Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

58 results about "Key encapsulation" patented technology

Key encapsulation mechanisms (KEMs) are a class of encryption techniques designed to secure symmetric cryptographic key material for transmission using asymmetric (public-key) algorithms. In practice, public key systems are clumsy to use in transmitting long messages. Instead they are often used to exchange symmetric keys, which are relatively short. The symmetric key is then used to encrypt the longer message.

Cloud data duplication elimination and integrity auditing method based on convergence encryption

The invention discloses a cloud data duplication elimination and integrity auditing method based on convergence encryption. According to the method, through adoption of a convergence key encapsulation / de-encapsulation algorithm based on blind signatures, convergence keys can be securely stored and moreover convergence key duplication elimination can be realized; and through utilization of a BLS signature algorithm based on the convergence keys, auditing public keys are stored by a trusted third party TTP, the TTP carries out proxy auditing, and duplication elimination of auditing signatures and the auditing public keys is realized. The method comprises the specific steps of carrying out system initialization; carrying out key initialization; carrying out file initialization; carrying out authentication evidence initialization; carrying out key encapsulation; carrying out data storage; carrying out duplication challenge; carrying out duplication response; carrying out duplication authentication; carrying out request auditing; carrying out proxy auditing; carrying out auditing response; carrying out auditing authentication; and carrying out file downloading. According to the method,a utilization rate of a cloud storage space is improved, the duplication elimination of auditing signatures and the auditing public keys is realized, and the storage and computing cost of a client arereduced.
Owner:NANJING UNIV OF SCI & TECH

Method for remotely issuing POS key

The present invention discloses a method for remotely issuing a POS key, comprising the following steps in sequence: S1. a POS terminal uploads a request to acquire a public key to a management platform, and the management platform issues the public key to a POS machine; S2. the POS machine generates a transmission key at random, encrypts same using the public key, and uploads same to the management platform, and the management platform decrypts and verifies same using a private key; S3. after the transmission key passes validation, the management platform decrypts same to obtain transmission key plaintext, encrypts a master key using the transmission key plaintext, and returns same to the POS terminal; and S4. after decrypting same, the POS terminal encapsulates the master key in the machine, and notifies the platform of key encapsulation success. By means of the method for remotely issuing a POS key disclosed by the present invention, key encapsulation can be performed on each POS machine through a mechanism requested by a customer without performing key encapsulation on each POS machine by the manufacturer before it leaves the factory or by the merchant before delivery, thereby greatly saving time costs of key encapsulation.
Owner:宁夏丝路通网络支付有限公司北京分公司

Key exchange system, key exchange method, key exchange device, control method thereof, and recording medium for storing control program

A key exchange device includes an initial setup unit that generates a verification key that serves as a public key and a signature key based on a discretionary random tape, a session identifier based on a first random tape, and a secret key based on a second random tape; an arithmetic unit that generates an encrypted second random tape by an arithmetic operation of a pseudo-random function having the second random tape and the secret key as variables and an encrypted third random tape by an arithmetic operation of the pseudo-random function having a third random tape and the secret key as variables; a key encapsulation processing unit that generates a key-encapsulated public key and a key-encapsulated secret key based on the encrypted second random tape to transmit the key-encapsulated public key to an other party of key exchange and decrypts a session key using the key-encapsulated public key and a key-encapsulated ciphertext received from the other party of key exchange; and a verification processing unit that generates a signature based on the signature key, a transmission message and the encrypted third random tape, transmits the signature to the other party of key exchange and verifies a signature received from the other party of key exchange based on a verification key that is a public key of the other party of key exchange, a received message and the signature received.
Owner:NEC CORP

Distributed data security sharing method and system based on block chain, and computer readable medium

The invention discloses a distributed data security sharing method and system based on a block chain, and a computer readable medium. The method comprises the following steps: outputting a system master key pair and a user key pair; performing encryption; packaging and then uploading the system master key to the block chain; generating a conversion key by the master key agency storage node; converting the key calculation node to generate a new capsule; obtaining the master key ciphertext from the block chain by the data user and obtaining the system master key; obtaining an attribute private key; and obtaining the shared data ciphertext by the data user, inputting the attribute private key, and obtaining the plaintext through a decryption algorithm. According to the distributed data security sharing method and system based on the block chain, and the computer readable medium, key encapsulation of the master key is realized by using a distributed proxy key encapsulation mechanism, the problem of secure distribution and management of the master key in a block chain network is solved, the generation efficiency of the private key is improved, and the problems of safe distribution and management of the master key in the block chain network and the like in the prior art are solved.
Owner:YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS +1

Authentication key exchange method based on message recovery signature

The invention discloses an authentication key exchange method based on a message recovery signature, and mainly solves the problems of relatively large communication traffic and relatively weak security in an original scheme. The method comprises the following implementation steps: each user generates a digital signature public and private key pair; the first user generates a secret key packagingpublic and private key pair of the first user and signs and sends the secret key packaging public and private key pair; the second user verifies the signature sent by the first user; the second user encapsulates the key and generates a hash value of the session process; the second user signs the ciphertext and the Hash value of the session process and sends the ciphertext and the Hash value to thefirst user; the first user verifies the signature sent by the second user; the first user de-packages and verifies the hash value of the session process; and both parties calculate session keys. Theauthentication key exchange protocol is constructed through the digital signature with the message reply mode and the key packaging mechanism, the communication traffic is saved, the security of the protocol is improved, and the method can be used for the Internet of Vehicles and ground-air communication.
Owner:XIDIAN UNIV

Strong authentication method and system based on quantum symmetric key

The invention belongs to the technical field of quantum key distribution, and particularly relates to a strong authentication method and system based on a quantum symmetric key, and the method comprises the steps: obtaining a quantum key file, and carrying out the secret amplification of the quantum key file according to a poly1305 algorithm; packaging the obtained quantum key by using a key packaging algorithm and a user password; the sender performing decapsulation to obtain a quantum key and a plaintext, obtaining a message authentication code, a ciphertext and a unique value through a poly1305 algorithm, and transmitting the message authentication code, the ciphertext and the unique value to the receiver through a public network after packaging; and the receiver receiving the packagedmessage, unpacking the packaged message to obtain a ciphertext, a unique value and a received message identification code, calling a quantum key and a poly1305 algorithm to calculate to obtain a plaintext and a calculated message identification code, and comparing whether the calculated message identification code is the same as the received message identification code to identify the integrity ofthe message. Message integrity of users of two communication parties can be powerfully guaranteed, leakage of sensitive information is effectively prevented, decoding of a quantum computer is resisted, and information safety is ensured.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Data security transmission method and system for embedded AI chip on edge side of unmanned aerial vehicle

The invention provides a data security transmission method and system for the embedded AI chip on the edge side of the unmanned aerial vehicle. The first unique identifier corresponding to the embedded AI chip is generated through the embedded AI chip, the first unique identifier is encrypted to generate the identification string, and the encrypted identification string is sent to the server. And the server side obtains the program information of the embedded AI chip, generates a second unique identifier corresponding to the embedded AI chip, and compares the second unique identifier with the first unique identifier, if the comparison result is consistent, verification is passed, and the server side generates a dynamic 3DES encryption key and a dynamic 3DES decryption key, packages the dynamic 3DES encryption key and the dynamic 3DES decryption key into a response message and returns the response message to the embedded AI chip. Therefore, the embedded AI chip can subsequently encrypt or decrypt the data interacted with the server side by using the dynamic 3DES encryption key and the dynamic 3DES decryption key, so that the data interaction security between the unmanned aerial vehicle and the server side is improved.
Owner:广州中科智云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products