Secret key generation method, encryption method,...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C380S259000

Reexamination Certificate

active

07065210

ABSTRACT:
A cryptographic communications method based on ID-NIKS, wherewith mathematical structures are minimized, the collusion problem can be circumvented, and building the cryptosystem is simplified. A plurality of centers are provided for distributing a plurality of secret keys to a plurality of entities, respectively. Each secret key is unique to each entity. Information specifying the entities (entity ID information) is divided into a plurality of pieces or segments. All secret keys produced for the pieces of entity ID information are distributed to the entities. Using a component contained in the secret key peculiar to itself, each entity generates a common key to be shared by another entity. This component corresponds to a piece of ID information of another entity.

REFERENCES:
patent: 4736423 (1988-04-01), Matyas
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5220606 (1993-06-01), Greenberg
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5539827 (1996-07-01), Liu
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5987128 (1999-11-01), Baba
patent: 5987129 (1999-11-01), Baba
patent: 04-245287 (1992-09-01), None
A. Fujikawa et al., “Computationally Secure ID-NIKS”, Technical Report of IEICE, Jul. 1996.
S. Tsujii et al., “A New Concept of Key Sharing Systems”, The 1999 Symposium on Cryptography and Information Security, Jan. 1999.
M. Kasahara et al., “Common-key Sharing Scheme Based on Double Exponential Function”, Technical Report of IEICE May 1999.
Rolf Blom, “Non-Public Key Distribution”, Advances in cryptology: proceedings of CRYPTO 82 / edited by David Chaum, Ronald L. Rivest, and Alan T. Sherman / New York: Plenum Press, pp. 231-236.
Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Advances in Cryptology: proceedings of CRYPTO 84 / edited by G.R. Blakley and David Caum / Berlin; Tokyo: Springer-Verlag, pp. 47-53.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secret key generation method, encryption method,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secret key generation method, encryption method,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret key generation method, encryption method,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3634117

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.