Comparison of documents possessed by two parties

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S169000, C713S176000

Reexamination Certificate

active

08032747

ABSTRACT:
A method of zero-knowledge document comparison between two parties. Each party performs: exchanging a set of random data and a shared hash function, applying the hash function to concatenations of the document and the sets of random data, and comparing the hashes.

REFERENCES:
patent: 5651069 (1997-07-01), Rogaway
patent: 5790669 (1998-08-01), Miller et al.
patent: 6167521 (2000-12-01), Smith et al.
patent: 6681017 (2004-01-01), Matias et al.
patent: 7134018 (2006-11-01), Riordan
patent: 2001/0044895 (2001-11-01), Hada
patent: 2002/0049601 (2002-04-01), Asokan et al.
patent: 2003/0093680 (2003-05-01), Astley et al.
patent: 11234259 (1999-08-01), None
patent: 11234263 (1999-08-01), None
patent: WO00/48358 (2000-08-01), None
patent: WO00/65426 (2000-11-01), None
Schneier, “Applied Cryptography”, 1996, John Wiley & Sons, 2ndEdition, pp. 30-31.
Research Disclosure “A Strong Client-Server Mutual Authentication Scheme”; Disclosed by International Business Machines Corporation No. 41787; Jan. 1999; p. 129.
Abe, M.; Securing “Enrcryption + Proof of Knowledge” in the Random Oracle Model; NTT Information Sharing Platform Labs.; Nippon Telegraph and Telephone Corporation; The Cryptographers' Track at the RSA Conference 2002, San Jose, CA, USA, Feb. 18-22, 2002; Proceedings pp. 277-289.
Peyravian, et al.; Hash-Based Encryption System; Computers & Security vol. 18, No. 4, 1999; pp. 345-350.
Yuh-Shihng Chang et al.; Group-oriented authentication mechanism with key exchange; Department of Information Management, Computer Communications, vol. 21, No. 5, May 15, 1998; pp. 485-497.
Aura, Tuomas; Strategies Against Replay Attacks; Digital Systems Laboratory, Helsinki University of Technology; IEEE, 1997; pp. 59-68.
Rangan, P. Venkat; Trust Requirements and Performance of a Fast Subtransport-Level Protocol for Secure Communication; IEEE Transactions on Software Engineering, vol. 19, No. 2, Feb. 1993; pp. 181-186.
Maurer et al.; Unconditionally Secure Key Agreement and the Intrinsic Conditional Information; IEEE Transactions on Information Theory, vol. 45, No. 2, Mar. 1999; 16 pages.
Halevi et al.; Public-Key Cryptography and Password Protocols; ACM Transactions on Information and System Security, vol. 2, No. 3, Aug. 1999; pp. 230-268.
Park et al.; Security Protocol for IEEE 802.11 Wireless Local Area Network; Mobile Networks and Applications 3; 1993; pp. 237-246.
Brassard et al.; Computationally Convincing Proofs of Knowledge; Lecture Notes in Computer Science; 1991; 12 pages.
Feige et al.; Zero Knowledge Proofs of Knowledge in Two Rounds; Proceedings on Advances in Cryptology; 1989; pp. 526-544.
Menezes et al.; Handbook of Applied Cryptography; 1997; CRC Press; pp. 352-359, 397-417.
Notice of Allowance (Mail Date Sep. 4, 2009) for U.S. Appl. No. 11/949,117, filed Dec. 3, 2007, Confirmation No. 4154.
Fagin et al.; “Comparing Information Without Leaking It”, ACM, 1996, Retrieved from the Internet on Aug. 19, 2009: <URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.5059>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Comparison of documents possessed by two parties does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Comparison of documents possessed by two parties, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Comparison of documents possessed by two parties will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4285244

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.