Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020070499 - PAIRING-BASED DIGITAL SIGNATURE WITH DESIGNATED VERIFIER SCHEME BASED PROVIDING NON REPUDIATION

Publication Number WO/2020/070499
Publication Date 09.04.2020
International Application No. PCT/GB2019/052790
International Filing Date 03.10.2019
IPC
H04L 9/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
08Key distribution
H04L 9/30 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
28using particular encryption algorithm
30Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
H04L 9/083
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
083involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
H04L 9/085
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
085Secret sharing or secret splitting, e.g. threshold schemes
H04L 9/088
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
H04L 9/3013
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
3006underlying computational problems or public-key parameters
3013involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
H04L 9/3073
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
3066involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
3073involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
H04L 9/3226
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3226using a predetermined code, e.g. password, passphrase or PIN
Applicants
  • OMLIS LIMITED [GB]/[GB]
Inventors
  • SCOTT, Michael
Agents
  • DEFINITION IP LIMITED
Priority Data
1816231.305.10.2018GB
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) PAIRING-BASED DIGITAL SIGNATURE WITH DESIGNATED VERIFIER SCHEME BASED PROVIDING NON REPUDIATION
(FR) SIGNATURE NUMÉRIQUE BASÉE SUR UN APPARIEMENT AVEC SCHÉMA DE VÉRIFICATEUR DÉSIGNÉ BASÉ SUR LA FOURNITURE D’UN NON-REFUS
Abstract
(EN)
A method of verifying a digital signature. The method comprises: generating, by a trusted authority, a first secret key and communicating the first secret key to a verifier; generating, by the trusted authority, a second secret key and communicating the second secret key to a signer; generating, by the signer, a digital signature with the second secret key and communicating the digital signature to the verifier, and verifying, by the verifier, the digital signature using the first secret key. The first secret key is a point sQ on an elliptic curve of a group G2, the second secret key is a point sA on the elliptic curve of a group G1, and G1 and G2 are groups of a bilinear map e: G1 x G2 -> GT associated with the elliptic curve, sis a random secret generated by the trusted authority, Q is a fixed public generator generated by the trusted authority, and A is a public key of the signer.
(FR)
La présente invention concerne un procédé de vérification d’une signature numérique. Le procédé comprend : la génération, par une autorité de confiance, d’une première clé secrète et la communication de la première clé secrète à un vérificateur ; la génération, par l’autorité de confiance, d’une seconde clé secrète et la communication de la seconde clé secrète à un signataire ; la génération, par le signataire, d’une signature numérique avec la seconde clé secrète et la communication de la signature numérique au vérificateur ; et la vérification, par le vérificateur, de la signature numérique à l’aide de la première clé secrète. La première clé secrète est un point sQ sur une courbe elliptique (CE) d’un groupe G2, la seconde clé secrète est un point sA sur la courbe elliptique d’un groupe G1, et G1 et G2 sont des groupes d’une carte bilinéaire e : G1 x G2 -> GT associée à la courbe elliptique, sis est un secret aléatoire généré par l’autorité de confiance, Q est un générateur public fixe généré par l’autorité de confiance et A est une clé publique du signataire.
Latest bibliographic data on file with the International Bureau