Cryptography – Key management – Having particular key generator
Reexamination Certificate
2008-07-08
2008-07-08
Zand, Kambiz (Department: 2134)
Cryptography
Key management
Having particular key generator
C380S030000, C380S286000
Reexamination Certificate
active
07397917
ABSTRACT:
A method and apparatus are provided for generating a cryptographic key from multiple data sets each related to a respective association of a trusted party and user identity. The cryptographic key is, for example, one of an encryption key, a decryption key, a signature key and a verification key, and is preferably generated by applying Tate or Weil bilinear mappings to the data sets. At least two of the data sets may relate to different user identities and/or different trusted authorities. Where multiple trusted authorities are involved, these authorities may be associated with different elements to which the bilinear mapping can be applied, each trusted authority having an associated public key formed from its associated element and a secret of that trusted authority.
REFERENCES:
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5917911 (1999-06-01), Dabbish et al.
patent: 2002/0049910 (2002-04-01), Salomon et al.
patent: 2002/0078354 (2002-06-01), Sandhu et al.
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2003/0115457 (2003-06-01), Wildish et al.
patent: 2003/0179885 (2003-09-01), Gentry et al.
patent: 2003/0182554 (2003-09-01), Gentry et al.
patent: 0 876 028 (1998-11-01), None
patent: 1 130 844 (2001-09-01), None
patent: 1 185 027 (2002-03-01), None
patent: 00/05836 (2000-02-01), None
patent: 03/017559 (2003-02-01), None
Gentry, Craig et al. “Hierarchical ID-Based Cryptography”, ASIACRYPT 2002.
Hess, Florian. “Efficient Identity Based Signature Schemes Based on Pairings”, 9th Annual International Workshop, SAC 2002 St. John's Newfoundland, Canada, Aug. 15-16, 2002.
Horwitz, J., et al., “Toward Hierarchical Identity-Based Encryption,”EUROCRYPT 2002, LNCS 2332, pp. 466-481 (2002).
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology—CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag (2001).
Frey, G., et al., “The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems,”IEEE Transactions on Information Theory, vol. 45, No. 5, pp. 1717-1719 (1999).
European Office Action for EP30 254 262.3 (Mar. 18, 2004).
Response to European Office Action for EP3 02 54 262.3 (Jun. 28, 2004).
Shamir, A, “How to Share a Secret,” Nick Szabo's Papers and Concise Tutorials, (Jun. 25, 2004).
Chen Liqun
Harrison Keith Alexander
Soldera David
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Simitoski Michael J.
Zand Kambiz
LandOfFree
Method and apparatus for generating a cryptographic key does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for generating a cryptographic key, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for generating a cryptographic key will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2795776