会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 122. 发明申请
    • System and recording medium for securing data and methods thereof
    • 用于保护数据的系统和记录介质及其方法
    • US20060029224A1
    • 2006-02-09
    • US11197316
    • 2005-08-05
    • Yoo-Jin BaekSang-geun OhSeo-kyu Kim
    • Yoo-Jin BaekSang-geun OhSeo-kyu Kim
    • H04L9/30
    • H04L9/004H04L9/302H04L9/3249H04L2209/04
    • A system and recording medium for securing data and methods thereof including a modular exponentiation. One embodiment includes first masking a message, second masking an exponent, and executing a modular exponentiation based at least one of the first and second maskings. Another embodiment includes first masking a message, second masking at least one exponent, executing a modular exponentiation based at least one of the first and second maskings, detecting an error, executing a modular multiplication operation based on the detection and diffusing the detected error to generate an electronic signature. Yet another embodiment includes first masking a message, second masking at least one exponent, executing a modular exponentiation based at least one of the first and second maskings, detecting an error, and generating an electronic signature based on the detected error.
    • 一种用于保护数据的系统和记录介质及其方法,包括模幂运算。 一个实施例包括首先掩蔽消息,第二掩蔽指数,以及基于第一和第二掩码中的至少一个执行模幂运算。 另一个实施例包括首先掩蔽消息,第二掩蔽至少一个指数,基于第一和第二掩码中的至少一个执行模幂运算,检测错误,基于检测执行模乘法运算并扩展检测到的错误以产生 电子签名。 另一个实施例包括首先掩蔽消息,第二掩蔽至少一个指数,基于第一和第二掩蔽中的至少一个执行模幂运算,检测错误,以及基于检测到的错误生成电子签名。
    • 123. 发明授权
    • Secure communication and computation in an insecure environment
    • 在不安全的环境中安全的沟通和计算
    • US5469507A
    • 1995-11-21
    • US203965
    • 1994-03-01
    • Ran CanettiAmir Herzberg
    • Ran CanettiAmir Herzberg
    • G06F15/16G09C1/00H04L9/06H04L9/08H04L9/14H04L9/16H04L9/32H04K1/00
    • H04L9/004H04L9/0891H04L9/3247H04L2209/80
    • A mechanism which secures the communication and computation between processors in an insecure distributed environment implements efficient "compilers" for a protocol between processors. The protocol is one that assures some input-output relation when executed by processors which are not all trusted but with secret and authenticated communication links between every two processors. This protocol is transformed by a compiler into a protocol that guarantees essentially the same input-output relations in the presence of (the same type of) insecure processors and insecure communication links. Additionally, a method maintains secret values for a sequence of periods, each secret value being shared by two or more processors for one or several periods, where the processors are connected by a communication network.Another mechanism establishes different cryptographic keys established for each period of communication. Essentially, the effect of exposures is contained to the period in which they occur, or to a minimal number of following periods, and the effect of exposures is contained to the processors exposed. At each period a processor is called nonfaulty if the adversary does not control it. A processor is called secure at a given period if it is non-faulty and also has a secret key, unknown to the adversary.
    • 在不安全的分布式环境中确保处理器之间的通信和计算的机制为处理器之间的协议实现有效的“编译器”。 该协议是当处理器执行时确保一些输入 - 输出关系,这些处理器不是全部受信任的,而是在每两个处理器之间具有秘密和经过认证的通信链路。 该协议由编译器转换成协议,该协议在存在(相同类型的)不安全处理器和不安全的通信链路的情况下保证基本相同的输入 - 输出关系。 此外,一种方法维护一系列周期的秘密值,每个秘密值由两个或多个处理器共享一个或多个周期,其中处理器由通信网络连接。 另一种机制为每个通信周期建立不同的加密密钥。 基本上,曝光的影响包含在它们发生的时期或最少数量的后续期间,并且暴露的影响被包含在暴露的处理器中。 在每个时期,如果对手没有控制它,处理器被称为非故障的。 处理器在给定的时间段被称为安全的,如果它是无故障的,并且还具有对手未知的秘密密钥。