会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • Shared secret verification method and system
    • 共享秘密验证方法和系统
    • US20110179274A1
    • 2011-07-21
    • US12992377
    • 2009-05-14
    • Peter Joannes Mathias VeugenMattijs Oskar van DeventerVictor Bastiaan Klos
    • Peter Joannes Mathias VeugenMattijs Oskar van DeventerVictor Bastiaan Klos
    • H04L9/32
    • H04L9/3271H04L9/3236
    • Method for shared secret verification e.g. to be applied in secure data exchange, in which at least two parties, hereinafter indicated as Alice and Bob, each have a secret while their challenge is to find out whether they share the same secret or not, however, without disclosing the secret itself to each other or to any third party. The method comprises the following steps. In step 1, Alice picks a random number RA, encrypts it using Bob's public key PUB, adds the value of her secret SA, and sends the result K to Bob. In step 2 Bob receives K, subtracts his secret SB, and performs a decryption using his own private key PRB. In step 3 Bob performs the one-way function H on L and sends the result M to Alice. In step 4 Alice receives M, takes her original random number RA, performs the same one-way function H and verifies whether the result equals the received M. In step 5 Alice sends her original random number RA to Bob. In step 6 Bob receives RA and verifies whether it equals to his earlier result L and concluding that, if the answer is “no”, Alice knows that Bob has the same secret and that, if the answer is “yes” Bob knows Alice doesn't have the same secret. Instead of performing the steps 6 and 7, Alice and Bob may repeat steps 1 to 5 where it is Bob who starts the exchange.
    • 共享密码验证方法,例如 应用于安全数据交换中,其中至少两方(以下称为爱丽丝和鲍勃)各自具有秘密,同时他们的挑战是确定它们是否共享相同的秘密,然而,没有将秘密本身披露 彼此或任何第三方。 该方法包括以下步骤。 在步骤1中,Alice选择随机数RA,使用Bob的公钥PUB对其进行加密,并添加其秘密SA的值,并将结果K发送给Bob。 在步骤2中,Bob接收K,减去其秘密SB,并使用自己的私钥PRB执行解密。 在步骤3中,Bob执行L上的单向函数H,并将结果M发送给Alice。 在步骤4中,Alice接收M,取她的原始随机数RA,执行相同的单向函数H并验证结果是否等于接收的M.在步骤5中,Alice将其原始随机数RA发送给Bob。 在步骤6中,Bob接收RA并验证其是否等于他早期的结果L,并得出结论:如果答案为“否”,则Alice知道Bob具有相同的秘密,如果答案是“是”,Bob知道Alice不 没有相同的秘密。 而不是执行步骤6和7,Alice和Bob可能会重复步骤1到5,在那里开始交换的是Bob。