会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Trapdoor pairings
    • Trapdoor配对
    • US08180047B2
    • 2012-05-15
    • US11275560
    • 2006-01-13
    • Kristin E. LauterDenis CharlesAnton Mityagin
    • Kristin E. LauterDenis CharlesAnton Mityagin
    • H04L9/00
    • H04L9/3073
    • Systems and methods are described for trapdoor pairing. In one implementation, a trapdoor pairing is a cryptographic primitive generated by determining a bilinear pairing between an elliptic curve group and another group and selecting a parameter of the bilinear pairing, such as a group order or an isogeny between curves, to be a key for generating and evaluating the bilinear pairing. Trapdoor pairing allows construction of a group in which the Decisional Diffie-Hellman (DDH) problem is computationally infeasible given only the description of the group, but is easy given the secret key. Exemplary trapdoor pairing constructions have general applicability to cryptography and also lend themselves more specifically to certain special practical implementations, such as public key cryptography and certificate authority infrastructures.
    • 描述了用于陷门配对的系统和方法。 在一个实现中,陷门配对是通过确定椭圆曲线组和另一组之间的双线性配对并且选择双线性配对的参数(诸如曲线之间的组次序或等值线)来生成的密码原语作为关键 生成和评估双线性配对。 陷阱配对允许建立一个组,其中决策Diffie-Hellman(DDH)问题在计算上是不可行的,只给出该组的描述,但是很容易给出秘密密钥。 示例性的门锁配对结构具有对密码学的一般适用性,并且还更具体地涉及某些特殊的实际实现,例如公共密钥加密和证书颁发机构的基础设施。
    • 5. 发明授权
    • Security architecture for peer-to-peer storage system
    • 对等存储系统的安全架构
    • US08196186B2
    • 2012-06-05
    • US12123979
    • 2008-05-20
    • Anton MityaginDenis X CharlesKristin E. Lauter
    • Anton MityaginDenis X CharlesKristin E. Lauter
    • H04L29/06
    • H04L63/062G06F21/335G06F2221/2151
    • An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; transmitting the transaction key to the peer and, in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key. Such a token allows for secure transactions in a peer-to-peer system including remote storage of data and retrieval of remotely stored data. Other exemplary techniques are also disclosed including exemplary modules for a peer-to-peer server and peers in a peer-to-peer system.
    • 一种示例性方法包括:在对等系统中接收注册对等体的请求; 生成或选择对等体的交易密钥; 存储与对等体的注册信息相关联的交易密钥; 将所述交易密钥发送到所述对等体,并且响应于至少部分地基于所述交易密钥来生成令牌的请求来执行所述对等交易所需的对等交易。 这样的令牌允许对等系统中的安全事务,包括远程存储数据和检索远程存储的数据。 还公开了其它示例性技术,其包括用于对等服务器和对等系统中的对等体的示例性模块。
    • 6. 发明授权
    • Extended authenticated key exchange
    • 扩展认证密钥交换
    • US07627760B2
    • 2009-12-01
    • US11186251
    • 2005-07-21
    • Kristin E. LauterAnton Mityagin
    • Kristin E. LauterAnton Mityagin
    • H04L9/00H04L9/32
    • H04L9/0847
    • Extended authenticated key exchange is described. In one aspect, an identity (IDA) of an initiator and an identity (IDB) of a responder are determined. A first party (i.e., the initiator or the responder) computes a session key based at least on IDA and IDB. A second party (i.e., the initiator or the responder) that is not the first party, uses at least IDA and IDB to compute a corresponding session key. The initiator's session key and the responder's corresponding session key, if equal, provide for secure exchange of data between the initiator and the responder.
    • 描述了扩展的认证密钥交换。 一方面,确定响应者的发起者的身份(IDA)和身份(IDB)。 第一方(即,发起者或应答者)至少基于IDA和IDB来计算会话密钥。 不是第一方的第二方(即发起者或应答者)至少使用IDA和IDB来计算相应的会话密钥。 启动器的会话密钥和响应者的相应会话密钥(如果相等)提供了发起者和应答者之间的数据的安全交换。
    • 7. 发明授权
    • Extended authenticated key exchange with key confirmation
    • 扩展认证密钥交换密钥确认
    • US07694141B2
    • 2010-04-06
    • US11190374
    • 2005-07-26
    • Kristin E. LauterAnton Mityagin
    • Kristin E. LauterAnton Mityagin
    • H04L9/00
    • H04L9/3066H04L9/0844H04L9/3247
    • Extended authenticated key exchange with key confirmation is described. In one aspect, and before computing session keys to exchange information securely between an initiator and a responder, each party of the initiator and the responder, confirms whether the other party has received corresponding information to generate a valid session key. If either party determines that the other respective party has not received the corresponding information, the party terminates the extended authenticated key exchange with key confirmation protocol. Otherwise, when a party determines that the other party has received the corresponding information, the party generates a respective session key. In this manner, when both parties confirm that the other party has received the appropriate information for session key generation, both parties are assured that information can be exchanged between the parties securely using the session keys.
    • 描述了密钥确认的扩展认证密钥交换。 在一个方面中,并且在计算会话密钥之前,安全地在发起者和应答者之间交换信息,发起者和应答者的每一方确认对方是否已经接收到相应的信息以生成有效的会话密钥。 如果任一方确定其他各方尚未收到相应的信息,则该方以密钥确认协议终止扩展认证密钥交换。 否则,当方确定对方已经接收到相应的信息时,该方生成相应的会话密钥。 以这种方式,当双方确认对方已经接收到用于会话密钥生成的适当信息时,确保双方可以使用会话密钥安全地在各方之间交换信息。