IN2013MU01234A - - Google Patents
Info
- Publication number
- IN2013MU01234A IN2013MU01234A IN1234MU2013A IN2013MU01234A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A IN 1234MU2013 A IN1234MU2013 A IN 1234MU2013A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A
- Authority
- IN
- India
- Prior art keywords
- igtable
- private
- public
- user
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (ф(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ф(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 | |
US14/228,396 US9590807B2 (en) | 2013-03-28 | 2014-03-28 | Identity based public key cryptosystem |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2013MU01234A true IN2013MU01234A (en) | 2015-04-10 |
Family
ID=51620869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN1234MU2013 IN2013MU01234A (en) | 2013-03-28 | 2013-03-28 |
Country Status (2)
Country | Link |
---|---|
US (1) | US9590807B2 (en) |
IN (1) | IN2013MU01234A (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013059615A1 (en) | 2011-10-21 | 2013-04-25 | Hospira, Inc. | Medical device update system |
JP6621748B2 (en) | 2013-08-30 | 2019-12-18 | アイシーユー・メディカル・インコーポレーテッド | System and method for monitoring and managing a remote infusion regimen |
US10311972B2 (en) | 2013-11-11 | 2019-06-04 | Icu Medical, Inc. | Medical device system performance index |
WO2015168427A1 (en) | 2014-04-30 | 2015-11-05 | Hospira, Inc. | Patient care system with conditional alarm forwarding |
US9724470B2 (en) | 2014-06-16 | 2017-08-08 | Icu Medical, Inc. | System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy |
US9539383B2 (en) | 2014-09-15 | 2017-01-10 | Hospira, Inc. | System and method that matches delayed infusion auto-programs with manually entered infusion programs and analyzes differences therein |
CN105915520B (en) * | 2016-04-18 | 2019-02-12 | 深圳大学 | It can search for file storage, searching method and the storage system of encryption based on public key |
EP3484541A4 (en) | 2016-07-14 | 2020-03-25 | ICU Medical, Inc. | Multi-communication path selection and security system for a medical device |
CN110120927B (en) * | 2018-02-05 | 2022-03-25 | 华为技术有限公司 | Method and device for private key generation |
CA3106516C (en) | 2018-07-17 | 2023-07-25 | Icu Medical, Inc. | Updating infusion pump drug libraries and operational software in a networked environment |
AU2019306492A1 (en) | 2018-07-17 | 2021-02-11 | Icu Medical, Inc. | Systems and methods for facilitating clinical messaging in a network environment |
US11483402B2 (en) | 2018-07-17 | 2022-10-25 | Icu Medical, Inc. | Maintaining clinical messaging during an internet outage |
CN108599951B (en) * | 2018-08-10 | 2021-10-01 | 北京奇虎科技有限公司 | Encryption method, encryption device, computing equipment and computer storage medium |
EP3664361B1 (en) * | 2018-12-06 | 2024-05-22 | Secure-IC SAS | Methods and devices for secured identity-based encryption systems with two trusted centers |
US11005656B2 (en) * | 2018-12-07 | 2021-05-11 | Arris Enterprises Llc | Embedding information in elliptic curve base point |
CN110995716B (en) * | 2019-12-06 | 2022-09-02 | 国网浙江省电力有限公司电力科学研究院 | Data transmission encryption and decryption method and system for transformer substation inspection robot |
WO2022051230A1 (en) * | 2020-09-05 | 2022-03-10 | Icu Medical, Inc. | Identity-based secure medical device communications |
CN113352318B (en) * | 2021-04-29 | 2022-06-24 | 国网浙江省电力有限公司嘉兴供电公司 | Intelligent robot communication link self-checking selection method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69017686D1 (en) | 1990-10-24 | 1995-04-13 | Omnisec Ag Regensdorf | Secret transmission system with the possibility of encrypted communication between users with a secure key, which is determined without user intervention. |
FR2737369A1 (en) * | 1995-07-26 | 1997-01-31 | Trt Telecom Radio Electr | SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A. |
US7088821B2 (en) * | 2001-05-03 | 2006-08-08 | Cheman Shaik | Absolute public key cryptographic system and method surviving private-key compromise with other advantages |
KR20070104939A (en) | 2005-02-25 | 2007-10-29 | 콸콤 인코포레이티드 | Small public-key based digital signatures for authentication |
-
2013
- 2013-03-28 IN IN1234MU2013 patent/IN2013MU01234A/en unknown
-
2014
- 2014-03-28 US US14/228,396 patent/US9590807B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9590807B2 (en) | 2017-03-07 |
US20140294177A1 (en) | 2014-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2013MU01234A (en) | ||
MX2022003019A (en) | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography. | |
MX2021014176A (en) | Method and system for blockchain variant using digital signatures. | |
GB2572088A8 (en) | Controlling access to a locked space using cryptographic keys stored on a blockchain | |
MX2016005800A (en) | System and method for updating an encryption key across a network. | |
TN2015000274A1 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
JP2017034661A5 (en) | ||
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
EP2637350A3 (en) | Key escrow | |
WO2015008158A8 (en) | Securing method for lawful interception | |
JP2016527844A5 (en) | ||
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
WO2008146546A1 (en) | Key generating apparatus, encrypting apparatus and decrypting apparatus | |
MX2016001900A (en) | Nado cryptography using one-way functions. | |
UA122327C2 (en) | Nado cryptography with key generators | |
BR112017011967A2 (en) | key generation device, public key encryption device, private key decryption device, key generation method configured to generate a public key, public key encryption method, private key decryption method, and program computer | |
MX2015007704A (en) | Key sharing network device and configuration thereof. | |
IN2014CN04110A (en) | ||
NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
MX2014014004A (en) | Determination of cryptographic keys. | |
EE201700036A (en) | Method, device and system for generating a composite cryptographic signature and a computer readable medium | |
GB2500557A (en) | Data encryption | |
SG10201606165SA (en) | A key generation and distribution method based on identity-based cryptography | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm |