Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-08-29
2006-08-29
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C713S170000, C713S180000, C380S028000, C380S030000, C380S045000
Reexamination Certificate
active
07100051
ABSTRACT:
The invention provides for a cryptographic method for digital signature.A set S1of k polynomial functions Pk(x1, . . . , xn+v, y1, . . . , yk) are supplied as a public key, where k, v, and n are integers, x1, . . . , xn+vare n+v variables of a first type, and y1, . . . , ykare k variables of a second type, the set S1being obtained by applying a secret key operation on a given set S2of k polynomial functions P′k(a1, . . . , an+v, y1, . . . , yk), a1, . . . , an+vdesignating n+v variables including a set of n “oil” and v “vinegar” variables.A message to be signed is provided and submitted to a hash function to produce a series of k values b1, . . . , bk. These k values are substituted for the k variables y1, . . . . , ykof the set S2to produce a set S3of k polynomial functions P″k(a1, . . . , an+v), and v values a′n+1, . . . , a′n+1, are selected for the v “vinegar” variables. A set of equations P″k(a1, . . . , a′n+v)=0 is solved to obtain a solution for a′1, . . . , a′nand the secret key operation is applied to transform the solution to the digital signature.
REFERENCES:
patent: 5263085 (1993-11-01), Shamir
patent: 5351298 (1994-09-01), Smith
patent: 5375170 (1994-12-01), Shamir
patent: 5790675 (1998-08-01), Patarin
patent: 6076163 (2000-06-01), Hoffstein et al.
patent: 6111952 (2000-08-01), Patarin
Jacques Patarin, ‘Asymmetric Cryptography with a Hidden Monomial’, Springer-Verlag Heidelberg, Lecture Notes in Computer Science vol. 1109, pp. 45-60.
Patarin, J., “Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms,” Eurocrypt '96 Proceedings, May 1996, pp. 33-48.
Kipnis, A. and A. Shamir, “Cryptanalysis of the Oil and Vinegar Signature Scheme,” Crypto '98, Aug. 1998, pp. 257-266.
Kipnis, A. et al., “Unbalanced Oil and Vinegar Signature Schemes,” Eurocrypt '99, Aug. 1999, pp. 206-222.
T. Matsumoto et al., “Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption,” Advances in Crytology—Eurocrypt '88, vol. 330 of Lecture Notes in Computer Science, May 1988, pp. 415-418.
“The Oil and Vinegar Scheme,” Presented at the Dagstuml Workshop on Cryptography, Sep. 1997.
Goubin Louis
Kipnis Aviad
Patarin Jacques
Chen Shin-Hon
CP8 Technologies
Ladas and Parry LLP
NDS Limited
Sheikh Ayaz
LandOfFree
Public-key signature methods and systems does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Public-key signature methods and systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Public-key signature methods and systems will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3647891