Method and apparatus for hiding a private key

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07853018

ABSTRACT:
A method and system for hiding an encryption key. The method including creating a directed graph having a plurality of vertices and edges, including a source and a sink vertex. Each vertex has a vertex value. The source vertices have a common source value, and the sink vertices have a common sink value, the sink value being a function of the source value and the encryption key. Each edge has an edge value that is a function of r(in)−1and r(out) where r(in)−1is the functional inverse of the vertex value of the predecessor vertex and r(out) is the vertex value of the successor vertex. A message enters a source vertex; flows along a path from the source vertex to a sink vertex; and leaves the sink vertex, where the output message is an encrypted or decrypted version of the input message using the private encryption key.

REFERENCES:
patent: 4309569 (1982-01-01), Merkle
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5592552 (1997-01-01), Fiat
patent: 6226743 (2001-05-01), Naor et al.
patent: 6411715 (2002-06-01), Liskov
patent: 6532543 (2003-03-01), Smith
patent: 6542610 (2003-04-01), Traw
patent: 6594761 (2003-07-01), Chow
patent: 6779114 (2004-08-01), Chow et al.
patent: 6823068 (2004-11-01), Samid
patent: 6826687 (2004-11-01), Rohatgi
patent: 6842862 (2005-01-01), Chow
patent: 6912654 (2005-06-01), Murakami
patent: 6950518 (2005-09-01), Henson
patent: 7539697 (2009-05-01), Akella et al.
patent: 7574518 (2009-08-01), Jaggi et al.
patent: 7634091 (2009-12-01), Zhou et al.
patent: 2004/0078775 (2004-04-01), Chow
patent: 2004/0139340 (2004-07-01), Johnson
patent: 2005/0002532 (2005-01-01), Zhou et al.
patent: 2005/0036615 (2005-02-01), Jakobsson
patent: 2005/0138392 (2005-06-01), Johnson
patent: 2005/0175176 (2005-08-01), Venkatesan
patent: 2005/0220299 (2005-10-01), Lipson
patent: 2005/0220302 (2005-10-01), Mironov
patent: 2005/0246554 (2005-11-01), Batson
patent: 2006/0015514 (2006-01-01), Suga
patent: 2007/0016769 (2007-01-01), Gentry et al.
patent: 0946018 (1999-09-01), None
patent: 2004004341 (2004-01-01), None
patent: WO03065639 (2003-08-01), None
patent: WO2004006497 (2004-01-01), None
Atallah et al., “Survey of Anti-Tamper Technologies,” CrossTalk: The Journal of Defense Software Engineering, Nov. 2004, pp. 12-16.
Yao, Andrew, “Protocols Secure Computations,” IEEE 1982, pp. 1-5.
Goldreich et al., “How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest Majority,” ACM 1987, pp. 218-229.
Yao, Andrew, “How to Generate and Exchange Secrets,” 27th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, 1986, pp. 162-167.
Goldreich, Oded, “Secure Multi-Party Computations (Working Draft),” Weizmann Institute of Science, Rehovot, Israel, 1998, pp. 1-107.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for hiding a private key does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for hiding a private key, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for hiding a private key will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4231534

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.