Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36 results about "Provable security" patented technology

Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers to mathematical proofs, which are common in cryptography. In such a proof, the capabilities of the attacker are defined by an adversarial model (also referred to as attacker model): the aim of the proof is to show that the attacker must solve the underlying hard problem in order to break the security of the modelled system. Such a proof generally does not consider side-channel attacks or other implementation-specific attacks, because they are usually impossible to model without implementing the system (and thus, the proof only applies to this implementation).

SM2 algorithm collaborative signature and decryption method, device and system

The invention discloses a SM2 algorithm collaborative signature and decryption method, device and system. The collaborative signature method comprises the following steps: computing a first elliptic curve group element set and sending the a server-side to check; checking a second elliptic curve group element set fed back by the server-side, and computing a third elliptical curve group element based on the first elliptic curve group element set and the second elliptic curve group element set; computing a first numerical value according to a user information hash value, a to-be-signed message and an abscissa of the third elliptical curve group element; generating a second numerical value according to the first numerical value, the first random number and a client private key component, and sending the second numerical value to the server-side; receiving a third numerical value computed according to the second numerical value, the second random number and the server-side private key component; and synthesizing as a SM2 digital signature according to the first numerical value and the third numerical value. The method disclosed by the invention has features of verification input and provable security, more conforms to the actual application environment, and can protect the user privacy better.
Owner:深圳市电子商务安全证书管理有限公司

Equipment area provable security verification method with resistance to collusion attack

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.
Owner:XIDIAN UNIV

Hybrid secure communication method for key data quantum encryption

The invention discloses a hybrid secure communication method and system for key data quantum encryption and a storage medium, and the method comprises the steps: segmenting data in a communication service data stream according to different security levels through data analysis and discrimination or manual recognition and calibration; a quantum secret communication system in a'one-time pad 'working mode is used for transmitting data fragments calibrated as'security switching', a common communication system is used for transmitting other data fragments, and original communication service data flow is restored through fragment recombination. The hybrid secure communication method is compatible with other various technical schemes for improving the quantum secure communication rate from a physical layer, the rate pressure faced by the physical layer can be partially shared by an application layer, and meaningless calling of non-switching data on quantum keys is avoided through communication service data stream preprocessing. The maximum utilization of the quantum secure communication bandwidth is realized on the premise that key data has mathematically provable security, and an important support can be provided for a practical quantum secure communication network.
Owner:军事科学院系统工程研究院网络信息研究所

Authentication key negotiation method and system against continuous leakage

The invention discloses an authentication key negotiation method and system against continuous leakage. The system is composed of two users, respectively a session initiator and a responder; and eachuser has a pair of public and private keys. The method in the invention first performs system initialization and then performs a first interaction, and the session initiator sends a message parameterto the responder; then a second interaction is carried out, and the session responder responds to the initiator with the message parameter; finally, the session initiator and the responder authenticate key negotiation, update own private keys and generate a common communication key. The authentication key negotiation method and system against continuous leakage in the invention are particularly suitable for the secure communication of both parties, are high in security as having achieved cryptographically provable security, and is high in practicability as being able to execute safely and stably still in a continuous leakage environment; and in combination with an elliptic curve and bilinear pairing technology, a session key authentication negotiation protocol against continuous leakage isproposed, and the scheme efficiency is high.
Owner:HUBEI UNIV OF TECH

Device area provable security verification method against collusion attack

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products