WO2007127576A3 - Method for elliptic curve public key cryptographic validation - Google Patents
Method for elliptic curve public key cryptographic validation Download PDFInfo
- Publication number
- WO2007127576A3 WO2007127576A3 PCT/US2007/065588 US2007065588W WO2007127576A3 WO 2007127576 A3 WO2007127576 A3 WO 2007127576A3 US 2007065588 W US2007065588 W US 2007065588W WO 2007127576 A3 WO2007127576 A3 WO 2007127576A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- receiver
- elliptic curve
- public key
- product
- validation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Abstract
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m' (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07759779.7A EP2014000B1 (en) | 2006-04-24 | 2007-03-30 | Method for elliptic curve public key cryptographic validation |
KR20087025936A KR101492644B1 (en) | 2006-04-24 | 2007-03-30 | Method for elliptic curve public key cryptographic validation |
CN2007800146961A CN101427500B (en) | 2006-04-24 | 2007-03-30 | Method for elliptic curve public key cryptographic validation |
MX2008013557A MX2008013557A (en) | 2006-04-24 | 2007-03-30 | Method for elliptic curve public key cryptographic validation. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/379,815 US8311214B2 (en) | 2006-04-24 | 2006-04-24 | Method for elliptic curve public key cryptographic validation |
US11/379,815 | 2006-04-24 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007127576A2 WO2007127576A2 (en) | 2007-11-08 |
WO2007127576A3 true WO2007127576A3 (en) | 2008-04-17 |
Family
ID=38619505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/065588 WO2007127576A2 (en) | 2006-04-24 | 2007-03-30 | Method for elliptic curve public key cryptographic validation |
Country Status (6)
Country | Link |
---|---|
US (1) | US8311214B2 (en) |
EP (1) | EP2014000B1 (en) |
KR (1) | KR101492644B1 (en) |
CN (1) | CN101427500B (en) |
MX (1) | MX2008013557A (en) |
WO (1) | WO2007127576A2 (en) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809154B2 (en) | 2003-03-07 | 2010-10-05 | Technology, Patents & Licensing, Inc. | Video entity recognition in compressed digital video streams |
US7694318B2 (en) | 2003-03-07 | 2010-04-06 | Technology, Patents & Licensing, Inc. | Video detection and insertion |
US7738704B2 (en) * | 2003-03-07 | 2010-06-15 | Technology, Patents And Licensing, Inc. | Detecting known video entities utilizing fingerprints |
US7646872B2 (en) | 2004-04-02 | 2010-01-12 | Research In Motion Limited | Systems and methods to securely generate shared keys |
US8396213B2 (en) | 2005-01-21 | 2013-03-12 | Certicom Corp. | Elliptic curve random number generation |
US20060195860A1 (en) * | 2005-02-25 | 2006-08-31 | Eldering Charles A | Acting on known video entities detected utilizing fingerprinting |
US20060195859A1 (en) * | 2005-02-25 | 2006-08-31 | Richard Konig | Detecting known video entities taking into account regions of disinterest |
US7690011B2 (en) | 2005-05-02 | 2010-03-30 | Technology, Patents & Licensing, Inc. | Video stream modification to defeat detection |
US7864951B2 (en) * | 2006-07-10 | 2011-01-04 | King Fahd University Of Petroleum And Minerals | Scalar multiplication method with inherent countermeasures |
DE102007001070B3 (en) * | 2006-09-29 | 2008-04-30 | Siemens Ag | Method for the encrypted data equalization of a system with at least one data carrier and one reading device |
US8068606B2 (en) * | 2007-08-29 | 2011-11-29 | Red Hat, Inc. | Embedding a secret in a bit string for safeguarding the secret |
US8243933B2 (en) * | 2007-08-29 | 2012-08-14 | Red Hat, Inc. | Method for sharing secret information among cooperating parties |
KR100965813B1 (en) | 2007-12-28 | 2010-06-24 | 경원대학교 산학협력단 | RFID Encryption Scheme Based on Elliptic Curve for Secure Message Transmission on Ubiquitous Environment |
US8117447B2 (en) * | 2008-01-10 | 2012-02-14 | Industrial Technology Research Institute | Authentication method employing elliptic curve cryptography |
EP2124382A1 (en) * | 2008-05-20 | 2009-11-25 | Siemens Aktiengesellschaft | Method for encrypted data exchange and communication system |
US8615084B2 (en) * | 2008-05-29 | 2013-12-24 | Red Hat, Inc. | Extending a secret bit string to safeguard the secret |
EP2634993B1 (en) * | 2012-03-01 | 2017-01-11 | Certicom Corp. | Devices and methods for connecting client devices to a network |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US9391781B2 (en) * | 2013-06-04 | 2016-07-12 | Altera Corporation | Systems and methods for intermediate message authentication in a switched-path network |
WO2018102382A1 (en) * | 2016-11-29 | 2018-06-07 | ZeroDB, Inc. | Method and system for switching public keys in ciphertexts |
US10341098B2 (en) * | 2017-01-24 | 2019-07-02 | Nxp B.V. | Method of generating cryptographic key pairs |
US10749692B2 (en) | 2017-05-05 | 2020-08-18 | Honeywell International Inc. | Automated certificate enrollment for devices in industrial control systems or other systems |
US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
CN113364585B (en) * | 2021-06-04 | 2022-09-13 | 晶澄微电子(宁波)有限公司 | ECC authentication method and system for reducing modular inverse computation |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050195973A1 (en) * | 2004-03-03 | 2005-09-08 | King Fahd University Of Petroleum And Minerals | Method for XZ-elliptic curve cryptography |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5159632A (en) | 1991-09-17 | 1992-10-27 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
US5271061A (en) | 1991-09-17 | 1993-12-14 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
DE69534603T2 (en) | 1994-07-29 | 2006-08-03 | Certicom Corp., Mississauga | ENCRYPTION SYSTEM FOR ELLIPTIC CURVE |
BR9815161A (en) * | 1997-12-05 | 2000-10-10 | Secured Information Technology | Method for producing an elliptically curved multiplication product; method for optimizing the calculation of an expression, method for producing an elliptically curved addition product; apparatus for producing an elliptically curve point multiplication product |
CN1108041C (en) * | 1999-12-01 | 2003-05-07 | 陈永川 | Digital signature method using elliptic curve encryption algorithm |
ATE465571T1 (en) * | 2001-08-13 | 2010-05-15 | Univ Leland Stanford Junior | SYSTEMS AND METHODS FOR IDENTITY-BASED ENCRYPTION AND RELATED CRYPTOGRAPHIC TECHNIQUES |
US7139396B2 (en) * | 2002-06-27 | 2006-11-21 | Microsoft Corporation | Koblitz exponentiation with bucketing |
GB2394388B (en) | 2002-10-14 | 2005-10-19 | Toshiba Res Europ Ltd | Methods and systems for flexible delegation |
DE60311507T2 (en) * | 2002-10-26 | 2007-11-08 | The Additional Director (Ipr), Defence Research & Development Organisation | METHOD FOR ELLIPTIC CURVE ENCRYPTION |
CN100440776C (en) * | 2002-11-29 | 2008-12-03 | 北京华大信安科技有限公司 | Elliptic curve signature and signature verification method and apparatus |
US7298839B2 (en) * | 2003-07-25 | 2007-11-20 | Microsoft Corporation | Squared Weil and Tate pairing techniques for use with elliptic curves |
GB2404486A (en) | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
JP4284320B2 (en) * | 2003-08-06 | 2009-06-24 | 富士通株式会社 | Elliptic curve encryption device, elliptic curve encryption method, and elliptic curve encryption program |
-
2006
- 2006-04-24 US US11/379,815 patent/US8311214B2/en active Active
-
2007
- 2007-03-30 CN CN2007800146961A patent/CN101427500B/en active Active
- 2007-03-30 EP EP07759779.7A patent/EP2014000B1/en active Active
- 2007-03-30 MX MX2008013557A patent/MX2008013557A/en active IP Right Grant
- 2007-03-30 WO PCT/US2007/065588 patent/WO2007127576A2/en active Application Filing
- 2007-03-30 KR KR20087025936A patent/KR101492644B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050195973A1 (en) * | 2004-03-03 | 2005-09-08 | King Fahd University Of Petroleum And Minerals | Method for XZ-elliptic curve cryptography |
Also Published As
Publication number | Publication date |
---|---|
CN101427500A (en) | 2009-05-06 |
EP2014000A4 (en) | 2015-03-18 |
US20070248224A1 (en) | 2007-10-25 |
MX2008013557A (en) | 2008-11-04 |
WO2007127576A2 (en) | 2007-11-08 |
EP2014000A2 (en) | 2009-01-14 |
KR20090005041A (en) | 2009-01-12 |
KR101492644B1 (en) | 2015-02-12 |
CN101427500B (en) | 2013-06-05 |
EP2014000B1 (en) | 2018-10-03 |
US8311214B2 (en) | 2012-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007127576A3 (en) | Method for elliptic curve public key cryptographic validation | |
WO2008087734A1 (en) | Cryptogram generating device, cryptogram communication system, and group parameter generating device | |
WO2001091366A3 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
WO2010024874A3 (en) | Message authentication code pre-computation with applications to secure memory | |
WO2004102918A3 (en) | Key agreement and transport protocol | |
WO2007041178A3 (en) | Quantum key distribution system | |
WO2007001328A3 (en) | Information-centric security | |
WO2006045114A3 (en) | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups | |
EP1445890A4 (en) | Cryptographic communication apparatus | |
WO2005053209A3 (en) | Tokens/keys for wireless communications | |
WO2008127446A3 (en) | A method and apparatus for time-lapse cryptography | |
WO2005057372A3 (en) | Security system and method | |
WO2012099657A3 (en) | Reliable puf value generation by pattern matching | |
WO2008099831A1 (en) | Key generation device, key derivation device, encryption device, decryption device, method, and program | |
WO2006017475A3 (en) | Qkd station with emi signature suppression | |
NO20074571L (en) | Contextual shared secret | |
CN101682625A (en) | Synchronization test for device authentication | |
TW200620936A (en) | Relay device, authentication server and the method of authentication | |
WO2007113697A3 (en) | Secure decryption method | |
ATE508551T1 (en) | CONTEXT SENSITIVITY BASED CRYPTOGRAPHY | |
WO2008026060A3 (en) | Method, system and device for synchronizing between server and mobile device | |
WO2006067739A3 (en) | Method and device for key generation and proving authenticity | |
PL1867096T3 (en) | Method and system for receiving a multimedia signal, cryptographic entity for said reception method and system, and method and black box for producing said cryptographic entity | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
WO2005034421A3 (en) | Information transfer system, encryption device, and decryption device using elliptic curve |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07759779 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007759779 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/a/2008/013557 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200780014696.1 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |