Cryptography – Particular algorithmic function encoding – Public key
Patent
1994-09-26
1996-05-21
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Public key
380 21, H04L 908, H04L 930
Patent
active
055197787
ABSTRACT:
The present invention describes a method for enabling users of a cryptosystem to agree on secret keys. In one embodiment, a trusted agent chooses at least one individual key for each user, with at least a portion of such individual key being secret. At least some of the individual keys are then stored in physically secure devices, and the pair of users i and j use their individual keys to compute a common secret key. In another embodiment, each trustee of a group of trustees choose at least one individual key for each user, with at least some portion of such individual key being secret. The keys chosen by a sufficiently small number of such trustees, however, are insufficient for computing the common secret key of the users. Other hardware and software key exchange protocols based on these two techniques are also disclosed.
REFERENCES:
patent: 5124117 (1992-06-01), Tatebayashi et al.
patent: 5144665 (1992-09-01), Takaragi et al.
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
"Perfectly-Secure Key Distribution for Dynamic Conferences" Blundo, et al.; Crypto '92, pp. 11-6-11-13.
"Key Storage in Secure Networks" Mitchell, et al.; Discrete Applied Mathematics 21 (1988), pp. 215-228.
"Using Encryption for Authentication in Large Networks of Computers" Needham, et al.; Communications of the ACM (Dec. 1978), pp. 993-999.
"Securely Replicating Authentication Services" Gong, Li; IEEE 1989, pp. 85-91.
"An Optimal Class of Symmetric Key Generation Systems" Blom, Rolf; Advances in Cryptology: Proceedings of Eurocrypt '84; Lecture Notes in Computer Science; pp. 335-338.
"An Optimal Algorithm for Synchronous Byzantine Agreement" Feldman, et al.; MIT Laboratory for Computer Science (Jun. 1990).
"Data & Computer Security: Dictionary of Standards Concepts and Terms: " Longley, et al.; Macmillan Publishers (1987) pp. 11-13, 182-185, 188-191.
"Crypto Users'Handbook" Christoffersson, et al.; Elsevier Science Publishing Company, Inc. (1988) pp. 39-47, 66-67, 72-73.
Leighton Frank T.
Micali Silvio
Cangialosi Salvatore
Judson David H.
Micali Silvio
LandOfFree
Method for enabling users of a cryptosystem to generate and use does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for enabling users of a cryptosystem to generate and use , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for enabling users of a cryptosystem to generate and use will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2045646