会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Method to manage revocations in a group of terminals
    • 管理一组终端的撤销方法
    • US08934626B2
    • 2015-01-13
    • US13520771
    • 2011-03-01
    • Alexandre Karlov
    • Alexandre Karlov
    • H04L9/00G06F21/10H04L9/08H04N7/167
    • G06F21/10G06F2221/0753H04L9/0833H04L9/0836H04L2209/601H04N7/1675H04N21/2347H04N21/2585H04N21/26613
    • The present invention concerns the field of broadcast encryptionmethod, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices. It should be noted that only non-revoked devices can compute the final key (this is achieved through subset management and related subset key derivation technique) and perform the de-blinding (which is performed with one pairing).
    • 本发明涉及广播加密方法的领域,即一种将密钥分配到一组用户中的方法,使得可以以有效的方式管理该组中的一个成员的撤销。 提出的解决方案是私有加密密钥密文常数串通防扩散加密。 本发明的主要思想是将有效的基于树的密钥导出(也称为子集管理)的概念与个人和个性化的密钥盲法相结合,从而实现完全的防欺骗广播加密系统。 由于称为配对(也称为双线性映射)的加密技术,导致所有授权(非撤销)设备通常共享的全局密钥,因此最后一刻执行关键的禁忌。 应该注意的是,只有非撤销设备可以计算最终密钥(这通过子集管理和相关的子集密钥导出技术来实现),并执行去盲(用一对配对执行)。
    • 5. 发明授权
    • Method to trace traceable parts of original private keys in a public-key cryptosystem
    • 在公钥密码系统中跟踪原始私钥的可追溯部分的方法
    • US07936882B2
    • 2011-05-03
    • US12016031
    • 2008-01-17
    • Pascal JunodAlexandre Karlov
    • Pascal JunodAlexandre Karlov
    • H04L9/30
    • H04L9/304H04L2209/606
    • The aim of the present invention is to propose a very fast alternative mechanism to the traitor tracing algorithm introduced by Boneh and Franklin to trace private keys in a public-key cryptosystem. This invention concerns a method to trace traceable parts of original private keys in a public-key cryptosystem consisting of one public key and λ corresponding private keys, a private key being formed by a traceable array of 2k elements forming a syndrome of a generalized Reed-Solomon code with parameters (λ, λ-2k) defined by the base points {right arrow over (π)}=(π1, . . . , πλ) and a scaling vector {right arrow over (c)}=(c1, c2, . . . , cλ), comprising the steps of: obtaining the traceable part {right arrow over (d)}=(d1, . . . , d2k)T of a rogue private key, applying a Berlekamp-Massey algorithm on the traceable part {right arrow over (d)}=(d1, . . . , d2k)T of the rogue private key, to obtain the k coefficients of an error-locator polynomial, applying the Chien's search algorithm to the error-locator polynomial, to obtain roots of the error-locator polynomial, determining the base points of the traceable part of the original private keys by computing the arithmetic inverse of each root, these base points allowing to uniquely determine the private key.
    • 本发明的目的是提出一种非常快速的替代机制,即由Boneh和Franklin引入的跟踪私有密钥在公共密钥密码系统中的跟踪算法。 本发明涉及一种在由一个公开密钥和λ个对应私钥组成的公开密钥密码系统中跟踪原始私有密钥的可追溯部分的方法,私有密钥由2k个元素的可追踪阵列形成,形成广义Reed- 由基点{right arrow over(&pgr;)} =(&pgr; 1,...,&pgr;λ)定义的参数(λ,λ-2k)的所罗门码和缩放矢量{(c) } =(c1,c2,...,cλ),包括以下步骤:获得流氓私钥的可追溯部分{右箭头(d)} =(d1,...,d2k)T, 在可追溯部分(右箭头(d)} =(d1,...,d2k)T上的流氓私钥的Berlekamp-Massey算法,以获得误差定位多项式的k个系数,应用Chien的搜索算法 到误差定位器多项式,以获得误差定位多项式的根,通过计算算术来确定原始私钥的可跟踪部分的基点 每个根的tic逆,这些基点允许唯一地确定私钥。
    • 10. 发明授权
    • Method to enforce by a management center the access rules for a broadcast product
    • 由管理中心执行广播产品的访问规则的方法
    • US08634554B2
    • 2014-01-21
    • US13119927
    • 2009-09-16
    • Pascal JunodAlexandre Karlov
    • Pascal JunodAlexandre Karlov
    • H04L29/06
    • H04N7/1675H04N7/165H04N21/25833H04N21/4623H04N21/63345
    • A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same; associating one negative Boolean attribute to a receiver not entitled to the attribute and loading the same; defining at least a second broadcast encryption scheme for the negative Boolean attributes and associating each negative Boolean attribute corresponding decryption key material; expressing access conditions on a product as a Boolean expression by combining at least one positive Boolean attribute and at least one negative Boolean attribute by at least one Boolean conjunction or disjunction; generating and broadcasting at least one cryptogram to a receiver, encrypting the access key with the two combined broadcast encryption schemes according to the Boolean expression.
    • 一种由管理中心执行访问密钥访问的广播产品的访问规则的方法,管理中心管理多个布尔正负属性,包括以下步骤:将一个正的布尔属性与被授予该属性的接收者相关联;以及 加载相同; 将一个负的布尔属性关联到没有权限的属性并加载该属性的接收者; 为负布尔属性定义至少第二广播加密方案,并且将每个负布尔属性对应的解密密钥材料相关联; 通过将至少一个正布尔属性和至少一个负布尔属性组合至少一个布尔连接或分离来表示对产品的访问条件作为布尔表达式; 生成并向接收器发送至少一个密码,并根据布尔表达式使用两个组合广播加密方案加密访问密钥。