会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Revoking delegatable anonymous credentials
    • 撤销可委托的匿名凭据
    • US08839381B2
    • 2014-09-16
    • US12961505
    • 2010-12-07
    • Lan NguyenTolga Acar
    • Lan NguyenTolga Acar
    • H04L29/06H04L9/32H04L9/08
    • H04L9/0891H04L9/3218H04L2209/38H04L2209/42
    • The claimed subject matter provides a method for revoking delegatable anonymous credentials. The method includes receiving a request to revoke an anonymous credential. The anonymous credential may be representative of an ability to prove non-membership in an accumulator for a first entity. The method also includes revoking the anonymous credential from the first entity in response to the request to revoke the anonymous credential. Additionally, the method includes revoking the anonymous credential from a second entity in response to the request to revoke the anonymous credential. The first entity delegates the anonymous credential to the second entity.
    • 所要求保护的主题提供了撤销可委托匿名凭证的方法。 该方法包括接收撤销匿名凭证的请求。 匿名凭证可以代表证明第一实体的累加器的不隶属的能力。 该方法还包括响应于撤销匿名凭证的请求,从第一实体撤销匿名凭证。 此外,该方法包括响应于撤销匿名凭证的请求,从第二实体撤销匿名凭证。 第一个实体将匿名凭证委托给第二个实体。
    • 22. 发明申请
    • Homomorphic Signatures and Network Coding Signatures
    • 同态签名和网络编码签名
    • US20130346755A1
    • 2013-12-26
    • US13529332
    • 2012-06-21
    • Duy Lan NguyenTolga AcarAvradip Mandal
    • Duy Lan NguyenTolga AcarAvradip Mandal
    • H04L9/32
    • H04L9/008H04L9/3073H04L9/3247
    • The subject disclosure is directed towards a technology by which data is securely distributed using a homomorphic signature scheme and homomorphic network coding signature schemes. A homomorphic signature scheme for signing the data is based upon binary pairing with standard prime order groups. Sets of data are signed based upon dividing a larger block of data into smaller blocks, and separately signing each smaller block. The smaller blocks may be distributed to nodes of a network topology that are configured for network coding. In one alternative, the homomorphic signature scheme protects against changes to the block identifier. Proof data may be provided independent of a random oracle, may be provided by providing parameters for verification in a Groth-Sahai proof system, or may be provided by providing parameters for verification independent of a Groth-Sahai proof system.
    • 主题公开涉及使用同态签名方案和同态网络编码签名方案来安全地分发数据的技术。 用于签署数据的同态签名方案基于与标准素数订单组的二进制配对。 基于将更大的数据块划分成更小的块,并且分别签署每个更小的块,来对数据集进行签名。 较小的块可以被分配到被配置用于网络编码的网络拓扑的节点。 在一个替代方案中,同态签名方案保护不改变块标识符。 证明数据可以独立于随机的oracle提供,可以通过在Groth-Sahai证明系统中提供用于验证的参数来提供,或者可以通过提供独立于Groth-Sahai证明系统的验证参数来提供证明数据。
    • 24. 发明申请
    • MANAGING GROUP KEYS
    • 管理组织
    • US20100208898A1
    • 2010-08-19
    • US12389217
    • 2009-02-19
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • H04L9/08
    • H04L9/0891H04L9/0833
    • In an example, one or more cryptographic keys may be associated with a group. Any member of the group may use the key to encrypt and decrypt information, thereby allowing members of the group to share encrypted information. Domain controllers (DCs) maintain copies of the group's keys. The DCs may synchronize with each other, so that each DC may have a copy of the group's keys. Keys may have expiration dates, and any client connected to a DC may generate a new key when a key is nearing expiration. The various clients may create new keys at differing amounts of time before expiration on various DCs. DCs that store keys early thus may have time to propagate the newly-created keys through synchronization before other DCs are requested to store keys created by other clients. In this way, the creation of an excessive number of new keys may be avoided.
    • 在一个示例中,一个或多个加密密钥可以与组相关联。 该组的任何成员可以使用密钥来加密和解密信息,从而允许该组的成员共享加密的信息。 域控制器(DC)维护组的密钥副本。 DC可以彼此同步,使得每个DC可以具有组的密钥的副本。 密钥可能有过期日期,连接到DC的任何客户端可能在密钥接近到期时生成新密钥。 各种客户端可以在不同的时间段之前以不同的时间量创建新的密钥。 因此,早期存储密钥的DC可能有时间通过​​同步传播新创建的密钥,而其他DC被请求存储由其他客户端创建的密钥。 以这种方式,可以避免创建过多的新密钥。