Cryptography – Key management – Key distribution
Reexamination Certificate
2007-12-04
2007-12-04
Smithers, Matthew B (Department: 2137)
Cryptography
Key management
Key distribution
Reexamination Certificate
active
10623008
ABSTRACT:
A method and apparatus is provided for securely transferring first and second data from a user to first and second parties respectively. More particularly, the user encrypts the first data using a first encryption key associated with the first party, and then encrypts the second data using, as encryption parameters, both public data of the first party and third data comprising the encrypted first data. The third data is then provided, preferably via the second party, to the first party, and the encrypted second data is provided to the second party. The first party uses a first decryption key to decrypt the encrypted first data, as provided to the first party in the third data, whereby to recover the first data. The first party also uses the third data, along with private data related to the aforesaid public data, to generate a second decryption key which is then provided to the second party to enable it to decrypt the encrypted second data.
REFERENCES:
patent: 4688250 (1987-08-01), Corrington et al.
patent: 7142676 (2006-11-01), Hillier et al.
patent: 2001/0039535 (2001-11-01), Tsiounis et al.
patent: 2002/0174075 (2002-11-01), Mirlas et al.
patent: 2003/0084001 (2003-05-01), Chang
patent: 2004/0010700 (2004-01-01), Mont
patent: 2004/0240666 (2004-12-01), Cocks
patent: 0 343 805 (1989-11-01), None
patent: 0 673 154 (1995-09-01), None
patent: 1 050 992 (2000-11-01), None
Levy, I., “An Overview of Identifier-Based Public Key Cryptography,”Internet and Wireless Security, IEE Publishing, pp. 121-131 (Apr. 22, 2002).
Levy, I., “Identifier Based PKC-Potential Applications,”1st Annual PKI Research Workshop, Communications-Electronics Security Group(CESG)Presentation, Gaithersburg, Maryland, pp. 1-42 (Apr. 25, 2002).
Menezes, A., et al.,Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and its Applications, Boca Raton, Florida, pp. 497-498, 507-508 (1997).
Boneh, Dan, et al., “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology, CRYPTO 2001, 2001, pp. 213-229.
Boneh, Dan, et al., “Identity-Based Mediated RSA,”3rd Workshop on Information Security Application, Aug. 2002.
Cocks, Clifford, “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptography and Coding, 2001, pp. 360-363.
Chen Liqun
Harrison Keith Alexander
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Smithers Matthew B
LandOfFree
Method and apparatus for securely transferring data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for securely transferring data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely transferring data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3874436