会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method for assigning encryption keys
    • 分配加密密钥的方法
    • US06947563B2
    • 2005-09-20
    • US09789451
    • 2001-02-20
    • Ronald FaginJeffrey Bruce LotspiechNimrod MegiddoDalit NaorSimeon Naor
    • Ronald FaginJeffrey Bruce LotspiechNimrod MegiddoDalit NaorSimeon Naor
    • H04H20/00H04L9/00H04L9/08H04N7/16H04N7/167H04N21/258H04N21/266
    • H04N7/163G11B20/00362H04L9/0861H04L9/14H04L2209/34H04L2209/606H04N7/1675H04N21/2585H04N21/26613
    • An encryption key matrix has rows grouped into segments, with a set of one segment per column establishing a slot. Slots are assigned to device manufacturers, with the keys of the slots then being assigned to decryption devices made by the respective manufacturer. In generating the slots, the number “q” of segments in a column is first defined such that a predetermined maximum number of devices can be revoked devices (in that all the keys held by the device are revoked) while ensuring that a good device remains a functional device with a probability of at least (1−Q), wherein Q is a predefined device confidence. Once the number “q” of segments has been defined, the slots themselves are defined in a provably non-discriminatory fashion using an error-correcting code such as a Reed-Solomon code. With this invention, overlap between slots can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the keys in the slots of a “bad” manufacturer are revoked.
    • 加密密钥矩阵将行分组成段,每列建立一个段的一组。 插槽被分配给设备制造商,然后插槽的密钥被分配给由相应制造商制造的解密设备。 在产生时隙中,首先定义列中的段数“q”,使得可以撤销预定的最大数量的设备(因为设备保持的所有密钥被撤销),同时确保良好设备保持 具有至少(1-Q)的概率的功能设备,其中Q是预定义的设备置信度。 一旦已经定义了段数“q”,则使用纠错码(例如里德 - 所罗门码)以可证明的非歧视方式来定义时隙本身。 利用本发明,可以最小化时隙之间的重叠,以最小化当“坏”制造商的时隙中的密钥被撤销时,无辜设备的密钥组可能被无意中撤销的可能性。
    • 9. 发明授权
    • Privacy preserving negotiation and computation
    • 隐私保护协商和计算
    • US06834272B1
    • 2004-12-21
    • US09428695
    • 1999-10-28
    • Simeon NaorBinyamin Pinkas
    • Simeon NaorBinyamin Pinkas
    • G06F1760
    • G06Q20/0855G06Q20/383G06Q30/08G06Q40/04G06Q50/188H04L9/3013H04L2209/122H04L2209/466H04L2209/50H04L2209/76
    • A method for secure multi-party function evaluation with a non-limiting application to the holding of auctions. The outcome of an auction can be determined by an auctioneer without learning any information about the bids, except for the bid which determines the clearing price, and without learning any information about the bidders, except for the winning bidder. The security of this information is maintained even after the conclusion of the auction. Moreover, the bidders can individually and privately verify that the auction was conducted correctly, thereby establishing a mechanism for trust. The method is well-suited to the holding of privacy-protected auctions over computer networks because of its high efficiency, requiring only a single round of interactive communication without any communication among the bidders. Furthermore, the bulk of the computation and data communication or the protocol can be done in advance of the auction itself, and is adaptable to distribution via stored media. The function evaluated by the method can be generalized to any function which can be evaluated by a circuit of gates. The method can be applied in general as a secure multi-party function evaluation protocol, which, in addition to auctions, can also be applied to a number of other special cases, such as Generalized Vickrey Auctions, Groves-Clarke mechanisms, opinion polling, and stable matching.
    • 一种用于安全多方功能评估的方法,其中非限制性应用于举办拍卖。 拍卖结果可以由拍卖人确定,不需要学习任何关于投标的信息,除了决定结算价格的投标,除了中标者之外,还没有学习任何有关投标人的信息。 即使在拍卖结束后,这种信息的安全性仍然保持。 此外,投标人可以单独和私下验证拍卖是否正确进行,从而建立信任机制。 该方法非常适合于通过计算机网络进行隐私保护的拍卖,因为其高效率,仅需要一轮交互式通信,而不需要投标人之间的任何沟通。 此外,计算和数据通信或协议的大部分可以在拍卖本身之前完成,并且适应于经由存储的媒体的分发。 通过该方法评估的函数可以推广到可由门电路评估的任何函数。 该方法一般可应用于安全的多方功能评估协议,除了拍卖之外,还可以应用于其他一些特殊情况,例如广义维克里拍卖,格罗夫斯 - 克拉克机制,意见投票, 稳定匹配。
    • 10. 发明授权
    • Method for message authentication from non-malleable crypto systems
    • 来自非可扩展加密系统的消息认证方法
    • US5539826A
    • 1996-07-23
    • US175024
    • 1993-12-29
    • Cynthia DworkSimeon Naor
    • Cynthia DworkSimeon Naor
    • G09C1/00G06F21/00H04L9/30H04L9/32H04L9/00
    • G06F21/33G06F21/305H04L9/321H04L9/3271G06F2221/2103
    • A method is provided for authentication of encrypted messages. A non-malleable public-key encryption technique is employed, so that an eavesdropper cannot employ an encrypted message, previously overheard, to generate a message which, when sent to a recipient, which would pass as a message originating from a valid sender. In a preferred embodiment, a protocol is provided in which, in response to a message authentication request from a sender, a recipient sends the sender a string, encrypted according to the sender's non-malleable public key. The sender decrypts the string using its private key, and sends the recipient a message which is a function of the string and the message to be authenticated. Because of the non-malleability of the public keys, an eavesdropper cannot impersonate the sender or the recipient and produce a disinformation message which would nevertheless contain the correct authorization string.
    • 提供了一种用于验证加密消息的方法。 使用不可延展的公钥加密技术,使得窃听者不能使用先前被窃听的加密消息来生成当发送到接收者时将作为来自有效发送者的消息传递的消息。 在优选实施例中,提供了一种协议,其中响应于来自发送者的消息认证请求,接收者向发送者发送根据发送者的不可延展公钥加密的字符串。 发件人使用其私钥对字符串进行解密,并向收件人发送一个消息,该消息是字符串和要认证的消息的函数。 由于公开密钥的不可扩展性,窃听者不能模仿发件人或收件人,并且产生一个包含正确的授权字符串的虚构信息。