Methods and apparatus for private certificates in public key...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C380S279000

Reexamination Certificate

active

07404078

ABSTRACT:
Private certificates designed to counteract problems associated with certificate lending are configured such that disclosure of a secret key associated with one certificate automatically results in disclosure of a secret key associated with another certificate, while the corresponding public keys are unlinkable with one another. In an illustrative private certificate generation protocol, a user generates verification information associated with a first public key. The verification information is generated at least in part using a corresponding first secret key. The verification information is supplied to a certification authority, which generates based at least in part on the first public key and the verification information a second public key having a corresponding second secret key, and generates a certificate based at least in part on the second public key. The private certificate generation protocol may be asymmetric or symmetric.

REFERENCES:
patent: 5796833 (1998-08-01), Chen et al.
patent: 6477254 (2002-11-01), Miyazaki et al.
patent: 6615347 (2003-09-01), de Silva et al.
patent: 2002/0038420 (2002-03-01), Collins et al.
patent: 2317213 (2002-03-01), None
Menezes et al.□□Handbook of Applied Cryptography□□1997□□CRC Press□□pp. 559-561.
Oded Goldreich, Birgit Ptzmann, and Ronald L. Rivest. Self-delegation with controlled propagation—or—what if you lose your laptop. In Advances in Cryptology|CRYPTO 98, pp. 153-168. Springer-Verlag, 1998.
S. Brands, “Untraceable Off-Line Cash in Wallet with Observers,” Springer-Verlag, pp. 302-318, 1998.
O. Goldreich et al., “Self-Delegation with Controlled Propagation—or—What if You Lose Your Laptop,” Proc. of Crypto '98, vol. 1462 of LNCS, IACR, Springer-Verlag, pp. 0-18, 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and apparatus for private certificates in public key... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and apparatus for private certificates in public key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for private certificates in public key... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2790595

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.