Auto-recoverable and auto-certifiable cryptosystem with unescrow

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713171, 713176, 380278, 380281, 380283, H04L 900

Patent

active

061227420

ABSTRACT:
A method is provided for an escrow cryptosystem combined with an unescrowed digital signature scheme that uses a single public key per user. This system is overhead-free, does not require a cryptographic tamper-proof hardware implementation (i.e., can be done in software), and is publicly verifiable. The system cannot be used subliminally to enable a shadow public key system. Namely, an unescrowed public key system that is publicly displayed in a covert fashion. The cryptosystem contains a key generation mechanism that outputs a key triplet, and a certificate of proof that the keys were generated according to the algorithm. The key triplet consists of a public key, a private decryption key, and a private signing key. Using the public key and the certificate, the triplet can be verified efficiently by anyone to have the following properties: (1) the private signing key is known to the user, and (2) the private decryption key is recoverable by the escrow authorities. The system assures that the escrow authorities are not able to forge signatures or get the private signing key. The system is designed so that its internals can be made publicly scrutinizable (e.g., it can be distributed in source code form).

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4625076 (1986-11-01), Okamoto et al.
patent: 4641346 (1987-02-01), Clark et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4881264 (1989-11-01), Merkle
patent: 4933970 (1990-06-01), Shamir
patent: 4995082 (1991-02-01), Schnorr
patent: 5005200 (1991-04-01), Fischer
patent: 5097504 (1992-03-01), Camion et al.
patent: 5231668 (1993-07-01), Kravitz
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5633928 (1997-05-01), Lenstra et al.
patent: 5640454 (1997-06-01), Lipner et al.
patent: 5647000 (1997-07-01), Leighton
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5815573 (1998-09-01), Johnson et al.
"Applied Cryptography", Schneier, pp. 5, 28, 32, 42, 43, 178, 266, 421, 465, 597, 1995.
"Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes", Tatsuaki Okamoto, pp. 32-53. Federal Register/vol. 62, No.92/Tuesday, May 13,1997/Notices, pp. 26293,26294.
R. Anderson, M. Roe, "The GCHQ Protocol and Its Problems", Eurocrypt '97, pp. 134-148, Springer-Verlag 1997.
M. Bellare, P. Rogaway, "Optimal Asymmetric Encryption", Eurocrypt '94, pp. 92-111, Springer-Verlag, 1994.
D. Chaum, "Blind Signatures For Untraceable Payments".
D. Chaum, T.P. Pedersen, "Wallet Databases with Observers".
D. Denning, D. Branstad, "A Taxonomy for Key Escrow Encryption Systems", Communications of the ACM, v. 39, n. 3, , 1996.
A. De Santis, Y. Desmedt, Y. Frankel, M. Yung, "How to Share a Function Securrely", ACM STOC '94, pp. 522-533, 1994.
Y. Desmedt. Y. Frankel, "Threshold cryptosystems", CRYPTO '89, pp. 307-315, Springer-Verlag, 1989.
Y. Desmedt, "Securing Traceability of Ciphertexts--Towards a Secure Software Key Escrow System", eurocrypt '95, pp. 147-157, Springer-Verlag, 1995.
W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, 22, pp. 644-654, 1976.
T. ElGamal, "A Public Key Crptosystem and a Signature Scheme Based on Discrete Logarithms", CRYPTO '84, pp. 10-18, Springer-Verlag, 1985.
P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing", 28th annual FOCS, pp. 427-437, 1987.
A. Fiat, A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems", CRYPTO '86, pp. 186-194, Springer-Verlag, 1987.
Y. Frankel, M. Yung, "Escrow Encryption Systems Visited: Attacks, Analysis and Designs", CRYPTO '95, Springer-Verlag, 1995.
R. Ganesan, "How To Use Key Escrow", Communications of the ACM, v. 39, n.3, p. 33, 1996.
S. Goldwasser, S. Micali, R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM Journal on Computing, vol. 17, n. 2, 1988.
IBM, SecureWay, key recovery technology document, available at http://www.ibm.com/Security/html/wp-keyrec.html (downloaded May 25, 1997).
N. Jefferies, C. Mitchell, M. Walker, "A Proposed Architecture for Trusted Third Party Services", Cryptography: Policy and Algorithms, LNCS 1029, Springer, 1996.
J. Kilian, F. Leighton, "Fair Cryptosystems, Revisited", CRYPTO '95, pp. 208-221, Springer-Verlag, 1995.
L. Lacy, D. Mitchell, W. Schell, "CryptoLib: Cryptography in Software", AT&T Bell Labs, Crypto@research.att.com.
A. Lenstra, P. Winkler, Y. Yacobi, "A Key Escrow System with Warrant Bounds", CRYPTO '95, pp. 197-207, Springer-Verlag, 1995.
S. Micali, "Fair Public-Key Cryptosystems", CRYPTO '92, pp. 113-138, Springer-Verlag, 1992.
K. Nyberg, R. Rueppel, "Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem".
T.P. Pedersen, "A Threshold Cryptosystem without a Trusted Party".
E. Verheul, H. Tilborg, "Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals", Eurocrypt '97, pp. 119-133, Springer-Verlag, 1997.
S. Walker, J. Winston, "Principles for Use of Encryption and Key Recovery", available at http://www.tis.com/docs/products/recoverkey/recoverkey.html (downloaded May 25, 1997).
A. Young, M. Yung, "Kleptography: Using Cryptography Against Cryptography", Eurocrypt '97, pp. 62-74, Springer-Verlag, 1997.
"Digital Systems", CRC Handbook of Applied Cryptography, Ch 11, pp. 425-444.
"Digital Systems", CRC Handbook of Applied Cryptography, Ch 11, pp. 445-464.
"Digital Systems", CRC Handbook of Applied Crytography, Ch 11, pp. 465-481.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Auto-recoverable and auto-certifiable cryptosystem with unescrow does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Auto-recoverable and auto-certifiable cryptosystem with unescrow, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Auto-recoverable and auto-certifiable cryptosystem with unescrow will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1084236

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.