Use of Bilinear mappings in cryptographic applications
    1.
    发明申请
    Use of Bilinear mappings in cryptographic applications 有权
    在加密应用程序中使用双线性映射

    公开(公告)号:US20080016346A1

    公开(公告)日:2008-01-17

    申请号:US11316412

    申请日:2005-12-21

    IPC分类号: H04L9/00

    摘要: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.

    摘要翻译: 已知密码学方法涉及计算第一和第二元素的非简并双线性映射,其中之一包括第一实体的秘密。 对于实现为例如Tate配对的映射,可以通过将预定函数应用于第一和第二元素然后用已知指数对结果进行指数来计算该映射。 通过安排第一实体仅执行部分映射,使第一方能够进行关于计算负载,输出大小和安全性的改进,第二实体用于完成映射的计算。 还公开了使用这些改进的加密应用。

    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED
    2.
    发明申请
    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED 有权
    处理信息的方法被保密传输

    公开(公告)号:US20070244944A1

    公开(公告)日:2007-10-18

    申请号:US11548251

    申请日:2006-10-10

    IPC分类号: H04L9/32 G06J1/00

    摘要: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P). This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of said scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.

    摘要翻译: 一种处理从第一模块到第二模块被保密地发送的信息的方法,提供可以执行第一标量乘法以获得第一结果P。 该第一标量乘法包括有序因子的多个生成步骤,需要构建多个第一部分和。 该方法还包括执行第二标量乘法以获得第二结果。 该第二乘法规定可以构建多个第二部分和。 通过基于所述标量乘法的结果处理该信息来获得加密信息。 第二标量乘法的第二部分和使用通过第一标量乘法的生成步骤获得的相同有序因子。

    Authentication method
    3.
    发明申请
    Authentication method 有权
    认证方式

    公开(公告)号:US20070180241A1

    公开(公告)日:2007-08-02

    申请号:US11315633

    申请日:2005-12-22

    IPC分类号: H04L9/30 H04L9/00 H04K1/00

    摘要: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.

    摘要翻译: 通过第二模块的第一模块的认证方法包括以下步骤:由第二模块生成要发送到第一模块的第一随机数据,由第一模块从第一数据开始生成第一数字,并通过 私钥,并且由第二模块生成与第一号码进行比较的第二号码,以便认证第一模块。 从公共参数开始执行产生第二数量的步骤,并且独立于生成第一个数字的步骤。

    Method of processing information to be confidentially transmitted
    4.
    发明授权
    Method of processing information to be confidentially transmitted 有权
    处理要保密传送的信息的方法

    公开(公告)号:US08381267B2

    公开(公告)日:2013-02-19

    申请号:US11548251

    申请日:2006-10-10

    IPC分类号: H04L29/06

    摘要: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P. This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of the scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.

    摘要翻译: 处理从第一模块到第二模块保密地发送的信息的方法提供了可以执行第一标量乘法以便获得第一结果P。 该第一标量乘法包括有序因子的多个生成步骤,需要构建多个第一部分和。 该方法还包括执行第二标量乘法以获得第二结果。 该第二乘法规定可以构建多个第二部分和。 通过基于标量乘法的结果处理该信息来获得加密信息。 第二标量乘法的第二部分和使用通过第一标量乘法的生成步骤获得的相同有序因子。

    Authentication method
    5.
    发明授权
    Authentication method 有权
    认证方式

    公开(公告)号:US08352736B2

    公开(公告)日:2013-01-08

    申请号:US11315633

    申请日:2005-12-22

    IPC分类号: G06F1/02 G06F15/00

    摘要: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.

    摘要翻译: 通过第二模块的第一模块的认证方法包括以下步骤:由第二模块生成要发送到第一模块的第一随机数据,由第一模块从第一数据开始生成第一数字,并通过 私钥,并且由第二模块生成与第一号码进行比较的第二号码,以便认证第一模块。 从公共参数开始执行产生第二数量的步骤,并且独立于生成第一个数字的步骤。

    Computation of a multiplication operation with an electronic circuit and method
    6.
    发明申请
    Computation of a multiplication operation with an electronic circuit and method 有权
    用电子电路和方法计算乘法运算

    公开(公告)号:US20070260664A1

    公开(公告)日:2007-11-08

    申请号:US11786767

    申请日:2007-04-11

    IPC分类号: G06F7/38

    CPC分类号: G06F7/728 G06F7/722

    摘要: A computing method and circuit for computing a modular operation with at least one operand having a binary representation. Iteratively for each bit of this operand, doubling the value of an intermediate result stored in a first memory element by shifting the bits of the intermediate result towards the most significant bit and, while the most significant bit of the intermediate result is one, updating this intermediate result by subtracting a modulus stored in a second memory element.

    摘要翻译: 一种用于利用具有二进制表示的至少一个操作数来计算模块化操作的计算方法和电路。 迭代地对于该操作数的每个位,通过将中间结果的位移向最高有效位来将存储在第一存储元件中的中间结果的值加倍,并且当中间结果的最高有效位为1时,更新该值 通过减去存储在第二存储元件中的模数的中间结果。

    Method for establishing an encrypted communication by means of keys
    7.
    发明申请
    Method for establishing an encrypted communication by means of keys 有权
    通过密钥建立加密通信的方法

    公开(公告)号:US20050102507A1

    公开(公告)日:2005-05-12

    申请号:US10952549

    申请日:2004-09-28

    IPC分类号: H04L9/08 H04L29/06 H04L9/00

    摘要: A method of establishing an encrypted communication by means of keys between a first electronic device associated with a first trusted authority and a second electronic device, including generating a first secret key associated with the first device for the management of the communication, generating, at least in part by means of the first authority, a second secret key associated with the second device for the management of the communication. The method includes generating the first key at least in part by a second trusted authority associated with the second device that is distinct and autonomous from the first authority. Alternatively, the generation of the first key is performed, at least in part, by the second device passing through the second trusted authority.

    摘要翻译: 一种在与第一可信管理机构相关联的第一电子设备与第二电子设备之间通过密钥建立加密通信的方法,包括生成与第一设备相关联的用于通信管理的第一密钥,至少产生 部分地通过第一权限,与用于管理通信的第二设备相关联的第二密钥。 该方法包括至少部分地由与第二设备相关联的第二可信管理机构产生第一密钥,所述第二信任机构与第一授权机构不同且自主。 或者,至少部分地由通过第二可信管理机构的第二设备执行第一密钥的生成。

    Method for establishing a communication between two devices
    8.
    发明申请
    Method for establishing a communication between two devices 有权
    用于建立两个设备之间的通信的方法

    公开(公告)号:US20050125670A1

    公开(公告)日:2005-06-09

    申请号:US10990319

    申请日:2004-11-16

    摘要: A method establishes a communication between a first electronic device associated with a first trusted authority and a second electronic device. The method includes: making a first key available to the first device for the communication between the first authority and the first device. A second trusted authority, associated with the second device and distinct and autonomous with respect to the first authority, generates a second key in order to communicate with the second device. Furthermore, the method includes: making the second key available to the second device; and providing the first and second devices with a communication key, to be used communication between the first and second devices, through at least one of the first and second authorities.

    摘要翻译: 一种方法建立与第一可信管理机构相关联的第一电子设备与第二电子设备之间的通信。 该方法包括:使第一密钥可用于第一设备以用于第一授权机构和第一设备之间的通信。 与第二设备相关联并且相对于第一权限不同且自主的第二可信授权机构产生第二密钥以便与第二设备通信。 此外,该方法包括:使第二密钥可用于第二设备; 以及通过所述第一和第二权限中的至少一个,为所述第一和第二设备提供通信密钥以供在所述第一和第二设备之间进行通信。

    Use of bilinear mappings in cryptographic applications
    10.
    发明授权
    Use of bilinear mappings in cryptographic applications 有权
    在加密应用程序中使用双线性映射

    公开(公告)号:US07929691B2

    公开(公告)日:2011-04-19

    申请号:US11316412

    申请日:2005-12-21

    IPC分类号: H04K1/00

    摘要: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.

    摘要翻译: 已知密码学方法涉及计算第一和第二元素的非简并双线性映射,其中之一包括第一实体的秘密。 对于实现为例如Tate配对的映射,可以通过将预定函数应用于第一和第二元素然后用已知指数对结果进行指数来计算该映射。 通过安排第一实体仅执行部分映射,使第一方能够进行关于计算负载,输出大小和安全性的改进,第二实体用于完成映射的计算。 还公开了使用这些改进的加密应用。