Secret-key certificates

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 930

Patent

active

056066171

ABSTRACT:
Cryptographic methods and apparatus are disclosed that enable forming and issuing of secret-key certificates. Contrary to the well-known cryptographic technique of public-key certificates, where a public-key certificate is a digital signature of a certification authority on a public key, pairs consisting of a public key and a corresponding secret-key certificate can be generated by anyone. As a result, a public-key directory based on secret-key certificates cannot help anyone in attacking the signature scheme of the certification authority, and it does not reveal which of the listed public keys have been certified by the certification authority and which have not.
Yet, if a party associated with a public key can perform cryptographic actions with the secret key corresponding to its public key, such as decrypting, digital signing, issuing a secret-key certificate, and identification, then the certificate must have been computed by the certification authority.

REFERENCES:
patent: 4759063 (1988-07-01), Chaum
patent: 4868877 (1989-09-01), Fischer
patent: 4947430 (1990-08-01), Chaum
patent: 5005200 (1991-04-01), Fischer
patent: 5373561 (1994-12-01), Haber et al.
patent: 5475753 (1995-12-01), Barbara et al.
Fiat, A. and Shamir, A., "How to prove yourself: practical solutions to identification and signature problems," Crypto '86, Springer-Verlag (1987), pp. 186-194.
Schnorr, C., "Efficient Signature Generation by Smart Cards," Journal of Cryptology, vol. 4, No. 3 (1991), pp. 161-174.
ElGamal, T., "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. IT-31, No. 4, Jul. 1985, pp. 469-472.
Okamoto, T., "Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes," Crypto '92, Lecture Notes in Computer Science 740, Springer-Verlag (1993), pp. 31-53.
Brickell, E. and McCurley, K., "An interactive identification scheme based on discrete logarithms and factoring," Journal of Cryptology, vol. 5, No. 1 (1992), pp. 29-39.
NIST, "Specifications for a digital signature standard (DSS)," Federal Information Processing Standards Pub. (draft), May 19, 1994.
R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Feb. 1978, pp. 120-126.
Guillou, L. and Quisquater, J., "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Lecture Notes in Computer Science 330, Proceedings of Eurocrypt '88, Springer-Verlag (1989), pp. 123-128.
Feige, U., Fiat, A. and Shamir, A., "Zero-knowledge proofs of identity," Journal of Cryptology 1 (1988), pp. 77-94.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secret-key certificates does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secret-key certificates, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret-key certificates will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1979744

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.