会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • HIERARCHICAL IDENTITY-BASED ENCRYPTION AND SIGNATURE SCHEMES
    • 基于分类识别的加密和签名方案
    • US20080013722A1
    • 2008-01-17
    • US11780114
    • 2007-07-19
    • Craig GentryAlice Silverberg
    • Craig GentryAlice Silverberg
    • H04L9/28
    • H04L9/0836H04L9/007H04L9/0847H04L9/3073H04L9/3247H04L9/3252
    • Methods are provided for encoding and decoding a digital message between a sender and a recipient in a system including a plurality of private key generators (“PKGs”). The PKGs include at least a root PKG and n lower-level PKG in the hierarchy between the root PKG and the recipient. A root key generation secret is selected and is known only to the root PKG. A root key generation parameter is generated based on the root key generation secret. A lower-level key generation secret is selected for each of the n lower-level PKGs, wherein each lower-level key generation secret is known only to its associated lower-level PKG. A lower-level key generation parameter also is generated for each of the n lower-level PKGs using at least the lower-level key generation secret for its associated lower-level private key generator. The message is encoded to form a ciphertext using at least the root key generation parameter and recipient identity information associated with the recipient. A recipient private key is generated such that the recipient private key is related to at least the root key generation secret, one or more of the n lower-level key generation secrets, and the recipient identity information. The ciphertext is decoded to recover the message using at least the recipient private key.
    • 提供了用于在包括多个私钥生成器(“PKG”)的系统中的发送者和接收者之间对数字消息进行编码和解码的方法。 PKG在根PKG和接收者之间的层次结构中至少包括根PKG和n较低级PKG。 选择根密钥生成秘密,仅对根PKG知道。 根密钥生成参数基于根密钥生成密钥生成。 为n个较低级PKG中的每一个选择较低级密钥生成秘密,其中每个较低级密钥生成秘密仅对其相关联的较低级PKG是已知的。 使用至少对于其相关联的下级私钥生成器的较低级密钥生成秘密,也为n个较低级PKG中的每一个生成较低级密钥生成参数。 使用至少与接收者相关联的根密钥生成参数和收件人身份信息来编码消息以形成密文。 生成接收私钥,使得接收方私钥至少与根密钥生成秘密相关,n个较低级密钥生成秘密中的一个或多个以及接收者身份信息。 对密文进行解码,至少使用收件人私钥来恢复邮件。
    • 4. 发明申请
    • HIERARCHICAL IDENTITY-BASED ENCRYPTION AND SIGNATURE SCHEMES
    • 基于分类识别的加密和签名方案
    • US20070050629A1
    • 2007-03-01
    • US11552076
    • 2006-10-23
    • Craig GentryAlice Silverberg
    • Craig GentryAlice Silverberg
    • H04L9/00
    • H04L9/0836H04L9/007H04L9/0847H04L9/3073H04L9/3247H04L9/3252
    • Methods are provided for encoding and decoding a digital message between a sender and a recipient in a system including a plurality of private key generators (“PKGs”). The PKGs include at least a root PKG and n lower-level PKG in the hierarchy between the root PKG and the recipient. A root key generation secret is selected and is known only to the root PKG. A root key generation parameter is generated based on the root key generation secret. A lower-level key generation secret is selected for each of the n lower-level PKGs, wherein each lower-level key generation secret is known only to its associated lower-level PKG. A lower-level key generation parameter also is generated for each of the n lower-level PKGs using at least the lower-level key generation secret for its associated lower-level private key generator. The message is encoded to form a ciphertext using at least the root key generation parameter and recipient identity information associated with the recipient. A recipient private key is generated such that the recipient private key is related to at least the root key generation secret, one or more of the n lower-level key generation secrets, and the recipient identity information. The ciphertext is decoded to recover the message using at least the recipient private key.
    • 提供了用于在包括多个私钥生成器(“PKG”)的系统中的发送者和接收者之间对数字消息进行编码和解码的方法。 PKG在根PKG和接收者之间的层次结构中至少包括根PKG和n较低级PKG。 选择根密钥生成秘密,仅对根PKG知道。 根密钥生成参数基于根密钥生成密钥生成。 为n个较低级PKG中的每一个选择较低级密钥生成秘密,其中每个较低级密钥生成秘密仅对其相关联的较低级PKG是已知的。 使用至少对于其相关联的下级私钥生成器的较低级密钥生成秘密,也为n个较低级PKG中的每一个生成较低级密钥生成参数。 使用至少与接收者相关联的根密钥生成参数和收件人身份信息来编码消息以形成密文。 生成接收私钥,使得接收方私钥至少与根密钥生成秘密相关,n个较低级密钥生成秘密中的一个或多个以及接收者身份信息。 对密文进行解码,至少使用收件人私钥来恢复邮件。
    • 6. 发明申请
    • Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates
    • 使用模块化根执行认证,包括但不限于认证数字证书的有效性
    • US20060242699A1
    • 2006-10-26
    • US11454394
    • 2006-06-16
    • Zulfikar RamzanCraig GentryBernhard Bruhn
    • Zulfikar RamzanCraig GentryBernhard Bruhn
    • G06F12/14
    • G06F21/33H04L9/3218H04L9/3268H04L2209/30H04L2209/38H04L2209/56H04L2209/80
    • Authentication of elements (e.g. digital certificates 140) as possessing a pre-specified property (e.g. being valid) or not possessing the property is performed by (1) assigning a distinct integer pi to each element, and (2) accumulating the elements possessing the property or the elements not possessing the property using a P-th root u1/P (mod n) of an integer u modulo a predefined composite integer n, where P is the product of the integers associated with the accumulated elements. Alternatively, authentication is performed without such accumulators but using witnesses associated with such accumulators. The witnesses are used to derive encryption and/or decryption keys for encrypting the data evidencing possession of the property for multiple periods of time. The encrypted data are distributed in advance. For each period of time, decryption keys are released which are associated with that period and with the elements to be authenticated in that period of time. Authentication can be performed by accumulating elements into data which are a function of each element but whose size does not depend on the number of elements, and transmitting the accumulator data over a network to a computer system which de-accumulates some elements as needed to re-transmit only data associated with elements needed by other computer systems. This technique is suitable to facilitate distribution of accumulator data in networks such as ad hoc networks.
    • 通过(1)向每个元素分配不同的整数pi来执行具有预先指定的属性(例如有效)或不具有该属性的元素(例如数字证书140)的认证,以及(2)累积具有 属性或不具有属性的元素使用整数u的预定义复合整数n的第P个根u(1)/ P(mod n),其中P是与 积累的元素。 或者,在没有这样的累加器的情况下执行认证,但是使用与这种累加器相关联的证人。 证人被用于导出加密和/或解密密钥,用于加密证明拥有属性多个时间段的数据。 加密数据预先分配。 对于每个时间段,释放与那段时间相关联的解密密钥以及在该时间段内被认证的元素。 认证可以通过将元素累加到数据中来执行,该数据是每个元素的函数,但其​​大小不依赖于元素的数量,并且通过网络将累加器数据发送到计算机系统,其根据需要去累积一些元素 - 仅传输与其他计算机系统所需的元素相关联的数据。 该技术适合于促进诸如ad hoc网络的网络中的累加器数据的分配。
    • 9. 发明申请
    • Revocation of cryptographic digital certificates
    • US20060059333A1
    • 2006-03-16
    • US11218093
    • 2005-08-31
    • Craig GentryZulfikar RamzanBernhard Bruhn
    • Craig GentryZulfikar RamzanBernhard Bruhn
    • H04L9/00
    • H04L9/3265H04L9/3236H04L63/0823H04L2209/38H04L2209/56H04L2209/80
    • Different targets (c0, N1) of a digital certificate are mapped into a “super-target” using methods allowing a certificate validity verifier (110) to compute the super-target. The certificate includes the super-target instead of the targets. Also, a certificate with multiple targets can be signed with a redactable signature by the certification authority (CA 120). When the certificate's owner provides the certificate to a verifier together with a validity proof, the owner redacts the certificate to delete unnecessary targets. A single validity proof (ci(F)) may be provided to certificate owners for a set (F) of the certificates via a multicast transmission if a multicasting group (2010) is formed to correspond to the set. A verifier (110) may decide to cache the validity proof for a set provide the cached proof to other parties. The caching decision is based on the caching priority of the set F. The priority may depend on the number of certificates in the set F, the sum of the remaining validity periods for the certificates in the set, and other factors. In the setup phase, the CA generates validation proof data structures for greater time than the maximum validity period of any certificate. Therefore, new certificates can be added to the existing data structures after the setup phase. A distributed certificate authority includes a CA and a number of Sub-CAs (2610). The Sub-CAs have secret certificate validation data, but different data are provided to different Sub-CAs for each certificate. If a Sub-CA is compromised, the Sub-CA validity proof will be withheld by the CA to alert the verifiers not to use the data from this Sub-CA. Also, the secret data are encrypted when distributed to the Sub-CAs. A decryption key (DK.j.k) for each “partition” of time is distributed to each Sub-CA at or shortly before the start of the partition. A compromised Sub-CA can be reactivated at the end of the partition because the adversary does not get the decryption keys for the future partitions.
    • 10. 发明申请
    • Certificate-based encryption and public key infrastructure
    • 基于证书的加密和公钥基础设施
    • US20050246533A1
    • 2005-11-03
    • US10521741
    • 2003-08-28
    • Craig Gentry
    • Craig Gentry
    • H04L9/08H04L9/00H04L9/30H04L9/32
    • H04L9/0847H04L9/0836H04L9/3073H04L9/3265
    • The present invention provides methods for sending a digital message from a sender (606) to a recipient (608) in a public-key based cryptosystem comprising an authorizer (606). The authorizer can be a single entity (606) or comprise a hierarchical or distributed entity (602, 604a-604b). The present invention allows communication of messages by an efficient protocol, not involving key status queries or key escrow, where a message recipient (608) can decrypt a message from a message sender (606) only if the recipient (608) possesses up-to-date authority from the authorizer. The invention allows such communication in a system comprising a large number (e.g. millions) of users.
    • 本发明提供了一种用于在包括授权器(606)的基于公开密钥的密码系统中将数字消息从发送器(606)发送到接收者(608)的方法。 授权器可以是单个实体(606)或者包括分层或分布式实体(602,604a-604b)。 本发明允许通过不涉及密钥状态查询或密钥托管的有效协议来进行消息的通信,其中消息接收方(608)只有在接收方(608)拥有最新信息时才能从消息发送者(606)解密消息 授权者的权限。 本发明允许在包括大量(例如数百万)用户)的系统中进行这种通信。