Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Use of isogenies for design of cryptosystems

A computer and decryption key technology, which is applied in the field of cryptography and can solve problems such as the security of public key encryption systems.

Active Publication Date: 2005-05-11
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the security of current public-key encryption systems is pinned on the difficulty of a set of number-theoretic problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use of isogenies for design of cryptosystems
  • Use of isogenies for design of cryptosystems
  • Use of isogenies for design of cryptosystems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following discussion assumes that the reader is already familiar with cryptography. For a basic introduction to cryptography, readers are invited to read "Handbook of Applied Cryptography" written by A. Menezes, P. van Oorschot and S. Vanstone published by CRC Press, the fifth printing ( August 2001) original text.

[0023] The following disclosure describes techniques for improving public key systems based on multiple elliptic curves (or Abelian varieties in general). Various techniques are disclosed for generating homology (or mapping) between curves. The resulting same-origin permission uses multiple curves instead of a single curve to provide public encryption. Additionally, the technique can be applied to relatively short digital signatures (eg, typed in by the user or sent over a low-bandwidth channel) and / or identity-based encryption (IBE) solutions (eg, allowing storable public keys). Short signatures also provide additional efficiencies through total ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques for providing public key cryptography systems are revealed. More specifically, public key cryptography systems are provided using homologs of Abelian varieties (eg, elliptic curves in the one-dimensional case). For example, homology allows the use of multiple curves instead of a single curve to provide more secure encryption. The technology can be applied to digital signing and / or identity-based encryption (IBE) solutions. Additionally, same origins can be used in other applications such as blind signing, rating systems, etc. In addition, the solution for generating homology is revealed.

Description

[0001] related application [0002] This application claims priority to U.S. Provisional Patent Application No. 60 / 517,142, entitled "Use of Isogenies for Design of Cryptosystems," filed November 3, 2003, the contents of which are incorporated by reference at this. technical field [0003] The present invention relates generally to cryptography, and more particularly to the use of homology to design cryptographic systems. Background technique [0004] As digital communications become more common, the need to protect associated communication channels becomes increasingly important. For example, current technology allows users to remotely access bank account numbers, medical data, and other private and sensitive information. [0005] Cryptography is widely used to provide secure digital communications. Cryptography generally involves the encoding (or encryption) and decoding (or decryption) of messages. Encryption and decryption use certain confidential information (such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00G06F7/72H04L9/08H04L9/30H04L9/32
CPCG06F7/725H04L9/3257H04L9/3073H04L2209/80H04L9/30H04L9/08
Inventor D·Y·焦R·凡卡特杉
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products