Unlock instant, AI-driven research and patent intelligence for your innovation.

Extensible false name certificate system and method

A technology called certificate and certificate, applied in the field of computer communication network security, can solve the problems of invalidity, conflicting user privacy concerns, and low efficiency.

Inactive Publication Date: 2007-03-28
NEC (CHINA) CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this contradicts user privacy concerns
Not only that, asking friends to authenticate public keys is not only inefficient and potentially invalid, but also unreliable in many business situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extensible false name certificate system and method
  • Extensible false name certificate system and method
  • Extensible false name certificate system and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0134] In the following description, a first embodiment according to the present invention will be described with reference to FIGS. 9 to 18 .

[0135] Fig. 9 is a block diagram schematically showing the system architecture of the first embodiment of the present invention.

[0136] According to a first embodiment, the trusted entity is a certification authority, CA. The data of user U to be verified by the verifier is user U's anonymous public key.

[0137] Assuming that U has passed the personal identity verification, the CA issues a root certificate (RC) to U. From this root certificate, U generates a pseudonym certificate for his / her anonymous public key. Then, U sends the anonymous public key (APK1, APK2, APK3...) equipped with the pseudonym certificate (PC1, PC2, PC3...) to the verifier V (V1, V2, V3...). V verifies the pseudonymous certificate received from U and accepts the certificate if predetermined conditions are met.

[0138] In the first embodiment, U can deri...

no. 2 example

[0210] In the following description, a second embodiment according to the present invention will be described with reference to FIGS. 19 to 24 .

[0211] A second embodiment of the present invention utilizes a group signature scheme to generate pseudonymous certificates of public keys. Here, the public key may be a noncomparable public key, an anonymous public key, or any other public key of the user.

[0212] Group signature schemes have been well studied over the past 15 years (see D. Chaum, E. van Heyst, Group Signatures, Advances in Cryptology - EUROCRYPTO'91, pp. 257-265, 1991; J. Camenisch, M. Michels, A Group Signature Scheme Based on an RSA-Variant, Advances in Cryptology-ASIACRYPT'98, pp.160-174, 1998; and G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A Practical and Provably Secure Coalition - Resistant Group Signature Scheme, Advances in Cryptology-CRYPTO'2000, pp. 255-270, 2000, which are hereby incorporated by reference). Briefly, there is a group manager, whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a real case, a user obtained a root evidence from the confided entity, generated one or more fake-name certifications based on the root evidence, equipped them with anonymity common keys of fake-name certifications and sent them to many certifier. The certifier by the fake-name certifications believed that user's anonymity common keys were authenticated by the confided entity. The fake-name certification does not include the info about the user's real status. With the aid of extendable fake-name certification system, the confided entity only needs to authenticate once against the user's root common key. The user may generate a great number of fake-name common keys. Each of them equips with a different fake-name certification.

Description

technical field [0001] The present invention generally relates to computer communication network security, and more particularly, relates to communication system privacy protection. Background technique [0002] Currently, public key cryptography is widely used. A number of public key cryptography encoding and decoding techniques are generally readily available to provide some degree of security as well as privacy. For example, U.S. Patent No. 4,405,829 and El Gamal (Tahir ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, Advances in Cryptology Proceedings; CRYPTO 84, pages 10-18, 1985) authorized to Rivest et al. well-known techniques in the art. The Rivest patent and the teachings of El Gamal are incorporated herein by reference. [0003] With traditional public key cryptosystems such as RSA and El Gamal, in order to communicate securely with other parties, a user needs to disclose his / her public key to the outside world. However, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3263H04L9/302H04L9/3255H04L2209/42H04L9/0836H04L9/3218H04L9/3294H04L9/30H04L9/00
Inventor 曾珂藤田友之薛敏宇
Owner NEC (CHINA) CO LTD