Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-06-18
2000-09-19
Peeso, Thomas R.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
713171, 713176, 380278, 380281, 380283, H04L 900
Patent
active
061227420
ABSTRACT:
A method is provided for an escrow cryptosystem combined with an unescrowed digital signature scheme that uses a single public key per user. This system is overhead-free, does not require a cryptographic tamper-proof hardware implementation (i.e., can be done in software), and is publicly verifiable. The system cannot be used subliminally to enable a shadow public key system. Namely, an unescrowed public key system that is publicly displayed in a covert fashion. The cryptosystem contains a key generation mechanism that outputs a key triplet, and a certificate of proof that the keys were generated according to the algorithm. The key triplet consists of a public key, a private decryption key, and a private signing key. Using the public key and the certificate, the triplet can be verified efficiently by anyone to have the following properties: (1) the private signing key is known to the user, and (2) the private decryption key is recoverable by the escrow authorities. The system assures that the escrow authorities are not able to forge signatures or get the private signing key. The system is designed so that its internals can be made publicly scrutinizable (e.g., it can be distributed in source code form).
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4625076 (1986-11-01), Okamoto et al.
patent: 4641346 (1987-02-01), Clark et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4881264 (1989-11-01), Merkle
patent: 4933970 (1990-06-01), Shamir
patent: 4995082 (1991-02-01), Schnorr
patent: 5005200 (1991-04-01), Fischer
patent: 5097504 (1992-03-01), Camion et al.
patent: 5231668 (1993-07-01), Kravitz
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5633928 (1997-05-01), Lenstra et al.
patent: 5640454 (1997-06-01), Lipner et al.
patent: 5647000 (1997-07-01), Leighton
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5815573 (1998-09-01), Johnson et al.
"Applied Cryptography", Schneier, pp. 5, 28, 32, 42, 43, 178, 266, 421, 465, 597, 1995.
"Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes", Tatsuaki Okamoto, pp. 32-53. Federal Register/vol. 62, No.92/Tuesday, May 13,1997/Notices, pp. 26293,26294.
R. Anderson, M. Roe, "The GCHQ Protocol and Its Problems", Eurocrypt '97, pp. 134-148, Springer-Verlag 1997.
M. Bellare, P. Rogaway, "Optimal Asymmetric Encryption", Eurocrypt '94, pp. 92-111, Springer-Verlag, 1994.
D. Chaum, "Blind Signatures For Untraceable Payments".
D. Chaum, T.P. Pedersen, "Wallet Databases with Observers".
D. Denning, D. Branstad, "A Taxonomy for Key Escrow Encryption Systems", Communications of the ACM, v. 39, n. 3, , 1996.
A. De Santis, Y. Desmedt, Y. Frankel, M. Yung, "How to Share a Function Securrely", ACM STOC '94, pp. 522-533, 1994.
Y. Desmedt. Y. Frankel, "Threshold cryptosystems", CRYPTO '89, pp. 307-315, Springer-Verlag, 1989.
Y. Desmedt, "Securing Traceability of Ciphertexts--Towards a Secure Software Key Escrow System", eurocrypt '95, pp. 147-157, Springer-Verlag, 1995.
W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, 22, pp. 644-654, 1976.
T. ElGamal, "A Public Key Crptosystem and a Signature Scheme Based on Discrete Logarithms", CRYPTO '84, pp. 10-18, Springer-Verlag, 1985.
P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing", 28th annual FOCS, pp. 427-437, 1987.
A. Fiat, A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems", CRYPTO '86, pp. 186-194, Springer-Verlag, 1987.
Y. Frankel, M. Yung, "Escrow Encryption Systems Visited: Attacks, Analysis and Designs", CRYPTO '95, Springer-Verlag, 1995.
R. Ganesan, "How To Use Key Escrow", Communications of the ACM, v. 39, n.3, p. 33, 1996.
S. Goldwasser, S. Micali, R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM Journal on Computing, vol. 17, n. 2, 1988.
IBM, SecureWay, key recovery technology document, available at http://www.ibm.com/Security/html/wp-keyrec.html (downloaded May 25, 1997).
N. Jefferies, C. Mitchell, M. Walker, "A Proposed Architecture for Trusted Third Party Services", Cryptography: Policy and Algorithms, LNCS 1029, Springer, 1996.
J. Kilian, F. Leighton, "Fair Cryptosystems, Revisited", CRYPTO '95, pp. 208-221, Springer-Verlag, 1995.
L. Lacy, D. Mitchell, W. Schell, "CryptoLib: Cryptography in Software", AT&T Bell Labs, Crypto@research.att.com.
A. Lenstra, P. Winkler, Y. Yacobi, "A Key Escrow System with Warrant Bounds", CRYPTO '95, pp. 197-207, Springer-Verlag, 1995.
S. Micali, "Fair Public-Key Cryptosystems", CRYPTO '92, pp. 113-138, Springer-Verlag, 1992.
K. Nyberg, R. Rueppel, "Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem".
T.P. Pedersen, "A Threshold Cryptosystem without a Trusted Party".
E. Verheul, H. Tilborg, "Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals", Eurocrypt '97, pp. 119-133, Springer-Verlag, 1997.
S. Walker, J. Winston, "Principles for Use of Encryption and Key Recovery", available at http://www.tis.com/docs/products/recoverkey/recoverkey.html (downloaded May 25, 1997).
A. Young, M. Yung, "Kleptography: Using Cryptography Against Cryptography", Eurocrypt '97, pp. 62-74, Springer-Verlag, 1997.
"Digital Systems", CRC Handbook of Applied Cryptography, Ch 11, pp. 425-444.
"Digital Systems", CRC Handbook of Applied Cryptography, Ch 11, pp. 445-464.
"Digital Systems", CRC Handbook of Applied Crytography, Ch 11, pp. 465-481.
Young Adam Lucas
Yung Marcel Mordechay
LandOfFree
Auto-recoverable and auto-certifiable cryptosystem with unescrow does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Auto-recoverable and auto-certifiable cryptosystem with unescrow, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Auto-recoverable and auto-certifiable cryptosystem with unescrow will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1084236