Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2005-03-25
2009-12-15
Moise, Emmanuel L (Department: 2437)
Cryptography
Particular algorithmic function encoding
C380S255000, C713S182000
Reexamination Certificate
active
07634085
ABSTRACT:
Systems and methods for supporting an identity-based-encryption (IBE) scheme with partial attribute matching capabilities are provided. Plaintext may be encrypted into ciphertext using an IBE public key that is based on an attribute set w. A recipient of the ciphertext may have the attributes in an overlapping but different attribute set w′. The recipient may request an IBE private key for decrypting the ciphertext from an IBE private key generator. After verifying the recipient's credentials, the IBE private key generator may generate IBE private key components based on the recipient's attribute set w′. The recipient may use an IBE private key SK constructed from the IBE private key components to decrypt the ciphertext. Decryption will be successful even though attribute set w′ is different from attribute set w, provided that the overlap |w∩w′| is greater than a threshold value.
REFERENCES:
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2004/0151308 (2004-08-01), Kacker et al.
patent: 2005/0002528 (2005-01-01), Chen et al.
patent: 2005/0039031 (2005-02-01), Mont et al.
patent: 2005/0084100 (2005-04-01), Spies et al.
patent: 2006/0123238 (2006-06-01), Kacker et al.
Yevgeniy Dodis et al., “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other Noisy Data” Eurocrypt 2004, pp. 1-47.
Ari Juels et al., “A Fuzzy Commitment Scheme,” 1999, ACM, 1-58113-148-8/99/0010, pp. 28-35.
M. Bellare et al., “Key-Privacy in Public-Key Encryption” Sep. 2001.
Dan Boneh et al. “Efficient Selective-ID-Secure Identity Based Encryption Without Random Oracles”, http://eprinit.iacr.org/2004/172 (Dec. 2004).
Dan Bonen et al., “Identity-Based Encryption from the Weil Pairing”, Siam J. of Computing vol. 32, No. 3, pp. 586-615 (2003).
Xavier Boyen, “Reusable Cryptographic Fuzzy Extractors”, http://eprint.iacr.org/2004/358/ (2004).
Ran Canetti et al., “A Forward-Secure Public-Key Encryption Scheme” (2003).
Yevgeniy Dodis et al., “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other Noisy Data” (2004).
Ari Juels et al., “A Fuzzy Commitment Scheme,” (1999).
Fabian Monrose “Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices” (Extended Abstract) (2002).
Fabian Monrose et al., “Password Hardening Based on Keystroke Dynamics” (1999).
Amit Sahai, “Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security” (1999).
Brent Waters, “Efficient identity-based Encryption Without Random Oracles” (2004).
Daneng Yao et al., “ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption” (2004).
Sahai Amit
Waters Brent R.
Kellogg David C.
Moise Emmanuel L
Pham Luu
Treyz G. Victor
Treyz Law Group
LandOfFree
Identity-based-encryption system with partial attribute... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identity-based-encryption system with partial attribute..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based-encryption system with partial attribute... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4074938