IN2013MU01234A - - Google Patents

Info

Publication number
IN2013MU01234A
IN2013MU01234A IN1234MU2013A IN2013MU01234A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A IN 1234MU2013 A IN1234MU2013 A IN 1234MU2013A IN 2013MU01234 A IN2013MU01234 A IN 2013MU01234A
Authority
IN
India
Prior art keywords
igtable
private
public
user
key
Prior art date
Application number
Inventor
Ravishankara Shastry
Barkur Suryanarayana Adiga
Bhattachar Rajan Mindigal Alasingara
Shivraj Vijayshankar Lokamathe
Balamuralidhar Purushotaman
Original Assignee
Tata Consultancy Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tata Consultancy Services Ltd filed Critical Tata Consultancy Services Ltd
Priority to IN1234MU2013 priority Critical patent/IN2013MU01234A/en
Priority to US14/228,396 priority patent/US9590807B2/en
Publication of IN2013MU01234A publication Critical patent/IN2013MU01234A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (ф(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the ф(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key.
IN1234MU2013 2013-03-28 2013-03-28 IN2013MU01234A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28
US14/228,396 US9590807B2 (en) 2013-03-28 2014-03-28 Identity based public key cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28

Publications (1)

Publication Number Publication Date
IN2013MU01234A true IN2013MU01234A (en) 2015-04-10

Family

ID=51620869

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1234MU2013 IN2013MU01234A (en) 2013-03-28 2013-03-28

Country Status (2)

Country Link
US (1) US9590807B2 (en)
IN (1) IN2013MU01234A (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013059615A1 (en) 2011-10-21 2013-04-25 Hospira, Inc. Medical device update system
JP6621748B2 (en) 2013-08-30 2019-12-18 アイシーユー・メディカル・インコーポレーテッド System and method for monitoring and managing a remote infusion regimen
US10311972B2 (en) 2013-11-11 2019-06-04 Icu Medical, Inc. Medical device system performance index
WO2015168427A1 (en) 2014-04-30 2015-11-05 Hospira, Inc. Patient care system with conditional alarm forwarding
US9724470B2 (en) 2014-06-16 2017-08-08 Icu Medical, Inc. System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy
US9539383B2 (en) 2014-09-15 2017-01-10 Hospira, Inc. System and method that matches delayed infusion auto-programs with manually entered infusion programs and analyzes differences therein
CN105915520B (en) * 2016-04-18 2019-02-12 深圳大学 It can search for file storage, searching method and the storage system of encryption based on public key
EP3484541A4 (en) 2016-07-14 2020-03-25 ICU Medical, Inc. Multi-communication path selection and security system for a medical device
CN110120927B (en) * 2018-02-05 2022-03-25 华为技术有限公司 Method and device for private key generation
CA3106516C (en) 2018-07-17 2023-07-25 Icu Medical, Inc. Updating infusion pump drug libraries and operational software in a networked environment
AU2019306492A1 (en) 2018-07-17 2021-02-11 Icu Medical, Inc. Systems and methods for facilitating clinical messaging in a network environment
US11483402B2 (en) 2018-07-17 2022-10-25 Icu Medical, Inc. Maintaining clinical messaging during an internet outage
CN108599951B (en) * 2018-08-10 2021-10-01 北京奇虎科技有限公司 Encryption method, encryption device, computing equipment and computer storage medium
EP3664361B1 (en) * 2018-12-06 2024-05-22 Secure-IC SAS Methods and devices for secured identity-based encryption systems with two trusted centers
US11005656B2 (en) * 2018-12-07 2021-05-11 Arris Enterprises Llc Embedding information in elliptic curve base point
CN110995716B (en) * 2019-12-06 2022-09-02 国网浙江省电力有限公司电力科学研究院 Data transmission encryption and decryption method and system for transformer substation inspection robot
WO2022051230A1 (en) * 2020-09-05 2022-03-10 Icu Medical, Inc. Identity-based secure medical device communications
CN113352318B (en) * 2021-04-29 2022-06-24 国网浙江省电力有限公司嘉兴供电公司 Intelligent robot communication link self-checking selection method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69017686D1 (en) 1990-10-24 1995-04-13 Omnisec Ag Regensdorf Secret transmission system with the possibility of encrypted communication between users with a secure key, which is determined without user intervention.
FR2737369A1 (en) * 1995-07-26 1997-01-31 Trt Telecom Radio Electr SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A.
US7088821B2 (en) * 2001-05-03 2006-08-08 Cheman Shaik Absolute public key cryptographic system and method surviving private-key compromise with other advantages
KR20070104939A (en) 2005-02-25 2007-10-29 콸콤 인코포레이티드 Small public-key based digital signatures for authentication

Also Published As

Publication number Publication date
US9590807B2 (en) 2017-03-07
US20140294177A1 (en) 2014-10-02

Similar Documents

Publication Publication Date Title
IN2013MU01234A (en)
MX2022003019A (en) Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography.
MX2021014176A (en) Method and system for blockchain variant using digital signatures.
GB2572088A8 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
MX2016005800A (en) System and method for updating an encryption key across a network.
TN2015000274A1 (en) Method and apparatus for marking manufactured items using physical characteristic
JP2017034661A5 (en)
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
EP2637350A3 (en) Key escrow
WO2015008158A8 (en) Securing method for lawful interception
JP2016527844A5 (en)
GB2512249A (en) Secure peer discovery and authentication using a shared secret
WO2008146546A1 (en) Key generating apparatus, encrypting apparatus and decrypting apparatus
MX2016001900A (en) Nado cryptography using one-way functions.
UA122327C2 (en) Nado cryptography with key generators
BR112017011967A2 (en) key generation device, public key encryption device, private key decryption device, key generation method configured to generate a public key, public key encryption method, private key decryption method, and program computer
MX2015007704A (en) Key sharing network device and configuration thereof.
IN2014CN04110A (en)
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
MX2014014004A (en) Determination of cryptographic keys.
EE201700036A (en) Method, device and system for generating a composite cryptographic signature and a computer readable medium
GB2500557A (en) Data encryption
SG10201606165SA (en) A key generation and distribution method based on identity-based cryptography
MY159284A (en) A method for encrypting and decrypting data and a system therefor
WO2015023368A3 (en) Apparatus and method for key update for use in a block cipher algorithm