Method for the computer-assisted production of public keys...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000

Reexamination Certificate

active

07379550

ABSTRACT:
A method for generating public keys for encrypting messages includes encrypting a message using a public key. The first message is capable of being decrypted using a private key associated with a recipient, the private key matching the public key. The public key includes a first and second part, the first part being the same for all recipients of the encrypted messages. The second part of the public key is determined using data that uniquely indicates the recipient.

REFERENCES:
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5222140 (1993-06-01), Beller et al.
patent: 5615265 (1997-03-01), Coutrot
patent: 5638445 (1997-06-01), Spelman et al.
patent: 6230269 (2001-05-01), Spies et al.
patent: 6754820 (2004-06-01), Scheidt et al.
patent: 6970562 (2005-11-01), Sandhu et al.
patent: 7113594 (2006-09-01), Boneh et al.
patent: 2002/0153998 (2002-10-01), Litwin et al.
patent: 19619125 (1997-05-01), None
patent: 19956819 (2000-05-01), None
patent: 2344163 (2000-05-01), None
Chang et al., “A Strategy for Transforming Public-Key Cryptosystems into Identity-Based Cryptosystems,” Proceedings of the 25th Annual IEEE International Carnahan Conference on Security Technology, pp. 68-72, 1991.
Adi Shamir “Identity-Based Cryptosystems and Signature Schemes” Lecture Notes in Computer Science, 1985, pp. 47-53.
Chang et al. “A Strategy for Transforming Public-Key Cryptosystems into Identity-Based Cryptosystems” Institute of Computer Science and Information Engineering, 1991, pp. 68-72.
C. C. Chang et al., “A Strategy for Transforming Public-Key Cryptosystems into Identity-Based Cryptosystems”, 25thAnnual 1991 IEEE International Carnahan Conference on Security Technology, Oct. 1991, pp. 68-72.
Yuh-Min Tseng et al. “ID-based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System”, 14thAnnual Computer Security Applications Conference, 1998, pp. 237-243.
E. Okamoto et al., “Key Distribution System Based on Identification Information”, IEEE Journal on Selected Areas in Communication, vol. 7, May 1989, pp. 481-485.
L. Harn et al., “ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution”, IEEE Journal on Selected Areas in Communications, vol. 11, Jun. 1993, pp. 757-760.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for the computer-assisted production of public keys... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for the computer-assisted production of public keys..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for the computer-assisted production of public keys... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2797629

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.