Cryptography – Key management – Having particular key generator
Reexamination Certificate
2011-06-14
2011-06-14
Lanier, Benjamin E (Department: 2432)
Cryptography
Key management
Having particular key generator
C380S281000, C380S282000, C380S284000
Reexamination Certificate
active
07961879
ABSTRACT:
A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient over a communications network. IBE public key information may be used to encrypt messages and corresponding IBE private key information may be used to decrypt messages. Information on which IBE public key information was used in encrypting a given message may be provided to the message recipient with the message. Multiple IBE public keys may be used to encrypt a single message. A less sensitive IBE public key may be used to encrypt a more sensitive public key, so that the more sensitive public key can remain hidden as it is sent to the recipient.
REFERENCES:
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5159632 (1992-10-01), Crandall
patent: 5271061 (1993-12-01), Crandall
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5850443 (1998-12-01), Van Oorschot et al.
patent: 6061448 (2000-05-01), Smith et al.
patent: 6154541 (2000-11-01), Zhang
patent: 6952769 (2005-10-01), Dubey et al.
patent: 6986036 (2006-01-01), Wang et al.
patent: 7003667 (2006-02-01), Slick et al.
patent: 7016499 (2006-03-01), Perlman
patent: 7113594 (2006-09-01), Boneh et al.
patent: 7131003 (2006-10-01), Lord et al.
patent: 7175568 (2007-02-01), Eschenbach
patent: 7200230 (2007-04-01), Knauft
patent: 2002/0076042 (2002-06-01), Sandhu et al.
patent: 2003/0179885 (2003-09-01), Gentry et al.
patent: 2003/0198348 (2003-10-01), Mont et al.
patent: 02/51066 (2002-06-01), None
Cocks, Clifford, “An Identity Based Encryption Scheme based on Quadraitc Residues.” (2001).
Jeremy Horwitz, “Toward Hierarchical Identity-Based Encryption,” 2002, EUROCRYPT 2002, LNCS 2332, pp. 466-481.
Boneh, “Identity-Based Encryption from the Weil Pairing,” 2001, Advances in Cryptology—2001, LNCS 2139, pp. 213-229.
Jeremy Horwits and Ben Lynn, “Toward Hierarchical Identity-Based Encryption,” Advances in Cryptology: EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, pp. 466-481, 2002.
Xuejia Lai and James L. Massey, “A Proposal for a New Block Encryption Standard,” Advances in Cryptology—EUROCRYPT '90, pp. 389-404, Proceedings, LNCS 473, Springer-Verlag, 1991.
Appenzeller Guido
Kacker Rishi R.
Pauker Matthew J.
Spies Terence
Kellogg David C.
Lanier Benjamin E
Treyz G. Victor
Treyz Law Group
Voltage Security, Inc.
LandOfFree
Identity-based-encryption system with hidden public key... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identity-based-encryption system with hidden public key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based-encryption system with hidden public key... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2625247