Cryptography – Key management
Reexamination Certificate
2006-11-14
2006-11-14
Vu, Kim (Department: 2135)
Cryptography
Key management
C380S278000, C380S279000, C726S016000, C726S017000, C726S018000, C726S019000
Reexamination Certificate
active
07136489
ABSTRACT:
A method and system is provided for implementing a multilateral authorization quorum in a computer network. The authorization quorum comprises a total number of stakeholders out of which a threshold number of stakeholders can provide a multilateral authorization. To implement this multilateral authorization quorum, one or more access sets is first determined, each containing the threshold number of stakeholders. Since the stakeholders split a quorum private key, the shares of the quorum private key for each stakeholder in all access sets are determined. The shares of the private key held by the stakeholders in any one access set add up to a number directly related to the private key. One or more secret keys of the stakeholders are further determined for each access set. One or more polynomials for the access sets are then generated by using the shares of the private key and the secret keys thereof, wherein the private key is thus split among the stakeholders of the multilateral authorization quorum. Such a multilateral authorization quorum is ready to be used for making approvals for predetermined transactions.
REFERENCES:
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5604804 (1997-02-01), Micali
patent: 5610982 (1997-03-01), Micali
patent: 5675649 (1997-10-01), Brennan et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 6212281 (2001-04-01), Vanstone
patent: 6411716 (2002-06-01), Brickell
patent: 6701434 (2004-03-01), Rohatgi
patent: 6704867 (2004-03-01), Cordery
patent: 6731755 (2004-05-01), Cocks
L. Harn, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature”, IEE Proc.-Computers and Digital Techniques, vol. 141, No. 5, Sep. 1994, pp. 307-313.
Bruce Schneier, “Applied Cryptography”, second edition, 1996, pp. 508-510.
Shamir, Adi, “How to Share a Secret”, Massachusetts Institute of Technology, Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Desmedt, Y and Frankel, Y.,Threshold Cryptosystems, Advances in Cryptology, Crypto '89, Edited by Giles Brassard, Springer-Verlag, pp. 456 and 458-469.
Madhusudhana Honnuduke S.
Nagaraj Shishir
Tripathi Aridaman
Novell Inc.
Pich Ponnoreay
Vu Kim
LandOfFree
Method and system for enhancing network security using a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for enhancing network security using a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for enhancing network security using a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3621969