[go: up one dir, main page]

Matyas, 1991 - Google Patents

Key processing with control vectors

Matyas, 1991

View PDF
Document ID
1710250936539907537
Author
Matyas S
Publication year
Publication venue
Journal of Cryptology

External Links

Snippet

A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is …
Continue reading at link.springer.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Similar Documents

Publication Publication Date Title
US5265164A (en) Cryptographic facility environment backup/restore and replication in a public key cryptosystem
US5200999A (en) Public key cryptosystem key management based on control vectors
US6240184B1 (en) Password synchronization
EP0539726B1 (en) Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
US5073934A (en) Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
EP0529261B1 (en) A hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
US4218738A (en) Method for authenticating the identity of a user of an information system
US5109152A (en) Communication apparatus
US4203166A (en) Cryptographic file security for multiple domain networks
US5995624A (en) Bilateral authentication and information encryption token system and method
EP0531784B1 (en) Apparatus for encryption and decryption using split key
US6959086B2 (en) Cryptographic key management scheme
JP2746352B2 (en) Secure security communication system and method for communication by a remotely located computer
US5214698A (en) Method and apparatus for validating entry of cryptographic keys
Hazay et al. Constructions of truly practical secure protocols using standardsmartcards
WO1998045975A9 (en) Bilateral authentication and information encryption token system and method
WO2007103906A2 (en) Secure data transmission using undiscoverable or black data
TWI517653B (en) An electronic device and method for cryptographic material provisioning
CN110289946A (en) A kind of generation method and block chain node device of block chain wallet localization file
MacKenzie et al. Delegation of cryptographic servers for capture-resilient devices
Cachin et al. A secure cryptographic token interface
Matyas Key processing with control vectors
US6144744A (en) Method and apparatus for the secure transfer of objects between cryptographic processors
Matyas Key handling with control vectors
Riva et al. Seahorse: Efficiently Mixing Encrypted and Normal Transactions