Identity-based encryption system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S150000

Reexamination Certificate

active

07831829

ABSTRACT:
A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver's identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver generates a private key for the receiver. The encrypted message may be decrypted by the receiver using the receiver's private key. The system may have multiple private key generators, each with a separate set of public parameters. Directory services may be used to provide a sender that is associated with one private key generator with appropriate public parameters to use when encrypting messages for a receiver that is associated with a different private key generator. A certification authority may be used to sign directory entries for the directory service. A clearinghouse may be used to avoid duplicative directory entries.

REFERENCES:
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5159632 (1992-10-01), Crandall
patent: 5271061 (1993-12-01), Crandall
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5715403 (1998-02-01), Stefik
patent: 6061448 (2000-05-01), Smith et al.
patent: 6236971 (2001-05-01), Stefik
patent: 6816970 (2004-11-01), Morgan et al.
patent: 6823457 (2004-11-01), Berstis et al.
patent: 6826689 (2004-11-01), Hou
patent: 7017181 (2006-03-01), Spies et al.
patent: 2002/0076042 (2002-06-01), Sandhu et al.
Private Key Management in Hierarchical Identity-Based Encryption; Zhongren Liu; Li Xu; Zhide Chen; Fuchun Guo; Signal-Image Technologies and Internet-Based System, 2007. SITIS '07. Third International IEEE Conference on Dec. 16-18, 2007 pp. 206-212.
Identity based digital signature algorithm of XTR system; Zhao Jia ; Liu Jidiang ; Han Zhen; Shen Changxiang; Sch. of Comput. & Inf. Technol., Beijing Jiaotong Univ., Beijing; Signal Processing, 2008. ICSP 2008. 9th International Conference on; Oct. 26-29, 2008; on pp. 2816-2819.
http:/www.sei.cmu.edu/str/descriptions/publickey—body.html.
Mont et al. “The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time,” Hewlett-Packard Company, Sep. 2002.
Atkins et al. “PGP Message Exchange Formats,” Informational Request for Comments (Aug. 1996).
Boneh et al. “Identity-Based Encryption from the Weil Pairing,” from Crypto '2001 (Oct. 2002).
Cocks, Clifford, “An Identity Based Encryption Scheme Based on Quadratic Residues.” (2001).
Horwitz et al. “Toward Hierarchical Identity-Based Encryption,” Proceedings of EUROCRYPT 2002 (Apr. 28, 2002-May 2, 2002) Lecture-Notes in Computer Science, Stanford University.
Housley et al. “Internet X.509 Public Key Infrastructure Certificate and CRL Profile,” standards Track Request for Comments (Jan. 1999).
Xuejia Lai et al., “A Proposal for a New Block Encryption Standard,” Advances in Cryptology—EUROCRYPT 1990 Proceedings, Springer Verlag, pp. 389-404 (1991).
Rivest et al. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” from The Communications of the ACM (Feb. 1978).
Gentry et al., “Hierarchical ID-Based Cryptography”, Cryptology ePrint Archive: Report 2002/056, May 24, 2002, [online], retrieved Apr. 27, 2010, <http://eprint.iacr.org/2002/056.pdf>.
Menezes et al. “Handbook of Applied Cryptography” Jan. 1997, CRC PRESS, CRC Series on Applied Mathematics and its Applications, ISBN: 0849385237, p. 570 paragraph 13.6 - p. 572, paragraph 13.40.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identity-based encryption system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identity-based encryption system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based encryption system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4158459

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.