Non-Interactive Hierarchical Identity-Based Key-Agreement
    1.
    发明申请
    Non-Interactive Hierarchical Identity-Based Key-Agreement 失效
    非交互式分层身份认证密钥协商

    公开(公告)号:US20090225986A1

    公开(公告)日:2009-09-10

    申请号:US12043755

    申请日:2008-03-06

    IPC分类号: H04L9/08

    摘要: A pairwise key-agreement scheme is provided for creating key agreements non-interactively between pairs of nodes disposed in a hierarchy of nodes. The scheme is non-interactive so that any two nodes can agree on a shared secret key without interaction. In addition, the scheme is identity-based so that any given node only needs to know the identity of peer nodes to compute the shared secret key. All of the nodes are arranged in a hierarchy where an intermediate node in the hierarchy can derive the secret keys for each of its children from its own secret key and the identity of the child. Accordingly, the scheme is fully resilient against compromise of any number of leaves in the hierarchy and of a threshold number of nodes in the upper levels of the hierarchy. The scheme is well-suited for environments such as mobile ad-hoc networks (MANETs), which are very dynamic, have acute bandwidth-constraints and have many nodes are vulnerable to compromise.

    摘要翻译: 提供了成对密钥协商方案,用于在节点层次结构中的成对节点之间非交互地创建密钥协议。 该方案是非交互式的,因此任何两个节点都可以在没有交互的情况下对共享秘密密钥达成一致。 此外,该方案是基于身份的,使得任何给定节点仅需要知道对等节点的身份来计算共享密钥。 所有的节点被排列在层次结构中,其中层次结构中的中间节点可以从其自己的秘密密钥和孩子的身份导出其每个子项的秘密密钥。 因此,该方案完全可抵御层次结构中任何数量的叶片和层次结构的较高层中的阈值数量的节点的折中。 该方案非常适合诸如移动自组织网络(MANET)这样非常动态的环境,具有严格的带宽限制,并且许多节点容易受到折中。

    Non-interactive hierarchical identity-based key-agreement
    2.
    发明授权
    Non-interactive hierarchical identity-based key-agreement 失效
    基于非交互式层次化身份的密钥协商

    公开(公告)号:US08422681B2

    公开(公告)日:2013-04-16

    申请号:US12043755

    申请日:2008-03-06

    IPC分类号: H04L29/06

    摘要: A pairwise key-agreement scheme is provided for creating key agreements non-interactively between pairs of nodes disposed in a hierarchy of nodes. The scheme is non-interactive so that any two nodes can agree on a shared secret key without interaction. In addition, the scheme is identity-based so that any given node only needs to know the identity of peer nodes to compute the shared secret key. All of the nodes are arranged in a hierarchy where an intermediate node in the hierarchy can derive the secret keys for each of its children from its own secret key and the identity of the child. Accordingly, the scheme is fully resilient against compromise of any number of leaves in the hierarchy and of a threshold number of nodes in the upper levels of the hierarchy. The scheme is well-suited for environments such as mobile ad-hoc networks (MANETs), which are very dynamic, have acute bandwidth-constraints and have many nodes are vulnerable to compromise.

    摘要翻译: 提供了成对密钥协商方案,用于在节点层次结构中的成对节点之间非交互地创建密钥协议。 该方案是非交互式的,因此任何两个节点都可以在没有交互的情况下对共享秘密密钥达成一致。 此外,该方案是基于身份的,使得任何给定节点仅需要知道对等节点的身份来计算共享密钥。 所有的节点被排列在层次结构中,其中层次结构中的中间节点可以从其自己的秘密密钥和孩子的身份导出其每个子项的秘密密钥。 因此,该方案完全可抵御层次结构中任何数量的叶片和层次结构的较高层中的阈值数量的节点的折中。 该方案非常适合诸如移动自组织网络(MANET)这样非常动态的环境,具有严格的带宽限制,并且许多节点容易受到折中。

    Biometric authentication system with encrypted models
    3.
    发明授权
    Biometric authentication system with encrypted models 有权
    具有加密模型的生物识别认证系统

    公开(公告)号:US06317834B1

    公开(公告)日:2001-11-13

    申请号:US09240214

    申请日:1999-01-29

    IPC分类号: H04L932

    摘要: A method of performing biometric authentication of a person's identity including a biometric template prior to storing it in a biometric database. The encryption algorithm encrypts the biometric template using a pass-phrase, known only to the individual, to generate the cryptographic key used to store and retrieve the biometric template. When an individual wishes to access a secured resource, he must be authenticated by providing an identifier which is used to retrieve the appropriate record. He must also provide the correct password to allow the system to decrypt the model.

    摘要翻译: 在将生物测定模板存储在生物特征数据库中之前,对包括生物特征模板的人的身份进行身份认证的方法。 加密算法使用仅针对个人知道的密码短语加密生物特征模板,以生成用于存储和检索生物特征模板的加密密钥。 当个人希望访问安全资源时,他必须通过提供用于检索适当记录的标识符进行身份验证。 他还必须提供正确的密码,让系统解密模型。

    Secure hash-and-sign signatures
    4.
    发明授权
    Secure hash-and-sign signatures 有权
    安全的哈希签名签名

    公开(公告)号:US06578144B1

    公开(公告)日:2003-06-10

    申请号:US09274525

    申请日:1999-03-23

    IPC分类号: H04L930

    摘要: This invention is a method and apparatus which provide a solution to the problem of constructing efficient and secure digital signature schemes. It presents a signature scheme that can be proven to be existentially unforgeable under a chosen message attack, assuming a variant of the RSA conjecture. This scheme is not based on “signature trees”, but instead it uses a “hash-and-sign” paradigm, while maintaining provable security. The security proof is based on well-defined and reasonable assumptions made on the cryptographic hash function in use. In particular, it does not model this function as a random oracle. The signature scheme which is described in this invention is efficient. Further, it is “stateless”, in the sense that the signer does not need to keep any state, other than the secret key, for the purpose of generating signatures.

    摘要翻译: 本发明是提供解决构建有效和安全的数字签名方案的问题的方法和装置。 它提出了一种签名方案,假设RSA推测的变体,可以证明在选择的消息攻击下存在不可伪造的签名方案。 该方案不是基于“签名树”,而是使用“哈希和签名”范例,同时保持可证明的安全性。 安全性证明是基于对正在使用的密码散列函数的明确且合理的假设。 特别是,它不会将这个函数建模成一个随机的oracle。 本发明描述的签名方案是有效的。 此外,它是“无国籍的”,在某种意义上,为了生成签名,签名者不需要保留除秘密密钥之外的任何状态。