Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34 results about "Key revocation" patented technology

Key revocation is the manner in which PGP public keys are permanently retired. It is suggested that a key revocation certificate should be generated as soon as the key pair is created. This certificate should be held by a trusted third party, exactly as the key-escrow facility described above.

Systems and methods for identity-based encryption and related cryptographic techniques

A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s. After obtaining the private decryption key from the key generator [120], the receiver [110] uses it together with the element rP and the bilinear map to compute the secret message key gIDr, which is then used to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
Owner:THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIV +1

Systems and methods for identity-based encryption and related cryptographic techniques

A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s. After obtaining the private decryption key from the key generator [120], the receiver [110] uses it together with the element rP and the bilinear map to compute the secret message key gIDr, which is then used to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
Owner:UNIV OF CALIFORNIA DAVIS +1

Attribute encryption method based on multi-linear mapping and achieving strategy of secret key revocation in an authority separating way

The invention discloses an attribute encryption method based on multi-linear mapping and achieving a strategy of secret key revocation in an authority separating way, which is provided for single attribute revocation of a user. The user can finish a decryption process only when a cryptograph attribute set satisfies the secret key strategy of the user. Specifically, an authority center makes subordinate authorities. Each subordinate authority commands a main secret key of its own and participates in a public parameter establishing process. An assess strategy is converted into an access structure according to a linear secret sharing algorithm. User private keys under corresponding access structures are generated. According to the attribute set and a known revocation list, information encryption is performed. Whether the user is in the revocation list is further judged. A decryption process is finished. In consideration of known private keys and users, a tracking algorithm is established to judge the relevance of users and private keys. By means of the method provided in the invention, the problem that all attributes of non-users are canceled during a single user attribute revocation process is solved. The relevance of users and private keys is verified. The scheme operation efficiency and the overall safety can be improved. The scheme is enabled to resist quantum attacks.
Owner:深圳天通信息科技有限公司

Information service entity identity management system and quick identity revocation method

The invention discloses an information service entity identity management system and a quick identity revocation method, which can solve the problem of instant revocation of an entity identity. A keyrevocation module is added in an identity management system, and the key revocation module includes a security arbitration unit, which can quickly revoke the identity of an information service entitywhen services of the information service entity are invalid or illegal. The implementation of the quick revocation method includes the following steps that: system initialization is performed, and keygeneration and segmentation of the information service entity is performed; and the information service entity and the security arbitration unit cooperate with part of private keys to implement the signature of a message, and a verification server verifies the signature of the message to achieve the unified management and authentication of a network space information service entity identity. According to the scheme of the invention, the invalid or illegal identity can be quickly revoked, the computational security is based on the difficulty of solving discrete logarithms on elliptic curves, the characteristic of quick revocation can be realized, high security can also be achieved, and the scheme is suitable for network environments with high security requirements.
Owner:XIDIAN UNIV

Key updating method and device, multi-attribute authority management system, equipment and medium

The embodiment of the invention relates to a secret key updating method and device, a multi-attribute authority management system, equipment and a medium, wherein the method applied to a target attribute authority server comprises the steps of generating a new random secret key for a target attribute carried in an attribute authority revocation message when the attribute authority revocation message is received, and replacing the original random key of the target attribute; based on the new random key, the original random key and the identity information of the target user, obtaining current key update messages corresponding to attribute authority servers in the multi-attribute authority management system; and broadcasting the obtained current secret key updating message, wherein the current secret key updating message is used for indicating other user terminals in the multi-attribute authority management system to update the decryption private keys of the target attributes stored by the other user terminals respectively. According to the mode, the calculation overhead required by key revocation can be effectively reduced, and the security and reliability of key revocation can be fully guaranteed.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

General identifier representation method for identifier password updating and revoking

The invention provides a general identifier representation method for identifier password updating and revocation. The method comprises the following identification forms: identifier password identifier = body identifier + aging identifier + version number, time efficiency identifier = time slice level + time slice serial number, wherein the identifier password identifier is composed of the body identifier, the time efficiency identifier and the version number; the time efficiency identifier consists of the time slice level and the time slice serial number, and the time efficiency is used forperiodically updating the identifier; the version number is used for revoking the identifier in the validity period, and the version number is accumulated from 0 to top; the time efficiency identifieradopts a form of an effective time slice grade and an effective time slice serial number, along with the improvement of the time slice level, the time length represented by the time slice is increased exponentially, and the time slices of all levels adopt the same starting time. According to the relation between secret key updating and secret key revocation in the identification password system,the characteristics of the layered identifier password system are combined, and secret key revocation comprises two parts of revocation when a secret key expires and active application revocation before the secret key expires.
Owner:湖南安方信息技术有限公司

Attribute Encryption Method Based on Reversible Partial Authoritative Key Strategy Based on Multilinear Mapping

The invention discloses an attribute encryption method based on multi-linear mapping and achieving a strategy of secret key revocation in an authority separating way, which is provided for single attribute revocation of a user. The user can finish a decryption process only when a cryptograph attribute set satisfies the secret key strategy of the user. Specifically, an authority center makes subordinate authorities. Each subordinate authority commands a main secret key of its own and participates in a public parameter establishing process. An assess strategy is converted into an access structure according to a linear secret sharing algorithm. User private keys under corresponding access structures are generated. According to the attribute set and a known revocation list, information encryption is performed. Whether the user is in the revocation list is further judged. A decryption process is finished. In consideration of known private keys and users, a tracking algorithm is established to judge the relevance of users and private keys. By means of the method provided in the invention, the problem that all attributes of non-users are canceled during a single user attribute revocation process is solved. The relevance of users and private keys is verified. The scheme operation efficiency and the overall safety can be improved. The scheme is enabled to resist quantum attacks.
Owner:深圳天通信息科技有限公司

Management system and method of intelligent power distribution terminal based on block chain

The invention discloses a block chain-based management system and method for intelligent power distribution terminals on the plant side For the blockchain network composed of nodes, perform terminal data recording and information modeling, establish an electronic key management mechanism, and realize public key data verification and data addition of intelligent power distribution terminals through the central management agency TA (Trust Authority). The smart contract is used to realize the public key registration, public key update and public key revocation of the smart power distribution terminal, so as to realize the three functions of the first access, function upgrade and failure exit of the smart power distribution terminal. The invention constructs a block chain-based key management framework for the intelligent power distribution terminal at the plant site, which can realize the automatic access of the intelligent power distribution terminal at the plant site, and at the same time, through the decentralized block chain network, It can improve the information sharing efficiency of each management and control unit node and ensure the security of information transmission.
Owner:浙江八达电子仪表有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products