Identity-based-encryption system with partial attribute...

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S255000, C713S182000

Reexamination Certificate

active

07634085

ABSTRACT:
Systems and methods for supporting an identity-based-encryption (IBE) scheme with partial attribute matching capabilities are provided. Plaintext may be encrypted into ciphertext using an IBE public key that is based on an attribute set w. A recipient of the ciphertext may have the attributes in an overlapping but different attribute set w′. The recipient may request an IBE private key for decrypting the ciphertext from an IBE private key generator. After verifying the recipient's credentials, the IBE private key generator may generate IBE private key components based on the recipient's attribute set w′. The recipient may use an IBE private key SK constructed from the IBE private key components to decrypt the ciphertext. Decryption will be successful even though attribute set w′ is different from attribute set w, provided that the overlap |w∩w′| is greater than a threshold value.

REFERENCES:
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2004/0151308 (2004-08-01), Kacker et al.
patent: 2005/0002528 (2005-01-01), Chen et al.
patent: 2005/0039031 (2005-02-01), Mont et al.
patent: 2005/0084100 (2005-04-01), Spies et al.
patent: 2006/0123238 (2006-06-01), Kacker et al.
Yevgeniy Dodis et al., “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other Noisy Data” Eurocrypt 2004, pp. 1-47.
Ari Juels et al., “A Fuzzy Commitment Scheme,” 1999, ACM, 1-58113-148-8/99/0010, pp. 28-35.
M. Bellare et al., “Key-Privacy in Public-Key Encryption” Sep. 2001.
Dan Boneh et al. “Efficient Selective-ID-Secure Identity Based Encryption Without Random Oracles”, http://eprinit.iacr.org/2004/172 (Dec. 2004).
Dan Bonen et al., “Identity-Based Encryption from the Weil Pairing”, Siam J. of Computing vol. 32, No. 3, pp. 586-615 (2003).
Xavier Boyen, “Reusable Cryptographic Fuzzy Extractors”, http://eprint.iacr.org/2004/358/ (2004).
Ran Canetti et al., “A Forward-Secure Public-Key Encryption Scheme” (2003).
Yevgeniy Dodis et al., “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other Noisy Data” (2004).
Ari Juels et al., “A Fuzzy Commitment Scheme,” (1999).
Fabian Monrose “Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices” (Extended Abstract) (2002).
Fabian Monrose et al., “Password Hardening Based on Keystroke Dynamics” (1999).
Amit Sahai, “Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security” (1999).
Brent Waters, “Efficient identity-based Encryption Without Random Oracles” (2004).
Daneng Yao et al., “ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption” (2004).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identity-based-encryption system with partial attribute... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identity-based-encryption system with partial attribute..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based-encryption system with partial attribute... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4074938

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.