Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-09-12
1999-11-23
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 30, H04L 900
Patent
active
059914149
ABSTRACT:
A solution to the general problem of Secure Storage and Retrieval of Information (SSRI) guarantees that also the process of storing the information is correct even when some processors fail. A user interacts with the storage system by depositing a file and receiving a proof that the deposit was correctly executed. The user interacts with a single distinguished processor called the gateway. The mechanism enables storage in the presence of both inactive and maliciously active faults, while maintaining (asymptotical) space optimailty. This mechanism is enhanced with the added requirement of confidentiality of information; i.e., that a collusion of processors should not be able to learn anything about the information. Also, in this case space optimality is preserved.
REFERENCES:
patent: 5485474 (1996-01-01), Rabin
patent: 5491749 (1996-02-01), Rogaway et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5544322 (1996-08-01), Cheng et al.
patent: 5604490 (1997-02-01), Blakely et al.
patent: 5752041 (1998-05-01), Fosdick
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5832211 (1998-11-01), Blakely, III et al.
David Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Crypto 82, Aug. 1982, pp. 199-203.
Ran Canetti et al., "Proactive Security: Long-Term Protection Against Break-Ins", RSA Laboratories' CryptoBytes, vol. 3, No. 1, Spring 1997, pp. 1-16.
D. Chaum, "Achieving Electronic Privacy", Scientific American, Aug. 1992, pp. 96-101. Copyright .COPYRGT. 1992.
Hugo Krawczyk, "Secret Sharing Made Short", Advances in Cryptology--Crypto 1993, Lecture Notes in Computer Science, pp. 136-146, Springer-Verlag, 1993.
Krawczyk, H., "Distributed Fingerprints and Secure Information Dispersal", Proc. 20.sup.th Anual ACM Symp. On Principles of Disb.backslash.tributed Computing, pp. 207-218, Ithaca, NY, 1993.
Y.G. Desmedt, "Threshold cryptography". European Transactions on Telecommunications, 5(4):449-457, Jul. 1994.
Rabin M., "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance", Journal of the ACM, vol. 36(2), pp.335-348, 1989.
Bellare M. et al., "Keying Hash Functions for Message Authentication," Proc. Advances in Cryptology--CRYPTO 1996, LNCS vol. 1109, Springer-Verlag, pp. 1-15, 1996.
L. Lamport et al., The Byzantine General Problem, ACM Trans. Prog. Lang. and Systems, 4:3 (1982), pp. 382-401.
Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, pp. 612-613, 1979.
Garay Juan Alberto
Gennaro Rosario
Jutla Charanjit Singh
Rabin Tal D.
Cangialosi Salvatore
Herzberg Louis P.
International Business Machines - Corporation
LandOfFree
Method and apparatus for the secure distributed storage and retr does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for the secure distributed storage and retr, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for the secure distributed storage and retr will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1231226