Method and apparatus for encrypting, decrypting, and providing p

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 28, 708174, H04L 912, H04K 110

Patent

active

060496134

ABSTRACT:
A mix network with superior privacy and robustness is provided. An apparatus comprising a duplicator and first and second operation modules is disclosed. The first and second operation modules are each comprised of first and second processors. Each processor is comprised of a partial operation device. The duplicator preferably duplicates a vector of encrypted inputs, and provides first and second substantially similar duplicated vectors, to the first and second operation modules, respectively. The partial operation device of the first processor of the first operation module partially operates on the first duplicated vector, then supplies the result to the partial operation device of the second processor of the first operation module which partially operates on it to provide a fully operated on first duplicated vector. Likewise, the partial operation device of the first processor of the second operation module partially operates on the second duplicated vector, then supplies the result to the partial operation device of the second processor of the second operation module which partially operates on the partially operates on the second duplicated vector to provide a fully operated on first duplicated vector. A means for comparing compares the fully operated on first duplicated vector with the fully operated on second duplicated vector.

REFERENCES:
patent: 5682428 (1997-10-01), Johnson
patent: 5892775 (1999-04-01), Jayant et al.
Taher EIGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discreet Logarithms", 1-9, Hewlett Packard Labs, California.
Choonsik Park, et al, "Efficient Anonymous Channel and All/Nothing Election Scheme", 1-12., Tokyo Institute of Technology.
Torben Pryds Pedersen, "Distributed Provers with Applications to Undeniable Signatures", 1-22, Aarhus University, Denmark.
Heys, H.M. et al., "Avalanche Characteristics of Substitution-Permutation Encryption Networks," IEEE Transactions on Computers, vol. 44, No. 9, Sep. 1995, pp. 1131-1139.
Information and Communications Security, Yongfei Han, Tatsuaki Okamoto, Sihan Qing (Eds.), First International Conference, ICIS '97, Beijing, China, Nov. 11-14, 1997 Proceedings, Fault Tolerant Anonymous Channel, pp. 440-444 (see references cited therein also).
C. Gulcu, G. Tsudik, "Mixing email with babel," ISOC Symposium on Network and Distributed System Security, 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for encrypting, decrypting, and providing p does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for encrypting, decrypting, and providing p, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for encrypting, decrypting, and providing p will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1182576

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.