Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-01-01
2008-01-01
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S170000, C713S182000, C726S002000, C380S255000, C380S277000, C380S282000, C380S283000
Reexamination Certificate
active
10451003
ABSTRACT:
A method of operating an identity based directoryless key-code cryptographic communication system having two users A and B and a universal authority U, involving the generation of a public modulus M, being the product of two primes P and Q, and the operation of a publicly available secure one way hash function, #. User A presents his identity to U who uses #, M, P and Q to generate a decryption key, r, which is only made available to A. User B, who wishes to transmit a message to A, can encrypt data by using the #, M and A's identity. User A can recover the data by using r.
REFERENCES:
patent: 5150411 (1992-09-01), Maurer
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5315658 (1994-05-01), Micali
patent: 6687822 (2004-02-01), Jakobsson
patent: 6760752 (2004-07-01), Liu et al.
patent: 2003/0076954 (2003-04-01), Vanstone et al.
patent: 2003/0091192 (2003-05-01), Chen et al.
patent: 0482233 (1992-04-01), None
patent: 0973293 (1999-07-01), None
patent: 973293 (2000-01-01), None
Shamir, 1998, Department of Applied Mathematics, p. 47-52.
Maurer and Yacobi, 1991, Lecture Notes in Computer Science, vol. 547.
Chen, Kefer. “Authenticated Encryption Scheme Based On Quadratic Residue”. Electronic Letters. vol. 34, Issue 22. Oct. 1998. pp. 2115 and 2116. Found on the World Wide Web at: http://ieeexplore.ieee.org/iel4/2220/15941/00741318.pdf?tp=&arnumber=741318&isnumber=15941.
A. Fiat, et al., “How To Prove Yourself: Practical Solutions to Identification and Signature Problems,” Lecture Notes in Computer Science, 186-194, no date provided.
Avery Jeremiah
Kilpatrick & Stockton LLP
Revak Christopher
Russell Dean W.
The Director, GCHQ
LandOfFree
Directoryless public key cryptographic system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Directoryless public key cryptographic system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Directoryless public key cryptographic system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3941713