会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 43. 发明授权
    • Fault-resistant exponentiation algorithm
    • 故障求幂算法
    • US08700921B2
    • 2014-04-15
    • US13487457
    • 2012-06-04
    • Marc JoyeMohamed Karroumi
    • Marc JoyeMohamed Karroumi
    • H04L9/28H04K1/00
    • G06F7/723G06F2207/7261G06F2207/7271H04L9/003H04L9/004H04L9/302H04L2209/122
    • A method for performing a m-ary right-to-left exponentiation using a base x, a secret exponent d and a modulus N, wherein m is a power of 2. A device having a processor and m+1 registers R[0]−R[m] in at least one memory: initializes register R[0] to h for a chosen value h, wherein the order of the value h is a divisor of m*(m−1)/2, register R[m] to x(m−1) and the registers other than R[0] and R[m] to the value h; updates register R[r] to R[r] times x, wherein r is the remainder of a division of d by (m−1) mod N; obtains a working exponent q that is the quotient of the division of d by (m−1); performs l iterations, starting at i=0, of: setting R[qi] to R[qi] times R[m] and raising R[m] to the power of m, where l is the length of q in base m and qi is the i-th digit of the representation of q in base m and ql−1 is non-zero; verifies the correctness of the result by checking that R[m] equals the product of registers R[0]-R[m−1] to the power of m−1; and outputs the product of R[j]j, where 1≦j≦m−1, only if the correctness is successfully verified.
    • 一种用于使用基数x,秘密指数d和模数N执行从右到左取幂的方法,其中m是2的幂。具有处理器并且m + 1寄存器R [0] 在至少一个存储器中的-R [m]:将寄存器R [0]初始化为h以选择值h,其中值h的顺序是m *(m-1)/ 2的除数,寄存器R [m ]到x(m-1)以及除R [0]和R [m]之外的寄存器到值h; 将寄存器R [r]更新为R [r]乘以x,其中r是d除以(m-1)mod N的余数的剩余部分; 得到一个工作指数q,即d(m-1)的除法的商; 从i = 0开始执行l次迭代,将R [qi]设置为R [qi]次R [m],并将R [m]提高到m的幂,其中l是基本m中q的长度, qi是基数m中q的表示的第i位数,ql-1是非零; 通过检查R [m]等于寄存器R [0] -R [m-1]的乘积与m-1的幂来验证结果的正确性; 并输出R [j] j的乘积,其中1≦̸ j≦̸ m-1,只有正确性被成功验证。
    • 44. 发明申请
    • METHOD AND DEVICE FOR CONTROLLING DISTRIBUTION OF LICENSES
    • 用于控制许可证分发的方法和装置
    • US20130318624A1
    • 2013-11-28
    • US13984068
    • 2012-02-06
    • Antoine MonsifrotGwenael DoerrOlivier CourtayAntoine RobertMarc Joye
    • Antoine MonsifrotGwenael DoerrOlivier CourtayAntoine RobertMarc Joye
    • G06F21/10
    • G06F21/105G06F21/10
    • A method for controlling distribution of licenses, a license being for an excerpt of a content item, the content item comprising a set of continuous units, each excerpt comprising a subset of the set of continuous units, A device receives an identifier of a receiver of a license, and the license or a request to generate the license, the license or the request to generate the license comprising a content identifier and at least one indicator of the units covered by the license; retrieves stored information regarding licenses previously delivered to the receiver; compares a limit value for the content item with the stored information combined with information from the license or the request to generate the license; and allows the receiver access to the license only if the limit value is not exceeded by the stored information combined with information from the license or the request to generate the license Also provided is the device.
    • 一种用于控制许可证分发的方法,用于内容项目摘录的许可证,所述内容项目包括一组连续单元,每个摘录包括所述一组连续单元的子集。设备接收所述连续单元的接收者的标识符 许可证,许可证或产生许可证的请求,许可证或生成许可证的请求,其包括内容标识符和许可证所涵盖的单元的至少一个指示符; 检索关于先前传送给接收者的许可证的存储信息; 将内容项的限制值与存储的信息结合来自许可证的信息或生成许可证的请求进行比较; 并且只有当存储的信息与来自许可证的信息或生成许可证的请求相结合的限制值不超过时,才允许接收者访问许可证。还提供了该设备。
    • 45. 发明申请
    • PUBLIC KEY ENCRYPTION SYSTEM BASED ON THE QUADRATIC RESIDUOSITY ASSUMPTION
    • 公共密钥加密系统基于四次残差估计
    • US20130195267A1
    • 2013-08-01
    • US13877946
    • 2011-09-28
    • Davide AlessioMarc Joye
    • Davide AlessioMarc Joye
    • H04L9/30
    • H04L9/30
    • A public-key encryption system. Encryption of a k-bit plaintext m is performed by picking a random generating ciphertext and outputting the ciphertext. N is a non-prime integer (preferably the product of two primes p and q), y is an element in multiplicative group of integers modulo N, and k is an integer larger than 1, Decryption of ciphertext c using private key is performed by recovering such that holds and outputting plaintext m, wherein denotes the 2k-th power residue symbol modulo p, which is defined. Also provided are an encryption device and a decryption device. The encryption scheme provides better bandwidth than the Goldwasser-Micali encryption scheme.
    • 公钥加密系统。 通过选择随机生成密文并输出密文来执行k比特明文m的加密。 N是非素数整数(优选地是两个素数p和q的乘积),y是模N的乘法乘法组中的元素,并且k是大于1的整数,使用私钥的密文c的解密由 恢复这样保存并输出明文m,其中表示定义的第2k个功率余数符号模p。 还提供了加密装置和解密装置。 加密方案提供比Goldwasser-Micali加密方案更好的带宽。
    • 46. 发明申请
    • A METHOD AND A DEVICE FOR PERFORMING TORUS-BASED CRYPTOGRAPHY
    • 一种用于执行基于多普勒频率分析的方法和装置
    • US20120087491A1
    • 2012-04-12
    • US13377663
    • 2010-06-10
    • Marc Joye
    • Marc Joye
    • H04L9/28
    • H04L9/3013H04L9/302H04L9/3255H04L2209/12H04L2209/30
    • At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. The present invention extends their setting to the ring of integers modulo N, thus obtaining compact representations for cryptographic systems that base their security on the discrete logarithm problem and the factoring problem. This can result in small key sizes and substantial savings in memory and bandwidth. However, unlike the case of finite field, analogous trace-based compression methods cannot be adapted to accommodate the extended setting of the invention when the underlying systems require more than a mere exponentiation. The invention finds particular application in a torus-based implementation of the ACJT group signature scheme. Also provided is a processor.
    • 在CRYPTO 2003年,Rubin和Silverberg在有限的领域上介绍了基于环面的加密技术的概念。 本发明将它们的设置扩展到模N的整数环,从而获得基于离散对数问题和保理问题的安全性的密码系统的紧凑表示。 这可能导致小的密钥大小,并显着节省内存和带宽。 然而,与有限域的情况不同,当底层系统需要的不仅仅是求幂时,类似的基于跟踪的压缩方法不能适应于适应本发明的扩展设置。 本发明在ACJT组签名方案的基于环面的实现中发现具体应用。 还提供了处理器。
    • 48. 发明申请
    • Method and apparatus for generating a signature for a message and method and apparatus for verifying such a signature
    • 用于生成用于消息的签名的方法和装置以及用于验证这样的签名的方法和装置
    • US20110085659A1
    • 2011-04-14
    • US12737073
    • 2009-06-02
    • Marc Joye
    • Marc Joye
    • H04L9/30
    • H04L9/3249H04L9/302H04L2209/56H04L2209/80
    • A method of generating a signature σ for a message m, the method enabling online/offline signatures. Two random primes p and q are generated, with N=pq; two random quadratic residues g and x are chosen in Z*N, and, for an integer z, h=g−z mod N is calculated. This gives the public key {g, h, x, N} and the private key {p, q, z}. Then, an integer t and a prime e are chosen. The offline signature part y may then be calculated as y=(xg−t)1/eb mod N where b is an integer bigger than 0, predetermined in the signature scheme. The online part k of the signature on message m is then calculated as k=t+mz and the signature σ on message m is generated as σ=(k, y, e) and returned. To verify the signature, it is checked that 1) e is an odd IE-bit integer, 2) k is an IK-bit integer, and 3) yebgkhm≡x(mod N). An advantage of the method is that it may be performed without hashing. Also provided are a signing device, a verification device, and computer program supports.
    • 生成签名和方法的方法 对于消息m,该方法启用在线/离线签名。 产生两个随机素数p和q,其中N = pq; 在Z * N中选择两个随机二次残差g和x,对于整数z,计算h = g-z mod N。 这给出公钥{g,h,x,N}和私钥{p,q,z}。 然后,选择整数t和素数e。 然后可以将离线签名部分y计算为y =(xg-t)1 / eb mod N,其中b是大于0的整数,在签名方案中是预定的。 然后,消息m上的签名的在线部分k被计算为k = t + mz和签名&sgr; on消息m生成为&sgr; =(k,y,e)并返回。 为了验证签名,检查1)e是奇数IE位整数,2)k是IK位整数,以及3)yebgkhm≡x(mod N)。 该方法的优点在于可以不进行散列来执行。 还提供了签名装置,验证装置和计算机程序支持。
    • 49. 发明申请
    • Fault-resistant calculcations on elliptic curves
    • 椭圆曲线上的抗破坏计算
    • US20100232599A1
    • 2010-09-16
    • US12661246
    • 2010-03-12
    • Marc Joye
    • Marc Joye
    • H04L9/28
    • G06F7/725G06F2207/7271
    • Means for checking the correctness of a cryptographic operation on an elliptic curve E(Z/pZ), including fault-resistant computation of Q=kP on elliptic curve E(Z/pZ). Elliptic curve Ê(Z/pr2Z)≡E(Z/pZ)×E(Z/r2Z) is given by Chinese remaindering and where r is an integer. A point P̂=CRT(P (mod p), R (mod r2)) is formed in Ê(Z/pr2Z); P̂ reduces to P in E(Z/pZ), and to R in E1(Z/r2Z). Q̂=kP̂ in Ê(Z/pr2Z) is computed (130). It is then verified whether Q̂≡kR (mod r2) in E1(Z/r2Z), and if so, Q=Q̂ mod p is output, whereas “error” is returned if this is not the case. Also provided are an apparatus and a computer program product.
    • 用于检查椭圆曲线E(Z / pZ)上的密码操作的正确性的装置,包括椭圆曲线E(Z / pZ)上的Q = kP的耐错运算。 椭圆曲线Ê(Z / pr2Z)≡E(Z / pZ)×E(Z / r2Z)由中文余数给出,其中r是整数。 在Ê(Z / pr2Z)中形成点P = CRT(P(mod p),R(mod r2)); P在E(Z / pZ)中降至P,在E1(Z / r2Z)中降低到R。 计算出Q(Ê(Z / pr2Z)中的kP)(130)。 然后验证E1(Z / r2Z)中的Q≡kR(mod r2)是否被输出,如果是,则输出Q = Q mod p,而如果不是这种情况则返回“错误”。 还提供了一种装置和计算机程序产品。