Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2008-07-22
2008-07-22
Moise, Emmanuel L (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S156000, C380S279000
Reexamination Certificate
active
07404078
ABSTRACT:
Private certificates designed to counteract problems associated with certificate lending are configured such that disclosure of a secret key associated with one certificate automatically results in disclosure of a secret key associated with another certificate, while the corresponding public keys are unlinkable with one another. In an illustrative private certificate generation protocol, a user generates verification information associated with a first public key. The verification information is generated at least in part using a corresponding first secret key. The verification information is supplied to a certification authority, which generates based at least in part on the first public key and the verification information a second public key having a corresponding second secret key, and generates a certificate based at least in part on the second public key. The private certificate generation protocol may be asymmetric or symmetric.
REFERENCES:
patent: 5796833 (1998-08-01), Chen et al.
patent: 6477254 (2002-11-01), Miyazaki et al.
patent: 6615347 (2003-09-01), de Silva et al.
patent: 2002/0038420 (2002-03-01), Collins et al.
patent: 2317213 (2002-03-01), None
Menezes et al.□□Handbook of Applied Cryptography□□1997□□CRC Press□□pp. 559-561.
Oded Goldreich, Birgit Ptzmann, and Ronald L. Rivest. Self-delegation with controlled propagation—or—what if you lose your laptop. In Advances in Cryptology|CRYPTO 98, pp. 153-168. Springer-Verlag, 1998.
S. Brands, “Untraceable Off-Line Cash in Wallet with Observers,” Springer-Verlag, pp. 302-318, 1998.
O. Goldreich et al., “Self-Delegation with Controlled Propagation—or—What if You Lose Your Laptop,” Proc. of Crypto '98, vol. 1462 of LNCS, IACR, Springer-Verlag, pp. 0-18, 1998.
Jakobsson Bjorn Markus
Nguyen Phong Q.
Brown Kenneth M.
Lucent Technologies
Moise Emmanuel L
Pearson David J
LandOfFree
Methods and apparatus for private certificates in public key... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for private certificates in public key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for private certificates in public key... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2790595