[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

EP3132560A4 - A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security - Google Patents

A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security Download PDF

Info

Publication number
EP3132560A4
EP3132560A4 EP15780610.0A EP15780610A EP3132560A4 EP 3132560 A4 EP3132560 A4 EP 3132560A4 EP 15780610 A EP15780610 A EP 15780610A EP 3132560 A4 EP3132560 A4 EP 3132560A4
Authority
EP
European Patent Office
Prior art keywords
ecdsa
secure
elliptic curve
signature algorithm
distributed generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP15780610.0A
Other languages
German (de)
French (fr)
Other versions
EP3132560A1 (en
Inventor
Karim El Defrawy
Joshua D. LAMPKINS
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HRL Laboratories LLC
Original Assignee
HRL Laboratories LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HRL Laboratories LLC filed Critical HRL Laboratories LLC
Publication of EP3132560A1 publication Critical patent/EP3132560A1/en
Publication of EP3132560A4 publication Critical patent/EP3132560A4/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
EP15780610.0A 2014-04-17 2015-04-14 A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security Pending EP3132560A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461981191P 2014-04-17 2014-04-17
PCT/US2015/025804 WO2015160839A1 (en) 2014-04-17 2015-04-14 A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security

Publications (2)

Publication Number Publication Date
EP3132560A1 EP3132560A1 (en) 2017-02-22
EP3132560A4 true EP3132560A4 (en) 2017-12-20

Family

ID=54324506

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15780610.0A Pending EP3132560A4 (en) 2014-04-17 2015-04-14 A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security

Country Status (3)

Country Link
EP (1) EP3132560A4 (en)
CN (1) CN106664205B (en)
WO (1) WO2015160839A1 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9787472B1 (en) 2013-03-13 2017-10-10 Hrl Laboratories, Llc Information secure protocol for mobile proactive secret sharing with near-optimal resilience
EP3369207B1 (en) * 2015-10-29 2023-04-12 Hrl Laboratories, Llc An information secure protocol for mobile proactive secret sharing with near-optimal resilience
GB201707168D0 (en) 2017-05-05 2017-06-21 Nchain Holdings Ltd Computer-implemented system and method
US11671255B2 (en) 2017-08-15 2023-06-06 Nchain Licensing Ag Threshold digital signature method and system
CN110999207B (en) 2017-08-15 2024-05-31 区块链控股有限公司 Computer-implemented method of generating a threshold library
GB201720753D0 (en) * 2017-12-13 2018-01-24 Nchain Holdings Ltd Computer-implemented system and method
US11429956B2 (en) * 2017-12-15 2022-08-30 nChain Holdings Limited Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords
KR20200108343A (en) * 2018-01-16 2020-09-17 엔체인 홀딩스 리미티드 Computer-implemented method and system for obtaining digitally signed data
GB201817506D0 (en) 2018-03-02 2018-12-12 Nchain Holdings Ltd Computer implemented method and system
FR3085815B1 (en) * 2018-07-11 2022-07-15 Ledger SECURITY GOVERNANCE OF THE PROCESSING OF A DIGITAL REQUEST
US10887092B2 (en) * 2018-08-09 2021-01-05 Hrl Laboratories, Llc Anonymous allocation and majority voting in a compromised environment
EP3654578B1 (en) 2018-11-16 2022-04-06 SafeTech BV Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information
CN109728910A (en) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system
CN111435911B (en) * 2019-01-14 2023-02-17 海南自贸区图灵区块链科技有限公司 Online multi-party security data processing method and device
TWI689194B (en) * 2019-01-22 2020-03-21 開曼群島商現代財富控股有限公司 Threshold signature system based on secret sharing without dealer and method thereof
SG11202108123RA (en) * 2019-03-05 2021-08-30 Sepior Aps A method for providing a digital signature to a message
CN110278078B (en) * 2019-06-17 2022-03-22 矩阵元技术(深圳)有限公司 Data processing method, device and system
CN110674511A (en) * 2019-08-30 2020-01-10 深圳壹账通智能科技有限公司 Offline data protection method and system based on elliptic curve encryption algorithm
GB2603495A (en) * 2021-02-05 2022-08-10 Nchain Holdings Ltd Generating shared keys
CN113434886B (en) * 2021-07-01 2022-05-17 支付宝(杭州)信息技术有限公司 Method and device for jointly generating data tuples for secure computation

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7209555B2 (en) * 2001-10-25 2007-04-24 Matsushita Electric Industrial Co., Ltd. Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device
US8139770B2 (en) * 2003-12-23 2012-03-20 Wells Fargo Bank, N.A. Cryptographic key backup and escrow system
CN104283880A (en) * 2008-02-22 2015-01-14 安全第一公司 Systems and methods for secure workgroup management and communication
CN101710859B (en) * 2009-11-17 2014-02-12 深圳国微技术有限公司 Authentication key agreement method
EP2363976A1 (en) * 2010-02-25 2011-09-07 Certicom Corp. Improved digital signature and key agreement schemes
US8627091B2 (en) * 2011-04-01 2014-01-07 Cleversafe, Inc. Generating a secure signature utilizing a plurality of key shares
US9065637B2 (en) * 2012-01-25 2015-06-23 CertiVox Ltd. System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
US8745415B2 (en) * 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHARIKLEIA ZOURIDAKI ET AL: "Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography", 24 June 2004, PUBLIC KEY INFRASTRUCTURE; [LECTURE NOTES IN COMPUTER SCIENCE;;LNCS], SPRINGER-VERLAG, BERLIN/HEIDELBERG, PAGE(S) 232 - 245, ISBN: 978-3-540-22216-3, XP019007629 *
IBRAHIM M H ET AL: "A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme", MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS. CAIRO, EGYPT, DEC. 27 - 30, 2003; [MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS], PISCATAWAY, NJ, IEEE, US, vol. 1, 27 December 2003 (2003-12-27), pages 276 - 280, XP010867444, ISBN: 978-0-7803-8294-7, DOI: 10.1109/MWSCAS.2003.1562272 *
See also references of WO2015160839A1 *

Also Published As

Publication number Publication date
WO2015160839A1 (en) 2015-10-22
EP3132560A1 (en) 2017-02-22
CN106664205B (en) 2020-06-05
CN106664205A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
EP3132560A4 (en) A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security
EP3669488A4 (en) Secure hardware signature and related methods and applications
EP3191998A4 (en) Methods and systems for secure and reliable identity-based computing
EP3189617A4 (en) Sm3 hash algorithm acceleration processors, methods, systems, and instructions
SG11201700760TA (en) Methods for digitally signing an electronic file, and authenticating method
EP3155572A4 (en) Systems and methods for authenticating a user based on a computing device
EP3326099A4 (en) Technologies for secure hardware and software attestation for trusted i/o
EP3440587A4 (en) Signature authentications based on features
EP3207515A4 (en) Methods, apparatus and systems for securely authenticating a person depending on context
EP3163890A4 (en) Data output device, data output method, and data generation method
EP3163894A4 (en) Data output device, data output method, and data generation method
EP4234254A3 (en) Protecting data in memory of a consumable product
EP3141030A4 (en) Systems, methods and devices for flexible retransmissions
EP3080762A4 (en) Systems, apparatus and methods for improved authentication
EP3197121A4 (en) Information security realizing method and system based on digital certificate
EP3180751A4 (en) A system and method for digital authentication
EP3178212A4 (en) Method and system for authenticating a user
EP2776916A4 (en) Network-based revocation, compliance and keying of copy protection systems
EP3265943A4 (en) Authentication system and device including physical unclonable function and threshold cryptography
EP3295372A4 (en) Facial signature methods, systems and software
EP3124432A4 (en) Hydrogen generation system and hydrogen generation method
EP3343830A4 (en) Encryption system, homomorphic signature method, and homomorphic signature program
EP3345336A4 (en) Password generation with key and derivation parameter
EP3238115A4 (en) Technologies for authenticating a user of a computing device based on authentication context state
EP3178195A4 (en) Method and system for authenticating a user

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20161111

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20171117

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 9/08 20060101AFI20171113BHEP

Ipc: H04L 9/32 20060101ALI20171113BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20200220

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230525