WO2005040975A3 - Identity-based-encryption system with district policy information - Google Patents

Identity-based-encryption system with district policy information Download PDF

Info

Publication number
WO2005040975A3
WO2005040975A3 PCT/US2004/031129 US2004031129W WO2005040975A3 WO 2005040975 A3 WO2005040975 A3 WO 2005040975A3 US 2004031129 W US2004031129 W US 2004031129W WO 2005040975 A3 WO2005040975 A3 WO 2005040975A3
Authority
WO
WIPO (PCT)
Prior art keywords
district
ibe
information
ibe private
private key
Prior art date
Application number
PCT/US2004/031129
Other languages
French (fr)
Other versions
WO2005040975A2 (en
Inventor
Terence Spies
Matthew J Pauker
Lucas C Ryan
Guido Appenzeller
Original Assignee
Voltage Security Inc
Terence Spies
Matthew J Pauker
Lucas C Ryan
Guido Appenzeller
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Voltage Security Inc, Terence Spies, Matthew J Pauker, Lucas C Ryan, Guido Appenzeller filed Critical Voltage Security Inc
Priority to EP04788925.8A priority Critical patent/EP1673890B1/en
Publication of WO2005040975A2 publication Critical patent/WO2005040975A2/en
Publication of WO2005040975A3 publication Critical patent/WO2005040975A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient over a communications network. IBE public key information may be used to encrypt messages and corresponding IBE private key information may be used to decrypt messages. The IBE private keys may be provided to message recipients by an IBE private key generator. The IBE private key generator and the recipients who obtain their IBE private keys from that generator form a district. District policy information may be provided by the IBE private key generator that specifies which encryption and communications protocols are used by the district. The district policy information may also specify which authentication protocols are used by the district and may set forth how content-based protocols are implemented. This information may be used by senders in sending messages to recipients.
PCT/US2004/031129 2003-10-17 2004-09-22 Identity-based-encryption system with district policy information WO2005040975A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP04788925.8A EP1673890B1 (en) 2003-10-17 2004-09-22 Identity-based-encryption system with district policy information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/688,019 2003-10-17
US10/688,019 US7103911B2 (en) 2003-10-17 2003-10-17 Identity-based-encryption system with district policy information

Publications (2)

Publication Number Publication Date
WO2005040975A2 WO2005040975A2 (en) 2005-05-06
WO2005040975A3 true WO2005040975A3 (en) 2006-01-12

Family

ID=34521082

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/031129 WO2005040975A2 (en) 2003-10-17 2004-09-22 Identity-based-encryption system with district policy information

Country Status (3)

Country Link
US (1) US7103911B2 (en)
EP (1) EP1673890B1 (en)
WO (1) WO2005040975A2 (en)

Families Citing this family (108)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7921450B1 (en) * 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
US7380138B2 (en) * 2003-04-23 2008-05-27 Hewlett-Packard Development Company, L.P. Cryptographic method and apparatus
DE602004001273T2 (en) * 2003-04-23 2007-05-31 Hewlett-Packard Development Co., L.P., Houston Method and device for identification-based encryption
US20050021973A1 (en) * 2003-04-23 2005-01-27 Liqun Chen Cryptographic method and apparatus
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US9240884B2 (en) * 2003-10-28 2016-01-19 Certicom Corp. Method and apparatus for verifiable generation of public keys
JP4059321B2 (en) * 2003-10-30 2008-03-12 インターナショナル・ビジネス・マシーンズ・コーポレーション Personal information management system, information processing system, personal information management method, program, and recording medium
US8176127B2 (en) * 2004-07-30 2012-05-08 Pivot Solutions, Inc. System and method for processing securities trading instructions and communicating order status via a messaging interface
WO2006034428A2 (en) * 2004-09-20 2006-03-30 Pgp Corporation Apparatus and method for identity-based encryption within a conventional public-key infrastructure
US20060129820A1 (en) * 2004-12-09 2006-06-15 International Business Machines Corporation Object oriented program communication system with an object for sending a certification of the existence of events justifying response actions
CN1262087C (en) * 2005-01-14 2006-06-28 南相浩 Method and apparatus for cipher key generation based on identification
US7804959B2 (en) * 2005-02-01 2010-09-28 Panasonic Corporation Digital cable television broadcasting receiver
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
US20060238304A1 (en) * 2005-04-21 2006-10-26 Sean Loving System and method for adapting an FRID tag reader to its environment
US7659819B2 (en) * 2005-04-21 2010-02-09 Skyetek, Inc. RFID reader operating system and associated architecture
US7826619B2 (en) * 2005-08-23 2010-11-02 Ntt Docomo, Inc. Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device
US20070206786A1 (en) * 2005-08-31 2007-09-06 Skyetek, Inc. Rfid security system
US20070071243A1 (en) * 2005-09-23 2007-03-29 Microsoft Corporation Key validation service
US20070206797A1 (en) * 2006-03-01 2007-09-06 Skyetek, Inc. Seamless rfid tag security system
US8510204B2 (en) * 2006-02-02 2013-08-13 Privatemarkets, Inc. System, method, and apparatus for trading in a decentralized market
US8412947B2 (en) * 2006-10-05 2013-04-02 Ceelox Patents, LLC System and method of secure encryption for electronic data transfer
US8200967B2 (en) * 2006-10-18 2012-06-12 Rockstar Bidco Lp Method of configuring a node, related node and configuration server
US20080141372A1 (en) * 2006-12-12 2008-06-12 Privacy Networks, Inc. Electronic Data Integrity Checking and Validation
US8627211B2 (en) 2007-03-30 2014-01-07 Uranus International Limited Method, apparatus, system, medium, and signals for supporting pointer display in a multiple-party communication
US7765261B2 (en) * 2007-03-30 2010-07-27 Uranus International Limited Method, apparatus, system, medium and signals for supporting a multiple-party communication on a plurality of computer servers
US7765266B2 (en) 2007-03-30 2010-07-27 Uranus International Limited Method, apparatus, system, medium, and signals for publishing content created during a communication
US8060887B2 (en) 2007-03-30 2011-11-15 Uranus International Limited Method, apparatus, system, and medium for supporting multiple-party communications
US8702505B2 (en) 2007-03-30 2014-04-22 Uranus International Limited Method, apparatus, system, medium, and signals for supporting game piece movement in a multiple-party communication
US7950046B2 (en) 2007-03-30 2011-05-24 Uranus International Limited Method, apparatus, system, medium, and signals for intercepting a multiple-party communication
US20080263361A1 (en) * 2007-04-20 2008-10-23 Microsoft Corporation Cryptographically strong key derivation using password, audio-visual and mental means
KR101490687B1 (en) * 2007-08-20 2015-02-06 삼성전자주식회사 Method and apparatus for sharing secret information between devices in home network
US8700894B2 (en) * 2007-10-17 2014-04-15 Pitney Bowes Inc. Method and system for securing routing information of a communication using identity-based encryption scheme
US8656177B2 (en) * 2008-06-23 2014-02-18 Voltage Security, Inc. Identity-based-encryption system
US20090327735A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Unidirectional multi-use proxy re-signature process
US20110131409A1 (en) * 2008-08-14 2011-06-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US8850044B2 (en) 2008-08-14 2014-09-30 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
US20100318595A1 (en) * 2008-08-14 2010-12-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for conditionally transmitting one or more locum tenentes
US20110093806A1 (en) * 2008-08-14 2011-04-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US20110110518A1 (en) * 2008-08-14 2011-05-12 Searete Llc Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US9659188B2 (en) * 2008-08-14 2017-05-23 Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
US8224907B2 (en) * 2008-08-14 2012-07-17 The Invention Science Fund I, Llc System and method for transmitting illusory identification characteristics
US20110041185A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US20110166973A1 (en) * 2008-08-14 2011-07-07 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US8730836B2 (en) * 2008-08-14 2014-05-20 The Invention Science Fund I, Llc Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US8929208B2 (en) * 2008-08-14 2015-01-06 The Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US8583553B2 (en) * 2008-08-14 2013-11-12 The Invention Science Fund I, Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US20110161217A1 (en) * 2008-08-14 2011-06-30 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US20110166972A1 (en) * 2008-08-14 2011-07-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US8626848B2 (en) * 2008-08-14 2014-01-07 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity
US20110107427A1 (en) * 2008-08-14 2011-05-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US20100042667A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory identification characteristics
US9641537B2 (en) * 2008-08-14 2017-05-02 Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20100039218A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory and non-illusory identification characteristics
US20100043049A1 (en) * 2008-08-15 2010-02-18 Carter Stephen R Identity and policy enabled collaboration
US8260865B2 (en) 2008-09-30 2012-09-04 Pivot Solutions, Inc. System and method for processing instant messages
US8510558B2 (en) 2009-02-17 2013-08-13 Alcatel Lucent Identity based authenticated key agreement protocol
US20100215033A1 (en) * 2009-02-20 2010-08-26 Avaya Inc. Preferential routing of secured calls
US8837718B2 (en) * 2009-03-27 2014-09-16 Microsoft Corporation User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
US8510835B1 (en) 2009-09-18 2013-08-13 Trend Micro Incorporated Techniques for protecting data in cloud computing environments
US8826013B1 (en) 2009-09-23 2014-09-02 Trend Micro Incorporated Protection of customer data in cloud virtual machines using a central management server
US8488783B2 (en) * 2010-02-19 2013-07-16 Nokia Method and apparatus for applying recipient criteria in identity-based encryption
US9025767B2 (en) * 2010-03-24 2015-05-05 Nokia Corporation Method and apparatus for querying content protected by identity-based encryption
US8423764B2 (en) * 2010-06-23 2013-04-16 Motorola Solutions, Inc. Method and apparatus for key revocation in an attribute-based encryption scheme
US8631460B2 (en) * 2011-03-23 2014-01-14 CipherPoint Software, Inc. Systems and methods for implementing transparent encryption
TWI444030B (en) 2011-06-21 2014-07-01 Univ Nat Chiao Tung Method for keys generation, member authentication and security communication in a dynamic group
US8892875B1 (en) 2011-07-29 2014-11-18 Trend Micro Incorporated Methods and apparatus for controlling access to encrypted computer files
CN102307096B (en) * 2011-08-26 2013-10-16 武汉理工大学 Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm
EP2761804B1 (en) 2011-09-30 2019-07-24 eBay Inc. Differential client-side encryption of information originating from a client
CN107959732B (en) * 2011-11-11 2021-08-27 柏思科技有限公司 Method and system for allowing domain name to be used in enforcing network policy
US9065637B2 (en) * 2012-01-25 2015-06-23 CertiVox Ltd. System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
JP2013198123A (en) * 2012-03-22 2013-09-30 Toshiba Corp Access control system
KR101301609B1 (en) * 2012-05-31 2013-08-29 서울대학교산학협력단 Apparatus and method for generating secret key, and recording medium storing program for executing method of the same in computer
US8959337B2 (en) 2012-06-25 2015-02-17 International Business Machines Corporation Digital certificate issuer-correlated digital signature verification
US9143383B2 (en) * 2012-11-01 2015-09-22 Miiicasa Taiwan Inc. Method and system for managing device identification
US8763085B1 (en) 2012-12-19 2014-06-24 Trend Micro Incorporated Protection of remotely managed virtual machines
CN103078743B (en) * 2013-01-15 2015-07-08 武汉理工大学 E-mail IBE (Internet Booking Engine) encryption realizing method
US9020151B1 (en) 2013-03-04 2015-04-28 Trend Micro Incorporated Secure real-time data replication with disk encryption and key management system
IN2013CH01202A (en) * 2013-03-20 2015-08-14 Infosys Ltd
US10666771B2 (en) 2013-08-05 2020-05-26 Pismo Labs Technology Limited Method and system for allowing the use of domain name based network policies stored in a second device in enforcing network policy at a first device
US9197419B1 (en) 2013-10-14 2015-11-24 Trend Micro Incorporated Security system for data stored in the cloud
US9275242B1 (en) 2013-10-14 2016-03-01 Trend Micro Incorporated Security system for cloud-based emails
US10631162B2 (en) * 2013-10-30 2020-04-21 Samsung Electronics Co., Ltd. Method and apparatus to perform device to device communication in wireless communication network
CN104065483B (en) * 2014-06-06 2017-05-10 武汉理工大学 Identity-based cryptograph (IBC) classified using method of electronic communication identities
US9923719B2 (en) * 2014-12-09 2018-03-20 Cryptography Research, Inc. Location aware cryptography
JP2018518854A (en) * 2015-03-16 2018-07-12 コンヴィーダ ワイヤレス, エルエルシー End-to-end authentication at the service layer using a public key mechanism
CN104869000B (en) * 2015-05-18 2018-02-23 深圳奥联信息安全技术有限公司 One kind is based on the cross-domain safety communicating method of id password and system
CN107592281B (en) 2016-07-06 2022-04-05 华为技术有限公司 Protection system, method and device for transmission data
US11463267B2 (en) * 2016-09-08 2022-10-04 Nec Corporation Network function virtualization system and verifying method
US10636089B2 (en) 2016-09-30 2020-04-28 Chicago Mercantile Exchange Inc. Context based messaging
US11551208B2 (en) 2018-10-04 2023-01-10 Verifone, Inc. Systems and methods for point-to-point encryption compliance
US11128454B2 (en) 2019-05-30 2021-09-21 Bong Mann Kim Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange
CN113347211B (en) * 2021-08-04 2021-11-23 北京微芯感知科技有限公司 Identity hierarchical encryption method, device, system, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030081785A1 (en) * 2001-08-13 2003-05-01 Dan Boneh Systems and methods for identity-based encryption and related cryptographic techniques
US20030115448A1 (en) * 2001-10-29 2003-06-19 Thaddeus Bouchard Methods and apparatus for securely communicating a message
US20030182554A1 (en) * 2002-03-21 2003-09-25 Gentry Craig B. Authenticated ID-based cryptosystem with no key escrow
US20030179885A1 (en) * 2002-03-21 2003-09-25 Docomo Communications Laboratories Usa, Inc. Hierarchical identity-based encryption and signature schemes

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3789769T2 (en) 1986-07-31 1994-08-11 Advance Kk SYSTEM FOR GENERATING A COMMON SECRETARY KEY AND COMMUNICATION SYSTEM USING THE COMMON SECRET KEY.
US5272755A (en) 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5159632A (en) 1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US5271061A (en) 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US6061448A (en) 1997-04-01 2000-05-09 Tumbleweed Communications Corp. Method and system for dynamic server document encryption
US8972717B2 (en) * 2000-06-15 2015-03-03 Zixcorp Systems, Inc. Automatic delivery selection for electronic content
US6970562B2 (en) 2000-12-19 2005-11-29 Tricipher, Inc. System and method for crypto-key generation and use in cryptosystem
GB2370471B (en) 2000-12-20 2004-06-23 Director Government Comm Headq Directoryless Public Key Cryptographic System and Method
US20030120733A1 (en) * 2001-12-21 2003-06-26 Forman George H. Email system that allows sender to check recipient's status before sending an email to the recipient
US20030204722A1 (en) * 2002-04-26 2003-10-30 Isadore Schoen Instant messaging apparatus and method with instant messaging secure policy certificates
US20030017985A1 (en) 2002-07-02 2003-01-23 Taylor Gregory Alan Molecules that influence pathogen resistance
GB0221639D0 (en) * 2002-09-17 2002-10-30 Hewlett Packard Co Method and apparatus for printing
US7467183B2 (en) * 2003-02-14 2008-12-16 Microsoft Corporation Method, apparatus, and user interface for managing electronic mail and alert messages
US7200637B2 (en) * 2003-07-16 2007-04-03 Thomas John Klos System for processing electronic mail messages with specially encoded addresses

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030081785A1 (en) * 2001-08-13 2003-05-01 Dan Boneh Systems and methods for identity-based encryption and related cryptographic techniques
US20030115448A1 (en) * 2001-10-29 2003-06-19 Thaddeus Bouchard Methods and apparatus for securely communicating a message
US20030182554A1 (en) * 2002-03-21 2003-09-25 Gentry Craig B. Authenticated ID-based cryptosystem with no key escrow
US20030179885A1 (en) * 2002-03-21 2003-09-25 Docomo Communications Laboratories Usa, Inc. Hierarchical identity-based encryption and signature schemes

Also Published As

Publication number Publication date
WO2005040975A2 (en) 2005-05-06
EP1673890B1 (en) 2013-08-21
US20050084100A1 (en) 2005-04-21
EP1673890A4 (en) 2010-12-29
US7103911B2 (en) 2006-09-05
EP1673890A2 (en) 2006-06-28

Similar Documents

Publication Publication Date Title
WO2005040975A3 (en) Identity-based-encryption system with district policy information
WO2005010732A3 (en) Identity-based-encryption messaging system
WO2005001629A3 (en) Encryption system with public parameter host servers
WO2005065141A3 (en) Identity-based-encryption message management system
WO2006007601A3 (en) Secure messaging system with derived keys
WO2007088337A3 (en) Kem-dem encrpyted electronic data communication system
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
WO2004047352A3 (en) Identity-based encryption system
GB2444445B (en) Secure data transmission
EP2429116A3 (en) Systems and methods for identity-based encryption and related crytographic techniques
WO2004063871A3 (en) System and method for secure electronic communication in a partially keyless environment
WO2001091403A3 (en) Secured electronic mail system and method
WO2008003579A3 (en) Method and program product for securing privacy of an e-mail address in an e-mail
WO2008061344A8 (en) System and method for secure electronic communication services
WO2004049137A3 (en) Secure key server with nonrepudiation and audit
WO2004100496A3 (en) Ends - messaging protocol that recovers and has backward security
ATE362259T1 (en) SECURE DOCUMENT DELIVERY SYSTEM
CN101594226A (en) The data guard method and the system that are used for file transfer
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN
WO2001084766A3 (en) System and method for encryption using transparent keys
CN102740239A (en) Method and system for secure transmission of media information
CN109600374A (en) Secure user data sending method and its system based on block chain
CN111049738A (en) E-mail data security protection method based on hybrid encryption
Han et al. Signcryption based on elliptic curve and its multi-party schemes
CN102523563A (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2004788925

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2004788925

Country of ref document: EP