Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-12-19
2010-06-01
Kim, Jung (Department: 2432)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S180000, C380S028000, C380S030000
Reexamination Certificate
active
07730315
ABSTRACT:
A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
REFERENCES:
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 6163841 (2000-12-01), Venkatesan et al.
patent: 6209093 (2001-03-01), Venkatesan et al.
patent: 6845395 (2005-01-01), Blumenau et al.
patent: 2002/0018560 (2002-02-01), Lauter et al.
patent: 2004/0001590 (2004-01-01), Eisentraeger et al.
patent: 2004/0005054 (2004-01-01), Montgomery et al.
patent: 2005/0025311 (2005-02-01), Eisentraeger et al.
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press LLC, pp. 294-298, Section 8.4 ElGamal public-key encryption.
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press LLC, pp. 294-298, Section 8.4 ElGamal public-key encryption, and pp. 454-459, Section 11.5.2, The ElGamal Signature Scheme.
Koblitz, Neal: Algebraic Aspects of Cryptography, 1998, Springer-Verlag Berline Heidelberg, vol. 3, Chapter 6 and appendex.
Schneier, Bruce, Applied Cryptography, 1996, John Wiley & Sons, 2nd Edition, Chapter 18.
Encinas, et al., “Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields” Application Algebra in Engineering, Communication and Computing, vol. 13 Issue 1, Apr. 2002, pp. 1-11.
Hess, et al., “Two Topics in Hyperelliptic Cryptography”, pp. 181-189 of Selected Areas in Cryptography, Aug. 2001, Serge Vandenay and Amr. M. Youssef (Eds.), LNCS 2259, Springer-Verlag, Aug. 2001.
Lange, “Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae”, University of Bochum, Germany. Dec. 15, 2003, pp. 1-13.
Menezes, “Elliptic Curve Public Key Cryptosystems”, Kluwer Academic Publishers. pp. 8 & 116, Jul. 1993.
Rosing, “Implementing Elliptic Curve Cryptography”, Manning Publications Co. Aug. 1999, pp. 171-174, 297-300.
Stahlke, “Point Compression on Jacobians of Hyperelliptic Curves over Fp” 2004. [http://eprint.iacr.org/2004/030.pdf].
Weisstein, et al., “Hyperelliptic Curve” From MathWorld—A Wolfram Web Resource. Available at http://mathworld.wolfram.com/HyperellipticCurve.html, last updated Feb. 2, 2010, 1 page.
Lauter Kristin E.
Montgomery Peter L.
Venkatesan Ramarathnam
Kim Jung
Lee & Hayes PLLC
Microsoft Corporation
LandOfFree
Cryptosystem based on a Jacobian of a curve does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptosystem based on a Jacobian of a curve, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptosystem based on a Jacobian of a curve will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4189771