[go: up one dir, main page]

Verheul, 2021 - Google Patents

SECDSA: Mobile signing and authentication under classical``sole control''

Verheul, 2021

View PDF
Document ID
7102083320974159828
Author
Verheul E
Publication year
Publication venue
Cryptology ePrint Archive

External Links

Snippet

The 2014 European eIDAS regulation regulates strong electronic authentication and legally binding electronic signatures. Both require user" sole control". Historically smartcards are used based on direct interaction between user and relying party. Here sole control is …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
US8464058B1 (en) Password-based cryptographic method and apparatus
US9853816B2 (en) Credential validation
US9185111B2 (en) Cryptographic authentication techniques for mobile devices
US6189098B1 (en) Client/server protocol for proving authenticity
US7139917B2 (en) Systems, methods and software for remote password authentication using multiple servers
US8775794B2 (en) System and method for end to end encryption
Boneh et al. Fine-grained control of security capabilities
US8724819B2 (en) Credential provisioning
US8589693B2 (en) Method for two step digital signature
US8213608B2 (en) Roaming utilizing an asymmetric key pair
US10057071B2 (en) Component for connecting to a data bus, and methods for implementing a cryptographic functionality in such a component
CN107810617A (en) Secret certification and supply
KR20070104939A (en) Small public-key based digital signature for authentication
CN104821933A (en) Device and method certificate generation
EP4208982B1 (en) Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge
CN112910627B (en) Key update method, data decryption method, digital signature verification method
Djellali et al. User authentication scheme preserving anonymity for ubiquitous devices
Braeken PUF‐Based Authentication and Key Exchange for Internet of Things
EP3185504A1 (en) Security management system for securing a communication between a remote server and an electronic device
Verheul SECDSA: Mobile signing and authentication under classical``sole control''
TWI381696B (en) Authentication based on asymmetric cryptography utilizing rsa with personalized secret
KR100453113B1 (en) Method for producing and certificating id-based digital signature from decisional diffie-hellman groups
JPH11174957A (en) Authentication protocol
CN115314208A (en) Safe and controllable SM9 digital signature generation method and system
Surya et al. Single sign on mechanism using attribute based encryption in distributed computer networks