Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-04-26
2005-04-26
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S182000
Reexamination Certificate
active
06886096
ABSTRACT:
A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver's identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver generates a private key for the receiver. The encrypted message may be decrypted by the receiver using the receiver's private key. The system may have multiple private key generators, each with a separate set of public parameters. Directory services may be used to provide a sender that is associated with one private key generator with appropriate public parameters to use when encrypting messages for a receiver that is associated with a different private key generator. A certification authority may be used to sign directory entries for the directory service. A clearinghouse may be used to avoid duplicative directory entries.
REFERENCES:
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5159632 (1992-10-01), Crandall
patent: 5271061 (1993-12-01), Crandall
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5715403 (1998-02-01), Stefik et al.
patent: 6061448 (2000-05-01), Smith et al.
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6816970 (2004-11-01), Morgan et al.
patent: 6823457 (2004-11-01), Berstis et al.
patent: 6826689 (2004-11-01), Hou
patent: 20020076042 (2002-06-01), Sandhu et al.
http://www.sei.cmu.edu/str/descriptions/publickey_body.html.*
Atkins et al., “PGP Message Exchange Formats,” Informational Request for Comments (Aug. 1996).
Boneh et al., “Identity-Based Encryption from the Weil Pairing,” FromCrypto '2001( Oct. 2002).
Cocks, Clifford, “An Identity Based Encryption Scheme based on Quadratic Residues.” (2001).
Horwitz et al., “Toward Hierarchical Identity-Based Encryption,”Proceedings of EUROCRYPT 2002, (Apr. 28, 2002-May 2, 2002) Lecture-Notes in Computer Science, Stanford University.
Housley et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile,” Standards Track Request for Comments (Jan. 1999).
Lai et al., “A Proposal for a New Block Encryption Standard, ”Advances in Cryptology: EUROCRYPT 1990 Proceedings, Springer Verlag: pp. 389-404 (1991).
Rivest et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” fromThe Communications of the ACM(Feb. 1978).
Mont et al., The HP Time Vault Service: Innovating the way confidential information is disclosed, at the right time http://www.hpl.hp.com/techreports/2002/HPL-2002-243.html (2002).
Appenzeller Guido
Kacker Rishi R.
Pauker Matthew J.
Jung David
Treyz G. Victor
Voltage Security, Inc.
LandOfFree
Identity-based encryption system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identity-based encryption system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based encryption system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3435580