会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method for message authentication from non-malleable crypto systems
    • 来自非可扩展加密系统的消息认证方法
    • US5539826A
    • 1996-07-23
    • US175024
    • 1993-12-29
    • Cynthia DworkSimeon Naor
    • Cynthia DworkSimeon Naor
    • G09C1/00G06F21/00H04L9/30H04L9/32H04L9/00
    • G06F21/33G06F21/305H04L9/321H04L9/3271G06F2221/2103
    • A method is provided for authentication of encrypted messages. A non-malleable public-key encryption technique is employed, so that an eavesdropper cannot employ an encrypted message, previously overheard, to generate a message which, when sent to a recipient, which would pass as a message originating from a valid sender. In a preferred embodiment, a protocol is provided in which, in response to a message authentication request from a sender, a recipient sends the sender a string, encrypted according to the sender's non-malleable public key. The sender decrypts the string using its private key, and sends the recipient a message which is a function of the string and the message to be authenticated. Because of the non-malleability of the public keys, an eavesdropper cannot impersonate the sender or the recipient and produce a disinformation message which would nevertheless contain the correct authorization string.
    • 提供了一种用于验证加密消息的方法。 使用不可延展的公钥加密技术,使得窃听者不能使用先前被窃听的加密消息来生成当发送到接收者时将作为来自有效发送者的消息传递的消息。 在优选实施例中,提供了一种协议,其中响应于来自发送者的消息认证请求,接收者向发送者发送根据发送者的不可延展公钥加密的字符串。 发件人使用其私钥对字符串进行解密,并向收件人发送一个消息,该消息是字符串和要认证的消息的函数。 由于公开密钥的不可扩展性,窃听者不能模仿发件人或收件人,并且产生一个包含正确的授权字符串的虚构信息。
    • 8. 发明授权
    • Privacy preserving negotiation and computation
    • 隐私保护协商和计算
    • US06834272B1
    • 2004-12-21
    • US09428695
    • 1999-10-28
    • Simeon NaorBinyamin Pinkas
    • Simeon NaorBinyamin Pinkas
    • G06F1760
    • G06Q20/0855G06Q20/383G06Q30/08G06Q40/04G06Q50/188H04L9/3013H04L2209/122H04L2209/466H04L2209/50H04L2209/76
    • A method for secure multi-party function evaluation with a non-limiting application to the holding of auctions. The outcome of an auction can be determined by an auctioneer without learning any information about the bids, except for the bid which determines the clearing price, and without learning any information about the bidders, except for the winning bidder. The security of this information is maintained even after the conclusion of the auction. Moreover, the bidders can individually and privately verify that the auction was conducted correctly, thereby establishing a mechanism for trust. The method is well-suited to the holding of privacy-protected auctions over computer networks because of its high efficiency, requiring only a single round of interactive communication without any communication among the bidders. Furthermore, the bulk of the computation and data communication or the protocol can be done in advance of the auction itself, and is adaptable to distribution via stored media. The function evaluated by the method can be generalized to any function which can be evaluated by a circuit of gates. The method can be applied in general as a secure multi-party function evaluation protocol, which, in addition to auctions, can also be applied to a number of other special cases, such as Generalized Vickrey Auctions, Groves-Clarke mechanisms, opinion polling, and stable matching.
    • 一种用于安全多方功能评估的方法,其中非限制性应用于举办拍卖。 拍卖结果可以由拍卖人确定,不需要学习任何关于投标的信息,除了决定结算价格的投标,除了中标者之外,还没有学习任何有关投标人的信息。 即使在拍卖结束后,这种信息的安全性仍然保持。 此外,投标人可以单独和私下验证拍卖是否正确进行,从而建立信任机制。 该方法非常适合于通过计算机网络进行隐私保护的拍卖,因为其高效率,仅需要一轮交互式通信,而不需要投标人之间的任何沟通。 此外,计算和数据通信或协议的大部分可以在拍卖本身之前完成,并且适应于经由存储的媒体的分发。 通过该方法评估的函数可以推广到可由门电路评估的任何函数。 该方法一般可应用于安全的多方功能评估协议,除了拍卖之外,还可以应用于其他一些特殊情况,例如广义维克里拍卖,格罗夫斯 - 克拉克机制,意见投票, 稳定匹配。