Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification of data items in data processing systems

A data processing system, data item technology, applied in the direction of digital transmission system, transmission system, user identity/authority verification, etc., can solve problems such as unavailability

Inactive Publication Date: 2014-06-04
INT BUSINESS MASCH CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme will not be available for applications such as certificate revocation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification of data items in data processing systems
  • Verification of data items in data processing systems
  • Verification of data items in data processing systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Before describing a data processing system embodying the invention, various assumptions and cryptographic tools used as building blocks to be used in the operation of the described exemplary embodiments are first presented.

[0030] If for every integer c, there exists an integer K such that |υ(k)|K c , then the function υ can be ignored. A problem is considered severe (or intractable) if no probabilistic polynomial-time (p.p.t) algorithm exists for the size of the input to solve it.

[0031] bilinear pairing Suppose G and G T is a group of prime order q, mapping e: G×G→G T The following properties must be met:

[0032] (a) Bilinear: If e(a x , b y )t=e(a,b) x,y , then map e: G×G→G T is bilinear

[0033] (b) Non-degeneracy: For all generators g, h ∈ G, e(g, h), generate G T ;

[0034] (c) Effectiveness: There is an effective algorithm BMGen(1 k ) output (q, G, G T , e, g) to generate a bilinear map, and for any a, b ∈ G, there exists an efficient algorith...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatus are disclosed for providing a cryptographic accumulator, indicative of a set of data items such as cryptographic credentials, in a data processing system (1). A plurality of group elements is generated and a mapping is defined between data items in said set and respective group elements. A cryptographic accumulator is generated, the cryptographic accumulator comprising the product of respective group elements related to the group elements mapped to the data items in the set. The cryptographic accumulator is then published in the data processing system (1) so as to be available for use by system components (6, 7) involved in verifying whether data items in use in the system (1) are members of the set indicated by the accumulator.

Description

technical field [0001] The present invention generally relates to authentication of data items, such as cryptographic certificates, in data processing systems. Methods, apparatus and computer programs are provided to implement such verification procedures in data processing systems. Background technique [0002] There is often a need to perform some form of authentication process in relation to a data item associated with a party to a data processing system. For example, one party may need to prove possession of a data item or possession of a valid or authorized data item to another party in the system. It may also be required that such evidence be produced in a manner that does not disclose the data item itself, or that does not actually reveal any other information about the data item or the proving party, to generally preserve anonymity and user privacy. A common example is provided by cryptographic certificates. A cryptographic certificate is typically a cryptographic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/33
CPCH04L9/3221H04L2209/12H04L2209/42H04L9/3073
Inventor J·卡梅尼施C·索里恩特
Owner INT BUSINESS MASCH CORP