Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-07-24
2007-07-24
Vu, Kim (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C380S255000, C380S028000, C380S030000
Reexamination Certificate
active
09390362
ABSTRACT:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
REFERENCES:
patent: 5600725 (1997-02-01), Rueppel et al.
patent: 5915024 (1999-06-01), Kitaori et al.
patent: 2001/0046291 (2001-11-01), Vanstone et al.
patent: 0 639 907 (1995-02-01), None
patent: 0639907 (1995-02-01), None
patent: 0918274 (1999-05-01), None
patent: WO 01 10078 (2001-02-01), None
ISO/IEC FCD 9796-1: Digital Signature Schemes giving message recovery. Part 1: Mechanisms using redundancy. ISO/IEC JTC 1/SC27, Jul. 7, 1999, No. 2352, Berlin, Germany.
Coron, J.-S., Naccache, D., Stern, J.P., “On the Security of RSA Padding”, Advances in Cryptology CRYPTO'99, Proceedings of the 19thAnnual International Cyrptology Conference, Aug. 19, 1999, pp. 1-18, Springer-Verlag, Berlin, Germany.
Handbook of Applied Cryptography, by Menezes, Alfred J., Oorschot Paul C. van, Vanstone, Scott A., p. 363.
Coron, J.-S., Naccache, D., Stern, J.P., “On the Security of RSA Padding”, Advances in Cryptology CRYPTO'99, Proceedings of the 19th Annual International Cryptology Conference, Aug. 19, 1999, pp. 1-18, Springer-Verlag, Berlin, Germany.
Nyberg, K. et al., “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem”, Designs, Codes and Cryptography, 1996, pp. 61-81, vol. 7, No. 1-2, Kluwer Academic Publishers, Boston, U.S.
“ISO/IEC FCD 9796-1: Digital signature schemes giving message recovery. Part 1: Mechanisms using redundancy.” ISO/IEC JTC1/SC27, Jul. 7, 1999, No. 2352, Berlin, Germany.
ISO/IEC 9796-2, “Information technology—Security techniques—Digital signature schemes given message recovery—Part 2: Mechanisms using a hash function”, International Standard, Sep. 1, 1997.
Gallant Robert
Lambert Robert J.
Pintsov Leon A.
Ryan Jr. Frederick W.
Singer Ari
Certicom Corp.
Dowell Ralph A.
Orange John R. S.
Pich Ponnoreay
Vu Kim
LandOfFree
Hybrid signature scheme does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hybrid signature scheme, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hybrid signature scheme will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3739264