Method and apparatus for verifiably providing key recovery infor

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04L 900

Patent

active

059076186

ABSTRACT:
A method and apparatus for verifiably providing key recovery information to one or more trustees in a cryptographic communication system having a sender and a receiver Each communicating party has its own Diffie-Hellman key pair comprising a secret value and corresponding public value, as does each trustee The sender non-interactively generates from its own secret value and the public value held by the receiver a first shared Diffie-Hellman key pair comprising a first shared secret value, shared with the receiver but not with any trustee, and a corresponding public value. For each trustee, the sender then non-interactively generates an additional shared secret value, shared with the receiver and the trustee, from the first shared secret value and the public value corresponding to the secret value held by the trustee. The sender uses the additional shared secret value to encrypt recovery information for each trustee, which is transmitted to the receiver along with the encrypted message. Each trustee can decrypt its recovery information by regenerating its additional shared secret value from its own secret value and the public value of the first shared Diffie-Hellman key pair. The receiver can verify the correctness of the recovery information for each trustee by decrypting the information using the additional shared secret value for that trustee, without having to recreate the recovery information or perform computationally expensive public key operations.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557765 (1996-09-01), Lipner
patent: 5796830 (1996-08-01), Johnson et al.
"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communication of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40.
"Alternatives to RSA Using Diffie-Hellman With DSS", (1996), pub. at http://www.cylink.com/products/security/rsa/rsa-dss2.htm.
"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40.
"Alterantives To RSA Using Diffie-Hellman With DSS", (1996), pub. at http://www.cylink.com/products/security/rsa/rsa.dss2.htm.
"Binding Cryptography. A fraud-detectible alternative to key-escrow proposals", E. Verheul et at., (1996), published at http://cwix.kub.nl./.sup..about. frw/people/koops/binding.htm.
"Binding the ElGamal Encryption Scheme", E. Verheul et al., (1996), published at http://cwis.dub.nl/.sup..about. frw/people/koops/bindtech.htm.
"New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
"To Tap or Not To Tap", D. Denning, Communications of the ACM, vol. 36, No. 3, Mar. 1993, pp. 26-33.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for verifiably providing key recovery infor does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for verifiably providing key recovery infor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for verifiably providing key recovery infor will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-406256

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.