ATE366008T1 - Verfahren zur ausführung einer kryptographischen berechnung unter verwendung eines öffentlichen schlüssels - Google Patents

Verfahren zur ausführung einer kryptographischen berechnung unter verwendung eines öffentlichen schlüssels

Info

Publication number
ATE366008T1
ATE366008T1 AT02767544T AT02767544T ATE366008T1 AT E366008 T1 ATE366008 T1 AT E366008T1 AT 02767544 T AT02767544 T AT 02767544T AT 02767544 T AT02767544 T AT 02767544T AT E366008 T1 ATE366008 T1 AT E366008T1
Authority
AT
Austria
Prior art keywords
public key
verifier
message authentication
electronic signature
entity
Prior art date
Application number
AT02767544T
Other languages
English (en)
Inventor
Marc Girault
Jean-Claude Pailles
Original Assignee
France Telecom
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom filed Critical France Telecom
Application granted granted Critical
Publication of ATE366008T1 publication Critical patent/ATE366008T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
AT02767544T 2001-07-18 2002-07-02 Verfahren zur ausführung einer kryptographischen berechnung unter verwendung eines öffentlichen schlüssels ATE366008T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0109611A FR2827723B1 (fr) 2001-07-18 2001-07-18 Procede pour effectuer une tache cryptographique au moyen d'une cle publique

Publications (1)

Publication Number Publication Date
ATE366008T1 true ATE366008T1 (de) 2007-07-15

Family

ID=8865668

Family Applications (1)

Application Number Title Priority Date Filing Date
AT02767544T ATE366008T1 (de) 2001-07-18 2002-07-02 Verfahren zur ausführung einer kryptographischen berechnung unter verwendung eines öffentlichen schlüssels

Country Status (9)

Country Link
EP (1) EP1407575B1 (de)
JP (1) JP4354808B2 (de)
KR (1) KR100899020B1 (de)
AT (1) ATE366008T1 (de)
DE (1) DE60220918T2 (de)
ES (1) ES2289147T3 (de)
FR (1) FR2827723B1 (de)
HK (1) HK1064826A1 (de)
WO (1) WO2003009522A1 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1670172A1 (de) * 2004-12-10 2006-06-14 Nagra France Sarl Verfahren und Vorrichtung zur Verschlüsselung mittels eines Proxy
WO2007006798A1 (fr) * 2005-07-13 2007-01-18 Gemplus Procede et systeme d'authentification de puces electroniques
GB2444286B (en) * 2006-12-01 2011-06-08 Advanced Risc Mach Ltd Improving processing efficiency on secure systems having a host processor and smart card
US8594329B2 (en) 2010-12-17 2013-11-26 Microsoft Corporation Non-interactive verifiable, delegated computation
FR3013477B1 (fr) * 2013-11-21 2017-06-09 Oberthur Technologies Procede et systeme pour la verification de la validite d'une signature numerique de message

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100340102B1 (ko) * 2000-11-30 2002-06-10 조휘갑 알에스에이 공개키 암호 고속화 장치 및 방법

Also Published As

Publication number Publication date
KR100899020B1 (ko) 2009-05-27
EP1407575A1 (de) 2004-04-14
JP4354808B2 (ja) 2009-10-28
JP2005508514A (ja) 2005-03-31
DE60220918D1 (de) 2007-08-09
FR2827723A1 (fr) 2003-01-24
DE60220918T2 (de) 2008-02-28
FR2827723B1 (fr) 2003-10-10
HK1064826A1 (en) 2005-02-04
KR20040013152A (ko) 2004-02-11
ES2289147T3 (es) 2008-02-01
WO2003009522A1 (fr) 2003-01-30
EP1407575B1 (de) 2007-06-27

Similar Documents

Publication Publication Date Title
EP2437427A1 (de) Signaturvorrichtung, signaturverifizierungsvorrichtung, anonymes authentifikationssystem, unterschriftenverfahren, signaturauthentifikationsverfahren und programme dafür
HUP0204161A2 (en) Method of controlling access to a resource in a computer system by a body of code and computer system for executing the method
ATE418112T1 (de) Kontoverwaltung in einem system und verfahren zur bereitstellung von codesignierungs-diensten
Lin et al. Security enhancement for anonymous secure e-voting over a network
WO2008026086A3 (en) Attestation of computing platforms
DE602007007568D1 (de) Sichere Berechnung von Privatwerten
SG131063A1 (en) System and method for registering entities for code signing services
WO2005038634A3 (en) Maintaining privacy for transactions performable by a user device having a security module
CN110474779B (zh) 基于区块链的投票存证方法、装置、设备及可读存储介质
JP5174826B2 (ja) 圧縮されたecdsa署名
FR2748591B1 (fr) Procede de realisation d'une transaction electronique securisee a double signature
ATE366008T1 (de) Verfahren zur ausführung einer kryptographischen berechnung unter verwendung eines öffentlichen schlüssels
Smid et al. Response to comments on the NIST proposed Digital Signature Standard
Kumar et al. Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers
JP5058654B2 (ja) 電子署名装置、方法、およびプログラム
CN113438085B (zh) 高效属性基服务器辅助签名验证方法及***
Kumar Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers
EP2384563B1 (de) Überprüfung von datenobjekten in datenverarbeitungssystemen
ATE420502T1 (de) Kryptographisches verfahren und einrichtungen zur ermöglichung von berechnungen während transaktionen
CN111882743A (zh) 匿名投票统计方法及***
JP3293461B2 (ja) 制限付ブラインド署名方法およびシステム
JP3331328B2 (ja) 多重デジタル署名方法、そのシステム、その装置及びそのプログラム記録媒体
Mohanty et al. A novel time-stamped signature scheme based upon DLP
Kumar et al. Security analysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
Sahu et al. An MSS Based on the Elliptic Curve Cryptosystem.

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties