会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 93. 发明公开
    • KEY-EXCHANGE METHOD, KEY-EXCHANGE SYSTEM, KEY DEVICE, TERMINAL DEVICE, AND PROGRAM
    • 密钥交换方法,密钥交换系统,密钥设备,终端设备和程序
    • EP3232603A1
    • 2017-10-18
    • EP16737330.7
    • 2016-01-12
    • Nippon Telegraph and Telephone Corporation
    • NAGAI, AkiraSAITO, TsunekazuKOBAYASHI, Tetsutaro
    • H04L9/08G09C1/00H04L9/30
    • H04L9/0844G09C1/00H04L9/0643H04L9/0819H04L9/0841H04L9/0869H04L9/0894H04L9/0897H04L9/14H04L9/3093H04L2209/046H04L2209/76
    • A key device cannot calculate a common key and a client can confirm that processing has been performed correctly by a correct key device. A random number generating unit 12 generates random numbers s 1 , s 2 , s' 1 , and s' 2 . A public keys randomizing unit 13 generates first randomized public keys information obtained by randomizing public keys by using the random number s 1 and second randomized public keys information obtained by randomizing the public keys by using the random number s 2 . A proxy calculation unit 21 calculates a first commission result by using a secret key and calculates a second commission result by using the secret key. A verification unit 14 calculates a first verification value by using the random number s 2 , calculates a second verification value by using the random number s 1 , and verifies whether or not the first verification value and the second verification value coincide with each other. A common key calculation unit 15 calculates a common key by using the random numbers s' 1 and s' 2 if the first verification value and the second verification value coincide with each other.
    • 密钥设备无法计算公用密钥,客户端可以通过正确的密钥设备确认处理已正确执行。 随机数产生单元12产生随机数s1,s2,s'1和s'2。 公开密钥随机化单元13通过使用随机数s1产生通过随机化公共密钥获得的第一随机化公开密钥信息和通过使用随机数s2随机化公共密钥获得的第二随机化公开密钥信息。 代理计算单元21通过使用秘密密钥来计算第一委托结果,并且通过使用该秘密密钥来计算第二委托结果。 验证单元14通过使用随机数s2计算第一验证值,通过使用随机数s1计算第二验证值,并且验证第一验证值和第二验证值是否彼此一致。 如果第一验证值和第二验证值彼此一致,则公共密钥计算单元15通过使用随机数s'1和s'2来计算公共密钥。
    • 94. 发明公开
    • PUBLIC-KEY ENCRYPTION SYSTEM
    • 公钥加密系统
    • EP3231126A1
    • 2017-10-18
    • EP15804834.8
    • 2015-12-07
    • Koninklijke Philips N.V.
    • GARCIA MORCHON, OscarTOLHUIZEN, Ludovicus Marinus Gerardus MariaRIETMAN, Ronald
    • H04L9/08
    • H04L9/0869H04L9/0838H04L9/14H04L9/3093
    • A key generation device (100) configured to generate a public key (126) for use in a public key encryption device and a corresponding private key (114) for use in a private key decryption device, the key generation device comprising a private key generator (110) configured for obtaining in electronic form a private random value (112, s), and generating the private key (114), the private key comprising the private random value (112), and a public key generator (120) configured for obtaining in electronic form a public set of bivariate polynomials (122, fi(,)), computing a public univariate polynomial (124) by summing over univariate polynomials obtained by substituting the private random value (112, s) into the polynomials of the public set (122, fi(s,)), and generating the public key (126), the public key comprising the public univariate polynomial (124) and the public set (122).
    • 一种密钥生成装置(100),被配置为生成供在公钥加密装置中使用的公钥(126)和用于私钥解密装置的相应私钥(114),所述密钥生成装置包括私钥生成器 (110),其被配置用于以电子形式获得私有随机值(112,s),并且生成所述私钥(114),所述私钥包括所述私有随机值(112)以及公钥生成器(120),所述公钥生成器 以电子形式获得公共集合的双变量多项式(122,f i(,)),通过对将所述私有随机值(112,s)代入所述多项式的多项式所获得的单变量多项式进行求和来计算公开的单变量多项式 公共集合(122,f(s,))并生成公钥(126),公钥包括公开单变量多项式(124)和公共集合(122)。
    • 96. 发明公开
    • CRYPTOGRAPHIC SYSTEM ARRANGED FOR KEY SHARING
    • 为密钥共享而设计的密码系统
    • EP3189618A1
    • 2017-07-12
    • EP15753064.3
    • 2015-08-25
    • Koninklijke Philips N.V.
    • GARCIA MORCHON, OscarRIETMAN, RonaldTOLHUIZEN, Ludovicus Marinus Gerardus Maria
    • H04L9/08H04L9/30
    • H04L9/08H04L9/008H04L9/0816H04L9/083H04L9/0838H04L9/0847H04L9/30H04L9/3093H04W12/04
    • A cryptographic system is provided comprising multiple configuration servers (200, 201, 202) arranged to configure multiple network devices (300, 350, 360) for key sharing. Each configuration server comprising a computation unit (220) arranged to compute local key material for the network device from root key material specific to the configuration server and the network device identity number of the network device that is being configured. At least two configuration servers of the multiple configuration servers provide computed local key material to said network device. The network devices are configured to determine a shared key with any one of multiple network devices. A network device comprises a shared key unit (330) arranged to derive a shared key from another network device's identity number and at least two of the multiple local key materials of the network device.
    • 提供了一种密码系统,包括被配置为配置用于密钥共享的多个网络设备(300,350,360)的多个配置服务器(200,201,202)。 每个配置服务器包括计算单元(220),该计算单元被布置为从特定于配置服务器的根密钥材料和正被配置的网络设备的网络设备身份号码计算网络设备的本地密钥材料。 多个配置服务器中的至少两个配置服务器向所述网络设备提供计算出的本地密钥材料。 网络设备被配置为确定与多个网络设备中的任何一个的共享密钥。 一种网络设备包括共享密钥单元(330),该共享密钥单元(330)被配置为从另一网络设备的身份号码和网络设备的多个本地密钥材料中的至少两个导出共享密钥。
    • 97. 发明公开
    • MULTIVARIATE PUBLIC KEY SIGNATURE/VERIFICATION SYSTEM AND SIGNATURE/VERIFICATION METHOD
    • SYSTEM ZUR SIGNATUR / VERIFIZIERUNG MULTIVARIATER公共密钥UND签名 - / VERIFIZIERUNGSVERFAHREN
    • EP3048754A4
    • 2017-05-10
    • EP13894007
    • 2013-12-18
    • UNIV SOUTH CHINA TECH
    • TANG SHAOHUASHEN WUQIANG
    • H04L9/32
    • H04L9/3093H04L9/006H04L9/3247
    • Disclosed is a multivariate public key signature/verification system comprising a signature module and a verification module. The signature module contains a processor, a first affine transformation inversion component, an isomorphic inversion component, a trapdoor component, an isomorphic component, and a second affine transformation inversion component. Corresponding computations are executed sequentially by the components on a message to be signed; one or more solutions are generated after being processed by the trapdoor component; one solution is selected randomly at this time and transmitted to the isomorphic component and the second affine transformation inversion component to be processed, and then a signature generated is transmitted together with the message to the processor. The verification module contains the processor and a public key transformation component. The signature is transmitted by the processor to the public key transformation component; the signature is substituted into each multivariate polynomial in a public key mapping; and the processor judges whether the obtained data is equal to the message in a memory: if yes, the signature is valid, and if not, the signature is invalid. The system and method of the present invention provide high levels of security and computation efficiency.
    • 公开了包括签名模块和验证模块的多变量公钥签名/验证系统。 签名模块包含处理器,第一仿射变换反转组件,同构反转组件,陷门组件,同构组件,以及第二仿射变换反转组件。 相应的计算由要签名的消息上的组件顺序执行; 一个或多个解决方案在由陷门器组件处理之后生成; 此时随机选择一个解并将其发送给同构分量和待处理的第二仿射变换反转分量,然后将生成的签名与消息一起发送给处理器。 验证模块包含处理器和公钥转换组件。 签名由处理器发送给公钥转换组件; 在公钥映射中将签名代入每个多元多项式中; 处理器判断获取的数据是否与内存中的消息相同:如果是,则签名有效,否则签名无效。 本发明的系统和方法提供高水平的安全性和计算效率。
    • 98. 发明公开
    • HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY SIGNATURE/VERIFICATION SYSTEM AND METHOD
    • VERFAHREN ZUR MULTIVARIABLEN SIGNATUR / VERIFIZIERUNGÖFFENTLICHERSCHLÜSSEL的HYPERSPHÄRENBASIERTES系统
    • EP3035587A4
    • 2017-04-12
    • EP14877771
    • 2014-12-30
    • UNIV SOUTH CHINA TECH
    • TANG SHAOHUACHEN JIAHUI
    • H04L9/06H04L9/30
    • H04L9/30H04L9/0618H04L9/0643H04L9/3093
    • A system for multivariate public key signature/verification based on hypersphere is disclosed, including a signature module and a verification module, the signature module includes a processor, a first affine transformation inversion component, a trapdoor component, and a second affine transformation inversion component. Each of the components may perform a corresponding operation on a message sequentially, wherein one or more groups of solutions are produced after the processing of the trapdoor part, a group of solutions is randomly selected and continued to be processed by the components to generate a signature, and the signature and the message are transmitted to the processor. The verification module includes a processor and a public key transformation component. The processor transmits the signature to the public key transformation component for operation, then determines whether the generated data is equal to the message in the memory: if the generated data is equal to the message, the signature is valid, otherwise the signature is invalid. The system and method according to the present disclosure do not use the large field technology, the designed center map is completely hidden by N groups of "sphere centers" as private keys, and the signature process only needs to solve the system of linear equations so that the operating speed is very fast.
    • 公开了一种基于超球体的多元公钥签名/验证系统,包括签名模块和验证模块,签名模块包括处理器,第一仿射变换反转分量,陷门组件和第二仿射变换反转分量。 每个组件可以顺序地对消息执行相应的操作,其中在陷门部分的处理之后产生一组或多组解,随机选择一组解,并继续由组件处理以产生签名 ,并且签名和消息被发送到处理器。 验证模块包括处理器和公钥转换组件。 处理器将签名发送到公共密钥变换部件进行操作,然后确定生成的数据是否等于存储器中的消息:如果生成的数据等于消息,则签名是有效的,否则签名无效。 根据本公开的系统和方法不使用大型现场技术,所设计的中心图由N组“球体中心”作为私钥完全隐藏,签名过程只需要求解线性方程组 运行速度非常快。
    • 99. 发明公开
    • HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY ENCRYPTION/DECRYPTION SYSTEM AND METHOD
    • 多功能系统多功能系统ZURVERSCHLÜSSELUNG/ENTSCHLÜSSELUNGÖFFENTLICHERSCHLÜSSELUND VERFAHREN
    • EP3096488A1
    • 2016-11-23
    • EP15735039.8
    • 2015-01-07
    • South China University Of Technology (SCUT)
    • TANG, ShaohuaCHEN, Jiahui
    • H04L9/30
    • H04L9/3093H04L9/0852H04L9/3066
    • Disclosed is a hypersphere-based multivariable public key encryption/decryption system, which is composed of an encryption module and a decryption module, wherein the encryption module comprises a processor, and a public key transformation component for transforming plaintext into ciphertext; and the decryption module comprises a processor, a first affine transformation inversion component, a trapdoor component and a second affine transformation inversion component, wherein the trapdoor component comprises a linear equation system construction component and a linear equation system solving component. All components execute corresponding operations, so that a set of data is obtained finally, and the set of data is stored and output as decrypted plaintext; and if the decryption module does not produce data, the processor outputs warning information about a decryption failure to a user. In the system and method of the present invention, the large domain technique is not used. The designed centralizing mapping contains N sets of "centre of sphere" as private keys to realize centralizing hiding. Meanwhile, the running speed is very fast, and only linear equation system solving is required to be conducted in the decryption process.
    • 公开了一种基于超球体的多变量公钥加密/解密系统,其由加密模块和解密模块组成,其中加密模块包括处理器和用于将明文转换为密文的公共密钥变换部件; 并且解密模块包括处理器,第一仿射变换反转分量,陷门分量和第二仿射变换反转分量,其中所述陷门分量包括线性方程式系统构造分量和线性方程组系统求解分量。 所有组件执行相应的操作,最终获得一组数据,并将该组数据作为解密的明文存储和输出; 并且如果解密模块不产生数据,则处理器向用户输出关于解密失败的警告信息。 在本发明的系统和方法中,不使用大域技术。 设计的集中映射包含N组“球体中心”作为私钥实现集中隐藏。 同时,运行速度非常快,只需要在解密过程中进行线性方程组求解。
    • 100. 发明公开
    • HOMOMORPHIC CRYPTOGRAPHIC PROCESSING METHOD AND CRYPTOGRAPHIC PROCESSING DEVICE FOR PATTERN MATCHING WITH SIMILARITIES COMPUTATION
    • KRYPTOGRAFIEVERARBEITUNGSVORRICHTUNG UND KRYPTOGRAFIARVERARBEITUNGSVERFAHREN MIT BERECHNUNG VONÄHNLICHKEIT
    • EP3035581A1
    • 2016-06-22
    • EP15187868.3
    • 2015-10-01
    • FUJITSU LIMITED
    • Yasuda, Masaya
    • H04L9/00
    • H04L9/3093H04L9/008H04L9/14H04L2209/24
    • A storage (111, 311, 321) stores therein a first vector. A generator (112, 312, 322) generates a first encrypted polynomial by encrypting a first polynomial that corresponds to a first binary vector obtained by performing a binary transformation on elements of the first vector. A transmitter (113, 313, 323) transmits to a cryptographic operation device (303) cryptographic information that represents the first encrypted polynomial. The cryptographic operation device multiplies the first encrypted polynomial by a second encrypted polynomial that is generated by encrypting a second polynomial that corresponds to a second binary vector obtained by performing a binary transformation on elements of a second vector, so as to generate a third encrypted polynomial. When assigning 2 to a variable in a prescribed portion of a third polynomial obtained by decrypting the third encrypted polynomial, a result of an operation of the first vector and the second vector is obtained.
    • 存储器(111,311,321)中存储有第一矢量。 发生器(112,312,322)通过加密与通过对第一矢量的元素执行二进制变换获得的第一二进制向量相对应的第一多项式来生成第一加密多项式。 发送机(113,313,323)向密码操作装置(303)发送表示第一加密多项式的密码信息。 密码操作装置将第一加密多项式乘以第二加密多项式,该第二加密多项式是通过加密对应于通过对第二向量的元素进行二进制变换获得的第二二进制向量的第二多项式而生成的,以便生成第三加密多项式 。 当通过解密第三加密多项式获得的第三多项式的规定部分中的变量分配2时,获得第一向量和第二向量的操作结果。