用该数字签名唯一的索引值并使用与RFID标签相关联的信息来生成每个数字签名; 并将所述多个数字签名与相应的索引值相关联地存储在所述RFID标签上,以使得能够根据所提供的索引值来选择期望的数字签名。 还提供了使得RFID读取器能够认证RFID标签的系统和方法,RFID标签利用包括索引值的挑战来请求存储的签名之一并进行认证。 还提供了被配置为参与询问 - 响应协议的RFID标签。

    METHOD AND SYSTEM FOR CHEON RESISTANT STATIC DIFFIE-HELLMAN SECURITY

    公开(公告)号:US20200186345A1

    公开(公告)日:2020-06-11

    申请号:US16164965

    申请日:2018-10-19

    Applicant: Certicom Corp.

    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.

Patent Agency Ranking