IN2014CN04372A - - Google Patents
Info
- Publication number
- IN2014CN04372A IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
- Authority
- IN
- India
- Prior art keywords
- template
- random number
- public key
- storage portion
- stores
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
A storage portion (301) stores a public key generated on the basis of a doubly homomorphic encryption algorithm and a template used for authentication of data encrypted using the public key. A random number generator (203) using at least a portion of the public key in the storage portion (301) generates a random number. A template updater (307) performs an operation using the random number generated by a random number generator (305) and updates the template. The storage portion (301) stores the updated template overwriting the template prior to the update.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/077623 WO2013080320A1 (en) | 2011-11-30 | 2011-11-30 | Data processing device, data processing method, and program |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN04372A true IN2014CN04372A (en) | 2015-09-04 |
Family
ID=48534844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN4372CHN2014 IN2014CN04372A (en) | 2011-11-30 | 2011-11-30 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20140247939A1 (en) |
EP (1) | EP2787681B1 (en) |
JP (1) | JP5586795B2 (en) |
CN (1) | CN103975553B (en) |
IN (1) | IN2014CN04372A (en) |
WO (1) | WO2013080320A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE48146E1 (en) | 2012-01-25 | 2020-08-04 | Mitsubishi Electric Corporation | Data search device, data search method, computer readable medium storing data search program, data registration device, data registration method, computer readable medium storing data registration program, and information processing device |
US10235539B2 (en) | 2013-02-25 | 2019-03-19 | Mitsubishi Electric Corporation | Server device, recording medium, and concealed search system |
US8966277B2 (en) * | 2013-03-15 | 2015-02-24 | Mitsubishi Electric Research Laboratories, Inc. | Method for authenticating an encryption of biometric data |
DE102015205428A1 (en) * | 2014-03-26 | 2015-10-01 | Continental Teves Ag & Co. Ohg | Method and system for improving data security in a communication process |
JP6272546B2 (en) * | 2015-02-20 | 2018-01-31 | 三菱電機株式会社 | Data storage device, data processing method, and data processing program |
WO2019014425A1 (en) * | 2017-07-13 | 2019-01-17 | Pindrop Security, Inc. | Zero-knowledge multiparty secure sharing of voiceprints |
CN110574030B (en) * | 2018-02-13 | 2021-05-11 | 指纹卡有限公司 | Updating biometric template protection keys |
US10665244B1 (en) | 2018-03-22 | 2020-05-26 | Pindrop Security, Inc. | Leveraging multiple audio channels for authentication |
US11354422B2 (en) * | 2018-11-02 | 2022-06-07 | Rank One Computing Corporation | Optimizations for privacy-preserving distance metric computation |
US20220052841A1 (en) * | 2018-12-12 | 2022-02-17 | Nec Corporation | Matching system, client and server |
US20240104182A1 (en) * | 2021-01-29 | 2024-03-28 | Nec Corporation | Biometric authentication system, template updating method therefor, storage medium, biometric authentication client device, and biometric authentication server device |
US20230393762A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Verified key replacement in secure memory devices |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
WO2006054208A1 (en) * | 2004-11-16 | 2006-05-26 | Koninklijke Philips Electronics N.V. | Securely computing a similarity measure |
JP4961214B2 (en) | 2006-03-29 | 2012-06-27 | 株式会社日立情報制御ソリューションズ | Biometric authentication method and system |
US8995665B1 (en) * | 2008-08-20 | 2015-03-31 | Symantec Corporation | Role based encryption without key management system |
CN102598576B (en) * | 2009-10-29 | 2014-09-17 | 三菱电机株式会社 | Data processing device |
JP5573293B2 (en) * | 2010-03-30 | 2014-08-20 | 富士通株式会社 | Authentication device, encryption device, token device, authentication method, and authentication program |
-
2011
- 2011-11-30 EP EP11876549.4A patent/EP2787681B1/en not_active Not-in-force
- 2011-11-30 US US14/350,740 patent/US20140247939A1/en not_active Abandoned
- 2011-11-30 IN IN4372CHN2014 patent/IN2014CN04372A/en unknown
- 2011-11-30 JP JP2013546896A patent/JP5586795B2/en not_active Expired - Fee Related
- 2011-11-30 WO PCT/JP2011/077623 patent/WO2013080320A1/en active Application Filing
- 2011-11-30 CN CN201180075191.2A patent/CN103975553B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN103975553A (en) | 2014-08-06 |
WO2013080320A1 (en) | 2013-06-06 |
JPWO2013080320A1 (en) | 2015-04-27 |
CN103975553B (en) | 2016-10-12 |
EP2787681A4 (en) | 2015-10-14 |
US20140247939A1 (en) | 2014-09-04 |
JP5586795B2 (en) | 2014-09-10 |
EP2787681B1 (en) | 2016-10-12 |
EP2787681A1 (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CN04372A (en) | ||
NZ720190A (en) | System and methods for encrypting data | |
IN2015DN04037A (en) | ||
BR112017017425A2 (en) | non-transient computer readable storage medium configured to store instructions and computer-implemented process | |
MX2014002142A (en) | Hierarchical attribute-based encryption and decryption. | |
MY176966A (en) | Biometric template security and key generation | |
BR112017011967A2 (en) | key generation device, public key encryption device, private key decryption device, key generation method configured to generate a public key, public key encryption method, private key decryption method, and program computer | |
MX2014004838A (en) | System and method for key management for issuer security domain using global platform specifications. | |
GB2498039B (en) | Password recovery service | |
IN2014CN04110A (en) | ||
ATE496500T1 (en) | METHOD FOR INDIVIDUALLY ADJUSTING A HEARING AID OR A HEARING AID | |
EP2544400A3 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
GB2490407B (en) | Joint encryption of data | |
CN105450387A (en) | Network distributed storage method based on hybrid encryption | |
IN2014MU00771A (en) | ||
EP2264640A3 (en) | Feature specific keys for executable code | |
NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
IL237121B (en) | System and method for fully encrypted remote web-based voting | |
EP3704829B8 (en) | Cryptographic key generation system and method | |
FR2975248B1 (en) | DEVICE AND METHOD FOR GENERATING REINFORCED SECURITY KEYS FOR FULLY HOMOMORPHIC ENCRYPTION ALGORITHM. | |
WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
WO2014164180A3 (en) | Decoy bits method for direct encryption and key generation | |
MY153911A (en) | Dual coding coherent phase protocol | |
WO2012106466A3 (en) | Data encryption method |