Method of processing information to be confidentially transmitted
    1.
    发明授权
    Method of processing information to be confidentially transmitted 有权
    处理要保密传送的信息的方法

    公开(公告)号:US08381267B2

    公开(公告)日:2013-02-19

    申请号:US11548251

    申请日:2006-10-10

    IPC分类号: H04L29/06

    摘要: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P. This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of the scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.

    摘要翻译: 处理从第一模块到第二模块保密地发送的信息的方法提供了可以执行第一标量乘法以便获得第一结果P。 该第一标量乘法包括有序因子的多个生成步骤,需要构建多个第一部分和。 该方法还包括执行第二标量乘法以获得第二结果。 该第二乘法规定可以构建多个第二部分和。 通过基于标量乘法的结果处理该信息来获得加密信息。 第二标量乘法的第二部分和使用通过第一标量乘法的生成步骤获得的相同有序因子。

    Authentication method
    2.
    发明授权
    Authentication method 有权
    认证方式

    公开(公告)号:US08352736B2

    公开(公告)日:2013-01-08

    申请号:US11315633

    申请日:2005-12-22

    IPC分类号: G06F1/02 G06F15/00

    摘要: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.

    摘要翻译: 通过第二模块的第一模块的认证方法包括以下步骤:由第二模块生成要发送到第一模块的第一随机数据,由第一模块从第一数据开始生成第一数字,并通过 私钥,并且由第二模块生成与第一号码进行比较的第二号码,以便认证第一模块。 从公共参数开始执行产生第二数量的步骤,并且独立于生成第一个数字的步骤。

    Use of Bilinear mappings in cryptographic applications
    3.
    发明申请
    Use of Bilinear mappings in cryptographic applications 有权
    在加密应用程序中使用双线性映射

    公开(公告)号:US20080016346A1

    公开(公告)日:2008-01-17

    申请号:US11316412

    申请日:2005-12-21

    IPC分类号: H04L9/00

    摘要: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.

    摘要翻译: 已知密码学方法涉及计算第一和第二元素的非简并双线性映射,其中之一包括第一实体的秘密。 对于实现为例如Tate配对的映射,可以通过将预定函数应用于第一和第二元素然后用已知指数对结果进行指数来计算该映射。 通过安排第一实体仅执行部分映射,使第一方能够进行关于计算负载,输出大小和安全性的改进,第二实体用于完成映射的计算。 还公开了使用这些改进的加密应用。

    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED
    4.
    发明申请
    METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED 有权
    处理信息的方法被保密传输

    公开(公告)号:US20070244944A1

    公开(公告)日:2007-10-18

    申请号:US11548251

    申请日:2006-10-10

    IPC分类号: H04L9/32 G06J1/00

    摘要: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P). This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of said scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.

    摘要翻译: 一种处理从第一模块到第二模块被保密地发送的信息的方法,提供可以执行第一标量乘法以获得第一结果P。 该第一标量乘法包括有序因子的多个生成步骤,需要构建多个第一部分和。 该方法还包括执行第二标量乘法以获得第二结果。 该第二乘法规定可以构建多个第二部分和。 通过基于所述标量乘法的结果处理该信息来获得加密信息。 第二标量乘法的第二部分和使用通过第一标量乘法的生成步骤获得的相同有序因子。

    Authentication method
    5.
    发明申请
    Authentication method 有权
    认证方式

    公开(公告)号:US20070180241A1

    公开(公告)日:2007-08-02

    申请号:US11315633

    申请日:2005-12-22

    IPC分类号: H04L9/30 H04L9/00 H04K1/00

    摘要: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.

    摘要翻译: 通过第二模块的第一模块的认证方法包括以下步骤:由第二模块生成要发送到第一模块的第一随机数据,由第一模块从第一数据开始生成第一数字,并通过 私钥,并且由第二模块生成与第一号码进行比较的第二号码,以便认证第一模块。 从公共参数开始执行产生第二数量的步骤,并且独立于生成第一个数字的步骤。

    Authentication Method And Apparatus Using One Time Pads
    6.
    发明申请
    Authentication Method And Apparatus Using One Time Pads 审中-公开
    使用一次性垫的认证方法和装置

    公开(公告)号:US20110302421A1

    公开(公告)日:2011-12-08

    申请号:US13202808

    申请日:2010-01-20

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3271 H04L9/3228

    摘要: An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one (10A) of the entities, the method involves sending (20S) a challenge that it has generated (20) by subjecting a first OTP block to a randomly-selected member of a first family of hashing functions. Each member of the first hashing-function family is associated with a respective member of a second family of hashing functions. On receiving back a response, the first entity (10A) tests (26) whether the response originates from the second entity (10B) by seeking a match between the response and a reference value generated (25) by subjecting a predetermined said OTP block to the member of the second hashing-function family that is associated with the member of the first hashing-function family used to generate the challenge.

    摘要翻译: 在具有匹配的具有多个OTP块的一次性焊盘的实体(10A; 10B)之间提供认证方法。 从实体的第一个(10A)的观点来看,该方法涉及通过使第一OTP块经历第一散列函数族的随机选择的成员来发送(20S)已经生成的挑战(20)。 第一散列函数系列的每个成员与第二系列散列函数的相应成员相关联。 在接收到响应时,第一实体(10A)通过寻求通过使预定的所述OTP块对应于所述响应和参考值之间的匹配来生成(25)的匹配,来测试(26)响应是否源于第二实体(10B) 与第一个哈希函数族的成员相关联的第二个散列函数族的成员用于产生挑战。

    Method Of Updating Data
    7.
    发明申请
    Method Of Updating Data 有权
    更新数据的方法

    公开(公告)号:US20080183999A1

    公开(公告)日:2008-07-31

    申请号:US12019237

    申请日:2008-01-24

    IPC分类号: G06F12/14

    摘要: A method of updating a data entry stored on a data storage unit, the data entry including data elements that are unique to the data storage unit and the data entry, the method comprising the steps of generating at the data storage unit an update request including the data entry for transmission to an authority authorised to update the data entry, extracting at the authority the unique data elements from the update request and verifying the authenticity of the data storage unit and data entry from the unique data elements, generating an updated data entry including a further data element unique to the updated data entry and derived from the updated data and transmitting the updated data entry to the data storage unit, and storing the updated data entry on the data storage unit.

    摘要翻译: 一种更新存储在数据存储单元上的数据条目的方法,所述数据条目包括对于数据存储单元和数据条目是唯一的数据元素,该方法包括以下步骤:在数据存储单元处生成包括 用于传输给授权更新数据条目的机构的数据条目,从授权机构提取来自更新请求的唯一数据元素,并从唯一数据元素验证数据存储单元的真实性和数据输入,生成更新的数据条目,包括 更新的数据条目唯一的另一个数据元素,并从更新的数据导出并将更新的数据条目发送到数据存储单元,并将更新的数据条目存储在数据存储单元上。

    Quantum key distribution method and apparatus
    8.
    发明申请
    Quantum key distribution method and apparatus 有权
    量子密钥分发方法及装置

    公开(公告)号:US20070014415A1

    公开(公告)日:2007-01-18

    申请号:US11454632

    申请日:2006-06-16

    IPC分类号: H04K1/00 H04L9/00

    CPC分类号: H04L9/0858 G06F7/588

    摘要: A quantum key distribution (QKD) method involves the sending of random data from a QKD transmitter to a QKD receiver over a quantum signal channel, and the QKD transmitter and receiver respectively processing the data transmitted and received over the quantum signal channel in order to seek to derive a common random data set. This processing is effected with the aid of messages exchanged between QKD transmitter and receiver over an insecure classical communication channel. The processing concludes with a check, effected by an exchange of authenticated messages over the classical communication channel, that the QKD transmitter and receiver have derived the same random data set. At least some of the other messages exchanged during processing are exchanged without authentication and integrity checking. A QKD transmitter and QKD receiver are also disclosed.

    摘要翻译: 量子密钥分配(QKD)方法涉及通过量子信道从QKD发射机向QKD接收机发送随机数据,并且QKD发射机和接收机分别处理通过量子信号信道发送和接收的数据,以寻找 以得出公共随机数据集。 借助于在不安全的经典通信信道上在QKD发射机和接收机之间交换的消息来实现该处理。 该处理结束于通过经典通信信道的认证消息交换实现的检验,即QKD发射机和接收机已经导出相同的随机数据集。 在处理期间交换的至少一些其他消息被交换,而不进行认证和完整性检查。 还公开了QKD发射机和QKD接收机。

    Cryptographic method and apparatus
    9.
    发明申请
    Cryptographic method and apparatus 有权
    密码方法和装置

    公开(公告)号:US20060013389A1

    公开(公告)日:2006-01-19

    申请号:US11166921

    申请日:2005-06-23

    IPC分类号: H04L9/30

    摘要: A cryptographic method and apparatus is provided in which an identifier-based encryption process is used to encrypt a message with an identifier string that specifies conditions to be checked by a trusted entity before providing a decrypted form of the encrypted message, or enabling its decryption. A further trusted entity is used to verify the identity of the message sender as indicated by a further identifier string, and to provide the sender with a secret key that the sender uses to generate complimentary signature components. These signature components are sent along with the encrypted message and are used, along with other data including the first identifier string and a public key of the further trusted entity, to authenticate the identity of the message sender.

    摘要翻译: 提供了一种加密方法和装置,其中使用基于标识符的加密过程来加密具有标识符串的消息,所述标识符字符串在提供加密消息的解密形式之前指定由受信任实体检查的条件,或使其能够进行解密。 另一受信任的实体用于验证由另外的标识符字符串指示的消息发送者的身份,并向发送者提供发送者用于生成互补签名组件的秘密密钥。 这些签名组件与加密消息一起发送,并与包括第一标识符串和另外可信实体的公开密钥的其他数据一起使用,以验证消息发送者的身份。

    Cryptographic method and apparatus
    10.
    发明申请
    Cryptographic method and apparatus 审中-公开
    密码方法和装置

    公开(公告)号:US20050021973A1

    公开(公告)日:2005-01-27

    申请号:US10831776

    申请日:2004-04-22

    摘要: First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.

    摘要翻译: 第一数据由第一方使用至少使用第一数据的散列值形成的加密密钥串进行加密,该散列值是清楚的或以加密的形式使得其被可信方清除。 加密的第一数据和加密密钥串可用于将加密密钥串转发给可信方的第二方。 受信任方根据包含在加密密钥串中的数据执行至少一个检查,并且如果检查令人满意,则向第二方提供解密密钥。 在加密密钥串包括加密形式的第一数据的哈希值的情况下,受信任方通常将对散列值进行解密,并将其传递给第二方,以使后者能够检查第一数据的完整性。