Methods, devices and systems for generating anonymous public...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000

Reexamination Certificate

active

07873169

ABSTRACT:
Methods, devices and systems for generating a plurality of public keys from one private key with the same generator of a group are described. A public key cryptosystem is also disclosed for generating a plurality of anonymous public keys all of which relate to the same party used for secure communications. Those anonymous public keys are generated using the same generator from one single private key. With the invention, computation is reduced, memory can be saved and security level can be improved.

REFERENCES:
patent: 5901229 (1999-05-01), Fujisaki et al.
patent: 7434046 (2008-10-01), Srivastava
patent: 1258051 (2000-06-01), None
Bruce Schneier, “Applied Cryptography Second Edition: Protocols, Algorithms, and Source code in C”, 1996, Katherine Schowalter, Second Edition, pp. 476-479.
Jan Camenisch, Markus Michels, “A Group Signature Scheme with Improved Efficiency”, 2000, K.Ohta and D. Pei (Eds.): ASIACRYPT'98, INCS 1514, pp. 160-174.
Jan Leonhard Camenisch, “Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem”, 1998, A dissertaion submitted to the Swiss Federal Institute of Technology Zurich for the degree of Doctor of Technical Sciences, Diss. ETH No. 12520.
Zhang, N. Shi, Q. Merabti, M.; Anonymous public-key certificates for anonymous and fair documentexchange; Publication Date: Dec. 2000; vol. 147, Issue: 6; On pp. 345-350.
A Blind Signature Scheme Based on Elgamal Signature, Feb. 22-24, 2000, Seventeenth National Radio Science Conference.
B. R. Waters, E. W. Felten, A. Sahai; “Receiver Anonymity via Incomparable Public Keys”; CCS'03, Oct. 27-30, 2003; Washington DC, USA; pp. 112-121.
A. J. Menezes, P. C. van Oorschot; S. A. Vanstone; “Handbook of Applied Cryptography”; CRC Press LLC, 1997; Boca Raton FL, USA.
A Master Thesis of K. Oishi at the University of California Santa Barbara; “Unconditionally Anonymous Public-key Certificates and their Applications”; Aug. 1999.
Lidong Chen, “Access with Pseudonyms”, Lecture Notes in Computer Science; Proceedings of the International Conference on Cryptography: Policy and Algorithms, Dec. 31, 1995, pp. 232-243, vol. 1029, Springer-Verlag, London, UK.
L. Chen; “Access with Pseudonyms”; Cryptography: Policy and Algorithms; International Conference; Jul. 3, 1995; pp. 232-243.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods, devices and systems for generating anonymous public... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods, devices and systems for generating anonymous public..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, devices and systems for generating anonymous public... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2651162

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.