Distributed split-key cryptosystem and applications

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, 380 21, 380 47, 705 64, 705 71, 705 74, 705 75, 705 77, 705 78, 705 80, H04K 100

Patent

active

060261633

ABSTRACT:
A distributed split-key cryptosystem and application in a public-key setting wherein each of a plurality of trustees independently selects his own secret-public key pair. The trustees combine their public encryption keys into a single public encryption key. Using this combined public key for an electronic auction and other secure transactions.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4326098 (1982-04-01), Bouricius et al.
patent: 4375579 (1983-03-01), Davida et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 4879747 (1989-11-01), Leighton et al.
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 4908861 (1990-03-01), Brachtl et al.
patent: 4924514 (1990-05-01), Matyas et al.
patent: 4933970 (1990-06-01), Shamir
patent: 4944009 (1990-07-01), Micali et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 4995081 (1991-02-01), Leighton et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5018196 (1991-05-01), Takaragi et al.
patent: 5081676 (1992-01-01), Chou et al.
patent: 5124117 (1992-06-01), Tatebayashi et al.
patent: 5136643 (1992-08-01), Fischer
patent: 5150411 (1992-09-01), Maurer
patent: 5177791 (1993-01-01), Yeh et al.
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5202977 (1993-04-01), Pasetes, Jr. et al.
patent: 5208853 (1993-05-01), Armbruster et al.
patent: 5214698 (1993-05-01), Smith, Sr. et al.
patent: 5214700 (1993-05-01), Pinkas et al.
patent: 5220501 (1993-06-01), Lawlor et al.
patent: 5224162 (1993-06-01), Okamoto et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5373558 (1994-12-01), Chaum
patent: 5440634 (1995-08-01), Jones et al.
patent: 5453601 (1995-09-01), Rosen
patent: 5455407 (1995-10-01), Rosen
patent: 5497421 (1996-03-01), Kaufman et al.
patent: 5509071 (1996-04-01), Petrie, Jr. et al.
patent: 5511121 (1996-04-01), Yacobi
patent: 5521980 (1996-05-01), Brands
patent: 5553145 (1996-09-01), Micali
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5610982 (1997-03-01), Micali
patent: 5615269 (1997-03-01), Micali
patent: 5633928 (1997-05-01), Lenstra et al.
patent: 5664017 (1997-09-01), Gressel et al.
patent: 5666414 (1997-09-01), Micali
patent: 5666420 (1997-09-01), Micali
patent: 5675649 (1997-10-01), Brennan et al.
patent: 5761306 (1998-01-01), Lewis
patent: 5794207 (1998-08-01), Walker
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5799086 (1998-08-01), Sudia
patent: 5809144 (1998-09-01), Sirbu
patent: 5812670 (1998-09-01), Micali
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5841865 (1998-11-01), Sudia
patent: 5850442 (1998-12-01), Muftic
patent: 5850451 (1998-12-01), Sudia
patent: 5857022 (1999-01-01), Sudia
patent: 5872849 (1999-02-01), Sudia
Needham et al "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999.
Chor et al., "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", Extended Abstract, IEEE, 1985, pp. 383-395.
Even, S., "Secure Off-Line Electronic Fund Transfer Between Nontrusting Parties", Abstract, Jan. 31, 1988, 10 pps.
Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Chaum, D., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, vol. 24, No. 2, Feb. 1981, pp. 84-88.
Desmedt, et al., "Threshold Cryptosystems", EE & CS Department, University of Wisconsin-Milwaukee.
Rabin, M., "How to Exchange Secrets", May 20, 1981, pp. 1-21.
Kolata, G., Cryptographers Gather to Discuss Research--Analyses of how to break codes and new ways to use codes were featured at the meeting, Science, vol. 214, No. 6, 1981, pp. 646-647.
Blum, M., "How to Exchange (Secret) Keys", ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193.
Luby, et al., "How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin", IEEE, 1983, pp. 11-21.
Even et al., "A Randomized Protocol for Signing Contracts", Communications of the ACM, vol. 28, No. 6, Jun. 1985, pp. 637-647.
Goldreich et al., "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority", Proceedings of the 27.sup.th Annual IEEE ACM Symposium on Theory of computing, May 1987, pp. 218-229.
Goldwasser et al., "The Knowledge complexity of Interactive Proof Systems", Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208.
Damgard, I., "Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals", Extended Abstract, pp. 328-335, Proceedings of Crypto '88.
Chaum et al., "Untraceable Electronic Cash", Extended Abstract, pp. 319-327, Proceedings of Crypto '88.
Dolev et al., "Non-Malleable Cryptography", Extended Abstract, Communications of the ACM, Mar. 1991, pp. 542-552.
Batelaan et al., "Internet Billing Service Design and Protype implementation", Carnegie Mellon University Information Networking Institute 1992 Final Project, Mar. 30, 1993, 16 pps.
Burk et al., "Digital Payment Systems Enabling Security and Unobservability", Computers & Security, vol. 8, 1989, pp. 399-415.
Rabin, M., "Transaction Protection by Beacons", Harvard University, Cambridge, MA, Nov. 1981, 21 pps.
Ben-Or et al., "A Fair Protocol for Signing Contracts", IEEE Transactions On Information Theory, vol. 36, No. 1, Jan. 1990, pp. 40-46.
Rivest, et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Feb. 1978, pp. 120-126.
Goldreich et al., "Proofs That Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems", Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729.
Leighton, Tom; & Micali, S., "New Approaches to Secret-Key Exchange", Apr. 1993.
Leighton, Tom; & Kilian, Joseph, "Failsafe Key Escrow", Aug. 1994.
Rabin, Tal; & Ben-Or, Michael; "Verifiable Secret Sharing and Multiparty Protocols with Honest Majority" (Extended Abstract), Institute of Mathematics and Computer Science, The Hebrew University, Jerusalem, Irasel, Aug. 1989, pp. 73-85.
Karnin, Ehud D.; Greene, Jonathan W.; & Hellman, Martin E., "On Secret Sharing Systems", IEEE Transactions on Information Theory, vol. IT-29, No. 1, Jan. 1983.
Meyer, Carl H. & Matyas, Stephen M., "Cryptography: a New Dimension in Computer Data Security", Cryptography Competency Center, IBM Corporation, Kingston, New York, 1982 pp. 350-541.
Micali, S., "Fair Cryptosystems", MIT/LCS/TR-579.b, Nov. 1993.
B. Schneier; Applied Cryptography, Second Edition; May 22, 1995; John Wiley & Son, Inc.
Yao, Andrew C., "Protocols for Secure Computations" (Extended Abstract) 1982, University of California, Berkeley, CA., pp. 160-169.
Micali, Silvio and Philip Rogaway, "Secure Computation" (Abstract) Undated.
Ben-Or, Michael, Shafi Goldwasser and Avi Wigderson, "Completeness Theorms for Non-Cryptographic Fault-Tolerant Distributed Computation" (Extended Abstract) ACM, 1988, pp. 1-10.
Longley, Dennis and Shain, Michael; "Data & Computer Security: Dictionary of standards concepts and terms", 1987, pp. 10-421.
Chor, Benny, Shafi Goldwasser, Silvio Micali and Baruch Awerbauch, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults" (Extended Abstract), Massachusetts Institute of Technology Laboratory for Computer Science, 1985, pp. 383-395.
Graham, S.L. adn R.L. Rivest, "A Method for Obtaining Digital Signatures and Public-Key cryptosystems" Communications of the ACM, Feb. 1978, vol. 21, No. 2.
Micali, S., "Fair Public-Key Cryptosystems", Cryptosystems, May 20, 1992.
Pederson, Torben Pryds, "Distributed Provers with Applications to Undeniable Signatures", Eurocrypt '91 Abstracts, Univ. Of Sussex, Brighton, UK, 8th-11th Apr. 1991, pp. 117-122.
Beth, Th., "Zur Diskission gestellt, Informatic Spektrum", vol. 13, 1990, pp. 204-215.
Feldman, Paul, "A Practical Scheme for Noninteractive Verifiable Secret Sharing", 1987, pp. 427-437.
Bl

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Distributed split-key cryptosystem and applications does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Distributed split-key cryptosystem and applications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Distributed split-key cryptosystem and applications will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1912137

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.