Method and structure for challenge-response signatures and...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S069000

Reexamination Certificate

active

07747865

ABSTRACT:
A method (and structure) of exchange between two parties interconnected by a device or network. A recipient party (verifier) chooses a secret value x for computing a value X=F1(x), where F1 comprises a first predetermined function having at least one argument, the value x being one of the at least one argument of F1. A signing party (signer) chooses a secret value y for computing a value Y=F2(y), where F2 comprises a second predetermined function having at least one argument, the value y being one of the at least one argument of F2. The signer obtains the value X, and the signer has a private key b and a public key B. The signer computes a value s=F3(y,b,X), where F3 comprises a third predetermined function having at least three arguments: the value y, the private key b, and the value X being three arguments of the at least three arguments of F3. There exists a fourth predetermined function F4(x,Y,B) to calculate a value s′, F4 having at least three arguments: the value x, the value Y, and the public key B being three arguments of the at least three arguments of F4, but the value s is not an argument of F4. There exists no secret shared between the verifier and the signer that serves as a basis for any argument in any of the functions F1, F2, F3, and F4. The verifier can consider the values s and s′ as valid authenticators if value s′ is determined to be related in a predetermined manner to value s.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5761305 (1998-06-01), Vanstone et al.
patent: 6212281 (2001-04-01), Vanstone
patent: 6226383 (2001-05-01), Jablon
patent: 6487661 (2002-11-01), Vanstone et al.
patent: 7073068 (2006-07-01), Jakobsson et al.
patent: 7127063 (2006-10-01), Lambert et al.
P. Rogaway, M. Bellare and D. Boneh, “Evaluation of Security Level of Cryptography: ECMQVS (from SEC 1)”, CRYPTREC report, Information Technology Promotion Agency, Japan, Jan. 2001. Available at http//www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1069—ks-ecmqv.pdf.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and structure for challenge-response signatures and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and structure for challenge-response signatures and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and structure for challenge-response signatures and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4245285

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.