Method and system for enhancing network security using a...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S278000, C380S279000, C726S016000, C726S017000, C726S018000, C726S019000

Reexamination Certificate

active

07136489

ABSTRACT:
A method and system is provided for implementing a multilateral authorization quorum in a computer network. The authorization quorum comprises a total number of stakeholders out of which a threshold number of stakeholders can provide a multilateral authorization. To implement this multilateral authorization quorum, one or more access sets is first determined, each containing the threshold number of stakeholders. Since the stakeholders split a quorum private key, the shares of the quorum private key for each stakeholder in all access sets are determined. The shares of the private key held by the stakeholders in any one access set add up to a number directly related to the private key. One or more secret keys of the stakeholders are further determined for each access set. One or more polynomials for the access sets are then generated by using the shares of the private key and the secret keys thereof, wherein the private key is thus split among the stakeholders of the multilateral authorization quorum. Such a multilateral authorization quorum is ready to be used for making approvals for predetermined transactions.

REFERENCES:
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5604804 (1997-02-01), Micali
patent: 5610982 (1997-03-01), Micali
patent: 5675649 (1997-10-01), Brennan et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 6212281 (2001-04-01), Vanstone
patent: 6411716 (2002-06-01), Brickell
patent: 6701434 (2004-03-01), Rohatgi
patent: 6704867 (2004-03-01), Cordery
patent: 6731755 (2004-05-01), Cocks
L. Harn, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature”, IEE Proc.-Computers and Digital Techniques, vol. 141, No. 5, Sep. 1994, pp. 307-313.
Bruce Schneier, “Applied Cryptography”, second edition, 1996, pp. 508-510.
Shamir, Adi, “How to Share a Secret”, Massachusetts Institute of Technology, Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Desmedt, Y and Frankel, Y.,Threshold Cryptosystems, Advances in Cryptology, Crypto '89, Edited by Giles Brassard, Springer-Verlag, pp. 456 and 458-469.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for enhancing network security using a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for enhancing network security using a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for enhancing network security using a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3621969

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.