Non malleable encryption method and apparatus using...

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C713S169000, C713S176000

Reexamination Certificate

active

06931126

ABSTRACT:
A fast encryption method particularly useful for long message lengths is provided. A message m is encrypted using a transmitter secret key z to form a quantity E. A transmitter processor prepares a quadruplet (anew, bnew,snew, E) where:in-line-formulae description="In-line Formulae" end="lead"?anew=z*ycmodulop;in-line-formulae description="In-line Formulae" end="tail"?in-line-formulae description="In-line Formulae" end="lead"?bnew=gcmodulop;in-line-formulae description="In-line Formulae" end="tail"?in-line-formulae description="In-line Formulae" end="lead"?snew=signaturec(anew,bnew,E).in-line-formulae description="In-line Formulae" end="tail"?As in previous embodiments y=gxmodulo p is the public key and x is the receiver secret key. The parameters g, x, and p according to methods known to a person skilled in the art and the parameter g is a generator of the group Gp. The parameter c is a random number. The transmitter processor sends the quadruplet (anew, bnew,snew, E) to a receiver processor. The receiver processor verifies the signature on snewusing methods known in the art. The receiver processor then decrypts anewand bnewusing the receiver secret key x to get the transmitter secret key z, i.e. in the following manner z=anew/bnewx. The receiver processor uses the transmitter secret key z to decrypt E to get the message M.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5271061 (1993-12-01), Crandall
patent: 5539826 (1996-07-01), Dwork et al.
patent: 5721781 (1998-02-01), Deo et al.
patent: 6396928 (2002-05-01), Zheng
patent: 6507656 (2003-01-01), Jakobsson
Schneier, Bruce; Applied Cryptography; 1996; John Wiley & Sons, Inc.; 2nd Edition; pp. 21-46, 213-229, 461-525.
Dolev et al.; ‘Non-Malleable Cryptography’; 1991; ACM; pp. 542-552.
Grescenzo et al.; ‘Non-Interactive and Non-Malleable Commitment’; 1998; ACM; pp. 141-150.
ElGamal, Taher; ‘A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms’; Jul. 1985; IEEE Transactions on Information Theory; vol. 31, No. 4; pp. 469-472.
T. Beth et al, “Non Supersingular Elliptic Curves for Public Key Cryptosystems”, © 1998, Springer-Verlag, 1-12, Universitat Karlsruhe.
Victor S. Miller, “Use of Elliptic Curves in Cryptography”, © 1998, Springer-Verlag, 1-11, IBM Research.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Non malleable encryption method and apparatus using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Non malleable encryption method and apparatus using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Non malleable encryption method and apparatus using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3494940

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.