Cryptography – Key management – Key distribution
Reexamination Certificate
2011-01-18
2011-01-18
Smithers, Matthew B (Department: 2437)
Cryptography
Key management
Key distribution
C380S044000
Reexamination Certificate
active
07873169
ABSTRACT:
Methods, devices and systems for generating a plurality of public keys from one private key with the same generator of a group are described. A public key cryptosystem is also disclosed for generating a plurality of anonymous public keys all of which relate to the same party used for secure communications. Those anonymous public keys are generated using the same generator from one single private key. With the invention, computation is reduced, memory can be saved and security level can be improved.
REFERENCES:
patent: 5901229 (1999-05-01), Fujisaki et al.
patent: 7434046 (2008-10-01), Srivastava
patent: 1258051 (2000-06-01), None
Bruce Schneier, “Applied Cryptography Second Edition: Protocols, Algorithms, and Source code in C”, 1996, Katherine Schowalter, Second Edition, pp. 476-479.
Jan Camenisch, Markus Michels, “A Group Signature Scheme with Improved Efficiency”, 2000, K.Ohta and D. Pei (Eds.): ASIACRYPT'98, INCS 1514, pp. 160-174.
Jan Leonhard Camenisch, “Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem”, 1998, A dissertaion submitted to the Swiss Federal Institute of Technology Zurich for the degree of Doctor of Technical Sciences, Diss. ETH No. 12520.
Zhang, N. Shi, Q. Merabti, M.; Anonymous public-key certificates for anonymous and fair documentexchange; Publication Date: Dec. 2000; vol. 147, Issue: 6; On pp. 345-350.
A Blind Signature Scheme Based on Elgamal Signature, Feb. 22-24, 2000, Seventeenth National Radio Science Conference.
B. R. Waters, E. W. Felten, A. Sahai; “Receiver Anonymity via Incomparable Public Keys”; CCS'03, Oct. 27-30, 2003; Washington DC, USA; pp. 112-121.
A. J. Menezes, P. C. van Oorschot; S. A. Vanstone; “Handbook of Applied Cryptography”; CRC Press LLC, 1997; Boca Raton FL, USA.
A Master Thesis of K. Oishi at the University of California Santa Barbara; “Unconditionally Anonymous Public-key Certificates and their Applications”; Aug. 1999.
Lidong Chen, “Access with Pseudonyms”, Lecture Notes in Computer Science; Proceedings of the International Conference on Cryptography: Policy and Algorithms, Dec. 31, 1995, pp. 232-243, vol. 1029, Springer-Verlag, London, UK.
L. Chen; “Access with Pseudonyms”; Cryptography: Policy and Algorithms; International Conference; Jul. 3, 1995; pp. 232-243.
Fujita Tomoyuki
Zeng Ke
NEC (China) Co., Ltd.
Sims Jing
Smithers Matthew B
Sughrue & Mion, PLLC
LandOfFree
Methods, devices and systems for generating anonymous public... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods, devices and systems for generating anonymous public..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, devices and systems for generating anonymous public... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2651162