Signcryption scheme based on elliptic curve cryptography

一种椭圆曲线加密、椭圆曲线的技术,应用在智能卡领域,达到减小数据开销的效果

Inactive Publication Date: 2010-02-10
IRDETO BV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In EP0874307A1 the signcrypted message disadvantageously has an increased size due to the overhead added to the message by encrypting and digitally signing the message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signcryption scheme based on elliptic curve cryptography
  • Signcryption scheme based on elliptic curve cryptography
  • Signcryption scheme based on elliptic curve cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Figure 1A and 1B shows the application of ECIES ( Figure 1A ) and ECDSA ( Figure 1B ) prior art examples of ECM or EMM before and after.

[0040] The invention is typically applied to conditional access systems where EMMs and ECMs are transmitted in signcrypted form. The invention is not limited to application in conditional access systems, and can be used in any system where data is signcrypted.

[0041] exist figure 2 , a typical conditional access system 100 is shown. figure 2 Only the main elements involved in signcryption are shown, other elements not shown may be part of the conditional access system 100 . In the conditional access system 100 , the headend system 110 transmits the signcrypted EMM and the signcrypted ECM to the smart card 120 through the broadcast network 130 . The smart card 120 is for example located in a set-top box (not shown) for receiving and forwarding the sign-encrypted EMM / ECM to the smart card 120 . although figure 2 Only o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for signcrypting data based on elliptic curve cryptography. In a head-end system, data is encrypted using a random point R and digitally signed using the random point R. Only the x-coordinate R x of the random point R and only the signature components signature of the signature are added to the data after signcrypting the data. In a smartcard the signcrypted data is verified using the random point R and decrypted using the random point R.

Description

technical field [0001] The present invention relates to a method, a conditional access system, a front end system and a smart card for encrypting and digitally signing data based on elliptic curve cryptography. Background technique [0002] Conditional access systems are well known and widely used in connection with currently available pay television systems. Currently, such systems are based on the transmission of services encrypted by a control word (also called a service encryption key) received by the user with a set-top box and a smart card per subscription package. Typically, these services are transmitted by headend systems in broadcast streams. Implementations are known in which set-top box functionality is integrated into devices such as televisions, personal video recorders, mobile phones, smartphones or computer appliances. Smart card implementations are known in which the smart card is a stand-alone card inserted manually into the set-top box prior to operation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32G09C1/00H04L9/36
CPCH04L9/3252H04L9/3066H04L12/40104H04N21/2347H04L2209/26H04W12/03
Inventor 徐胜波
Owner IRDETO BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products