Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2007-08-29
2011-11-29
El Hady, Nabil M (Department: 2434)
Cryptography
Particular algorithmic function encoding
C380S030000, C380S042000, C380S044000, C380S255000, C380S277000, C380S283000, C713S150000, C713S163000, C713S168000, C713S171000, C713S180000
Reexamination Certificate
active
08068606
ABSTRACT:
A method and system for embedding a secret in a bit string for safeguarding the secret. In one embodiment, the method comprises computing the length of the overall bit string as a function of q and t, where q and t are determined from the length of the secret. The method further comprises generating a plurality of information pieces based on q and t, the information pieces including a transformed secret and information for extracting the secret from the overall bit string. The method further comprises concatenating the plurality of information pieces to form the overall bit string.
REFERENCES:
patent: 4037093 (1977-07-01), Gregg
patent: 4200770 (1980-04-01), Hellman et al.
patent: 6035041 (2000-03-01), Frankel et al.
patent: 6122742 (2000-09-01), Young et al.
patent: 7167565 (2007-01-01), Rajasekaran
patent: 7200752 (2007-04-01), Eskicioglu et al.
patent: 7707426 (2010-04-01), Lauter et al.
patent: 2003/0044004 (2003-03-01), Blakley et al.
patent: 2007/0248224 (2007-10-01), Buskey et al.
patent: 2008/0260143 (2008-10-01), Ibrahim
patent: 2009/0060179 (2009-03-01), Schneider
Asmuth, Charles et al., “A Modular Approach to Key Safeguarding”,IEEE Transactions on Information Theory, vol. IT-29, No. 2, Mar. 1983, pp. 208-210.
Blakley, G. R. et al., “Safeguarding Cryptographic Keys”,National Computer Conference, 1979, AFIPS—Conference Proceedings, vol. 48, AFIPS Press, Montvale, NJ 07645, pp. 313-317.
Blakley, G. R. et al., “Security of Ramp Schemes”,Lecture Notes in Computer Science—Advances in Cryptology, Proceedings of CRYPTO 84, Springer-Verlag, pp. 242-268.
Shamir, Adi et al., “How to Share a Secret”,Programming Techniques, Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 612-613.
Schneier, Bruce, “Applied Cryptography, Second Edition—Protocols, Algorithms and Source Code in C”, © 1996, John Wiley & Sons, Inc., title pages, pp. viii and 47-74.
Desmedt, et al., “Threshold Cryptosystems”, Advances in Cryptology-CRYPTO 89, 1990, Springer-Verlag, pp. 307-315.
Wang, et al., “Secret image sharing with smaller shadow images”, Elsevier, 2005, pp. 551-555.
Ingemarsson, et al., “A Protocol to Set Up Shared Secret Schemes Without the Assistance of A Mutually Trusted Party”, Advances in Cryptology-EUROCRYPT 90, 1991, Springer-Verlag, pp. 266-282.
El Hady Nabil M
Lowenstein & Sandler PC
Red Hat, Inc.
LandOfFree
Embedding a secret in a bit string for safeguarding the secret does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Embedding a secret in a bit string for safeguarding the secret, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Embedding a secret in a bit string for safeguarding the secret will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4278969