[go: up one dir, main page]

GB0311730D0 - Cryptographic method and apparatus - Google Patents

Cryptographic method and apparatus

Info

Publication number
GB0311730D0
GB0311730D0 GB0311730A GB0311730A GB0311730D0 GB 0311730 D0 GB0311730 D0 GB 0311730D0 GB 0311730 A GB0311730 A GB 0311730A GB 0311730 A GB0311730 A GB 0311730A GB 0311730 D0 GB0311730 D0 GB 0311730D0
Authority
GB
United Kingdom
Prior art keywords
cryptographic method
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0311730A
Other versions
GB2401008A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Publication of GB0311730D0 publication Critical patent/GB0311730D0/en
Priority to US10/831,350 priority Critical patent/US7380138B2/en
Priority to GB0408892A priority patent/GB2401012B/en
Priority to US10/831,548 priority patent/US20050005100A1/en
Priority to GB0408903A priority patent/GB2401014B/en
Publication of GB2401008A publication Critical patent/GB2401008A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Storage Device Security (AREA)
GB0311730A 2003-04-23 2003-05-22 Identifier based encryption Withdrawn GB2401008A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10/831,350 US7380138B2 (en) 2003-04-23 2004-04-22 Cryptographic method and apparatus
GB0408892A GB2401012B (en) 2003-04-23 2004-04-22 Cryptographic method and apparatus
US10/831,548 US20050005100A1 (en) 2003-04-23 2004-04-22 Cryptographic method and system
GB0408903A GB2401014B (en) 2003-04-23 2004-04-22 Cryptographic method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0309161A GB0309161D0 (en) 2003-04-23 2003-04-23 Cryptographic method and apparatus

Publications (2)

Publication Number Publication Date
GB0311730D0 true GB0311730D0 (en) 2003-06-25
GB2401008A GB2401008A (en) 2004-10-27

Family

ID=9957120

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0309161A Ceased GB0309161D0 (en) 2003-04-23 2003-04-23 Cryptographic method and apparatus
GB0311730A Withdrawn GB2401008A (en) 2003-04-23 2003-05-22 Identifier based encryption

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB0309161A Ceased GB0309161D0 (en) 2003-04-23 2003-04-23 Cryptographic method and apparatus

Country Status (1)

Country Link
GB (2) GB0309161D0 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062045A (en) * 2019-12-17 2020-04-24 北京推想科技有限公司 Information encryption and decryption method and device, electronic equipment and storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100675836B1 (en) * 2004-12-10 2007-01-29 한국전자통신연구원 Authentication method for link security in EPON section
GB0514492D0 (en) 2005-07-14 2005-08-17 Ntnu Technology Transfer As Secure media streaming
FR2918830B1 (en) * 2007-07-13 2009-10-30 Viaccess Sa MAC CODE VERIFICATION WITHOUT REVELATION.

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2370471B (en) * 2000-12-20 2004-06-23 Director Government Comm Headq Directoryless Public Key Cryptographic System and Method
US7113594B2 (en) * 2001-08-13 2006-09-26 The Board Of Trustees Of The Leland Stanford University Systems and methods for identity-based encryption and related cryptographic techniques

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062045A (en) * 2019-12-17 2020-04-24 北京推想科技有限公司 Information encryption and decryption method and device, electronic equipment and storage medium
CN111062045B (en) * 2019-12-17 2022-11-15 推想医疗科技股份有限公司 Information encryption and decryption method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
GB2401008A (en) 2004-10-27
GB0309161D0 (en) 2003-05-28

Similar Documents

Publication Publication Date Title
GB2401012B (en) Cryptographic method and apparatus
GB0403082D0 (en) Apparatus and method
EP1627319A4 (en) Authenticating method and apparatus
GB2401013B (en) Cryptographic method and apparatus
GB2415579B (en) Cryptographic method and apparatus
GB0326118D0 (en) Apparatus and method
GB2413465B (en) Cryptographic method and apparatus
GB0309161D0 (en) Cryptographic method and apparatus
GB0305023D0 (en) Apparatus and method
GB0327981D0 (en) De-blistering apparatus and method
GB0309157D0 (en) Cryptographic method and apparatus
GB0313968D0 (en) De-Infestation method and apparatus
GB0315475D0 (en) Apparatus and method
GB0311049D0 (en) Apparatus and method
GB0311723D0 (en) Cryptographic method and apparatus
GB0328090D0 (en) Apparatus and method
GB0303973D0 (en) Method and apparatus
GB2415112B (en) Cryptographic method and apparatus
GB0407679D0 (en) Method and apparatus
GB0313439D0 (en) Apparatus and method
GB0317220D0 (en) Apparatus and method
GB0409069D0 (en) Cryptographic method and apparatus
GB0328929D0 (en) Method and apparatus
GB0305551D0 (en) Method and apparatus
GB0308030D0 (en) Apparatus and method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)