Fair cryptosystems and methods of use

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 900

Patent

active

RE0369187

ABSTRACT:
A method, using a public-key cryptosystem, for enabling a predetermined entity to monitor communications of users [suspected of unlawful activities while protecting the privacy of law-abiding users], wherein each user is assigned a pair of matching secret and public keys. According to the method, each user's secret key is broken into shares. Then, each user provides a plurality of "trustees" pieces of information. The pieces of information provided to each trustee enable that trustee to verify that such information includes a "share" of a secret key of some given public key. Each trustee can verify that the pieces of information provided include a share of the secret key without interaction with any other trustee or by sending messages to the user. Upon a predetermined request or condition, e.g., a court order authorizing the entity to monitor the communications of a user [suspected of unlawful activity], the trustees reveal to the entity the shares of the secret key of such user. This enables the entity to reconstruct the secret key and monitor the [suspect] user's communications.

REFERENCES:
patent: 4375579 (1983-03-01), Davida et al.
patent: 4405829 (1983-09-01), Davida et al.
patent: 4933970 (1990-06-01), Shamir
patent: 5005200 (1991-04-01), Fischer
patent: 5006200 (1991-04-01), Fischer
patent: 5018196 (1991-05-01), Takaragi et al.
patent: 5136643 (1992-08-01), Fischer
patent: 5150411 (1992-09-01), Maurer
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5214698 (1993-05-01), Smith et al.
patent: 5276737 (1994-01-01), Micali
Dorothy Denning, E-mail message re "Clipper Chip", Apr. 18, 1993, 3 pages.
Ed Roback, E-mail message re White House Public Encryption Management Fact Sheet, Apr. 16, 1993, 11 pages.
David Banisar, "Computer Professionals Call for Public Debate on New Government Encryption Initiative", Apr. 16, 1993, 2 pages.
The White House, Statement by the Press Secretary, Apr. 16, 1993, 6 pages.
Martin Hellman, E-mail message re Clipper Chip, Apr. 17, 1993, 2 pages.
John Markoff, "Communications Plan Draws Mixed Reaction", The New York Times, Apr. 17, 1993.
Shamir, "How to Share A Secret", Communications of the ACM, vol. 22, No. 11, pp. 612-613, Nov., 1979.
Blakley, "Safeguarding Cryptographic Keys", AFIPS-Conference Proceedings, vol. 48, pp. 313-317, 1979.
Chor, et al, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", IEEE, pp. 383-395, 1985.
Benaloh, "Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret", CRYPTO, pp. 1-2, Jul. 18, 1966.
Goldreich, et al., "How to Play Any Mental Game or A Completeness Theorem for Protocols with Honest Majority", ACM, pp. 218-229, 1987.
Ben-Or, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computations", ACM, pp. 1-10, 1988.
Chaum, et al, "Multiparty Unconditionally Secure Protocols", ACM, pp. 11-19, 1988.
Rabin, et al, "Verifiable Secret Sharing and Multiparty Protocols with Honest Majority", ACM, pp. 73-83, 1989.
Feldman, "A Practical Scheme For Non-Interactive Verifiable Secret Sharing", IEEE, pp. 427-437, 1987.
Diffie, et al, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, No. 6, pp. 644-654, Nov. 1976.
Rivest, et al, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", ACM, vol. 21, No. 2, pp. 120-126, Feb., 1978.
Brassard, et al, "Minimum Disclosure Proofs of Knowledge", Journal of Computer and System Sciences 37, pp. 156-189, 1988.
Goldreich, et al, "Proofs That Yield Nothing But Their Validity and a Methodology of Cryptographic Protocol Design", IEEE, pp. 174-187, 1986.
AT&T Press Release, "AT&T to Incorporate New "Clipper" Chip Into Secure Communications Product Line", Apr. 16, 1993.
Mykotronx Press Release, "Mykotronx Develops New Chip to Protect Digital Data", Apr. 16, 1993?.
John Markoff, "New Communication System Stirs Talk of Privacy vs. Eavesdropping", The New York Times, Apr. 16, 1993.
Hal Abelson, E-mail message re "Initial EFF Analysis of Clinton Privacy and Security Proposal", Apr. 16, 1993, 3 pages.
Martin Hellman, E-mail message re Clipper-Chip Escrow-System Flaws, Apr. 16, 1993, 1 page.
Translation of "Zur Diskussion Gestellt", Beth, Th., Informatik-Spectrum, vol. 13, 1990, pp. 204-215.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Fair cryptosystems and methods of use does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Fair cryptosystems and methods of use, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Fair cryptosystems and methods of use will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-456531

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.