Matyas, 1991 - Google Patents
Key processing with control vectorsMatyas, 1991
View PDF- Document ID
- 1710250936539907537
- Author
- Matyas S
- Publication year
- Publication venue
- Journal of Cryptology
External Links
Snippet
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is …
- 238000000034 method 0 abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5265164A (en) | Cryptographic facility environment backup/restore and replication in a public key cryptosystem | |
| US5200999A (en) | Public key cryptosystem key management based on control vectors | |
| US6240184B1 (en) | Password synchronization | |
| EP0539726B1 (en) | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem | |
| US5073934A (en) | Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key | |
| EP0529261B1 (en) | A hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors | |
| US4218738A (en) | Method for authenticating the identity of a user of an information system | |
| US5109152A (en) | Communication apparatus | |
| US4203166A (en) | Cryptographic file security for multiple domain networks | |
| US5995624A (en) | Bilateral authentication and information encryption token system and method | |
| EP0531784B1 (en) | Apparatus for encryption and decryption using split key | |
| US6959086B2 (en) | Cryptographic key management scheme | |
| JP2746352B2 (en) | Secure security communication system and method for communication by a remotely located computer | |
| US5214698A (en) | Method and apparatus for validating entry of cryptographic keys | |
| Hazay et al. | Constructions of truly practical secure protocols using standardsmartcards | |
| WO1998045975A9 (en) | Bilateral authentication and information encryption token system and method | |
| WO2007103906A2 (en) | Secure data transmission using undiscoverable or black data | |
| TWI517653B (en) | An electronic device and method for cryptographic material provisioning | |
| CN110289946A (en) | A kind of generation method and block chain node device of block chain wallet localization file | |
| MacKenzie et al. | Delegation of cryptographic servers for capture-resilient devices | |
| Cachin et al. | A secure cryptographic token interface | |
| Matyas | Key processing with control vectors | |
| US6144744A (en) | Method and apparatus for the secure transfer of objects between cryptographic processors | |
| Matyas | Key handling with control vectors | |
| Riva et al. | Seahorse: Efficiently Mixing Encrypted and Normal Transactions |