Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
2005-08-16
2005-08-16
Barrón, Gilberto (Department: 2132)
Cryptography
Particular algorithmic function encoding
Public key
C380S028000, C713S169000, C713S176000
Reexamination Certificate
active
06931126
ABSTRACT:
A fast encryption method particularly useful for long message lengths is provided. A message m is encrypted using a transmitter secret key z to form a quantity E. A transmitter processor prepares a quadruplet (anew, bnew,snew, E) where:in-line-formulae description="In-line Formulae" end="lead"?anew=z*ycmodulop;in-line-formulae description="In-line Formulae" end="tail"?in-line-formulae description="In-line Formulae" end="lead"?bnew=gcmodulop;in-line-formulae description="In-line Formulae" end="tail"?in-line-formulae description="In-line Formulae" end="lead"?snew=signaturec(anew,bnew,E).in-line-formulae description="In-line Formulae" end="tail"?As in previous embodiments y=gxmodulo p is the public key and x is the receiver secret key. The parameters g, x, and p according to methods known to a person skilled in the art and the parameter g is a generator of the group Gp. The parameter c is a random number. The transmitter processor sends the quadruplet (anew, bnew,snew, E) to a receiver processor. The receiver processor verifies the signature on snewusing methods known in the art. The receiver processor then decrypts anewand bnewusing the receiver secret key x to get the transmitter secret key z, i.e. in the following manner z=anew/bnewx. The receiver processor uses the transmitter secret key z to decrypt E to get the message M.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5271061 (1993-12-01), Crandall
patent: 5539826 (1996-07-01), Dwork et al.
patent: 5721781 (1998-02-01), Deo et al.
patent: 6396928 (2002-05-01), Zheng
patent: 6507656 (2003-01-01), Jakobsson
Schneier, Bruce; Applied Cryptography; 1996; John Wiley & Sons, Inc.; 2nd Edition; pp. 21-46, 213-229, 461-525.
Dolev et al.; ‘Non-Malleable Cryptography’; 1991; ACM; pp. 542-552.
Grescenzo et al.; ‘Non-Interactive and Non-Malleable Commitment’; 1998; ACM; pp. 141-150.
ElGamal, Taher; ‘A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms’; Jul. 1985; IEEE Transactions on Information Theory; vol. 31, No. 4; pp. 469-472.
T. Beth et al, “Non Supersingular Elliptic Curves for Public Key Cryptosystems”, © 1998, Springer-Verlag, 1-12, Universitat Karlsruhe.
Victor S. Miller, “Use of Elliptic Curves in Cryptography”, © 1998, Springer-Verlag, 1-11, IBM Research.
Jakobsson Bjorn Markus
Schnorr Claus Peter
Barrón Gilberto
Kim Jung
Lucent Technologies - Inc.
LandOfFree
Non malleable encryption method and apparatus using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Non malleable encryption method and apparatus using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Non malleable encryption method and apparatus using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3494940