Public-key signature methods and systems

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S170000, C713S180000, C380S028000, C380S030000, C380S045000

Reexamination Certificate

active

07100051

ABSTRACT:
The invention provides for a cryptographic method for digital signature.A set S1of k polynomial functions Pk(x1, . . . , xn+v, y1, . . . , yk) are supplied as a public key, where k, v, and n are integers, x1, . . . , xn+vare n+v variables of a first type, and y1, . . . , ykare k variables of a second type, the set S1being obtained by applying a secret key operation on a given set S2of k polynomial functions P′k(a1, . . . , an+v, y1, . . . , yk), a1, . . . , an+vdesignating n+v variables including a set of n “oil” and v “vinegar” variables.A message to be signed is provided and submitted to a hash function to produce a series of k values b1, . . . , bk. These k values are substituted for the k variables y1, . . . . , ykof the set S2to produce a set S3of k polynomial functions P″k(a1, . . . , an+v), and v values a′n+1, . . . , a′n+1, are selected for the v “vinegar” variables. A set of equations P″k(a1, . . . , a′n+v)=0 is solved to obtain a solution for a′1, . . . , a′nand the secret key operation is applied to transform the solution to the digital signature.

REFERENCES:
patent: 5263085 (1993-11-01), Shamir
patent: 5351298 (1994-09-01), Smith
patent: 5375170 (1994-12-01), Shamir
patent: 5790675 (1998-08-01), Patarin
patent: 6076163 (2000-06-01), Hoffstein et al.
patent: 6111952 (2000-08-01), Patarin
Jacques Patarin, ‘Asymmetric Cryptography with a Hidden Monomial’, Springer-Verlag Heidelberg, Lecture Notes in Computer Science vol. 1109, pp. 45-60.
Patarin, J., “Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms,” Eurocrypt '96 Proceedings, May 1996, pp. 33-48.
Kipnis, A. and A. Shamir, “Cryptanalysis of the Oil and Vinegar Signature Scheme,” Crypto '98, Aug. 1998, pp. 257-266.
Kipnis, A. et al., “Unbalanced Oil and Vinegar Signature Schemes,” Eurocrypt '99, Aug. 1999, pp. 206-222.
T. Matsumoto et al., “Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption,” Advances in Crytology—Eurocrypt '88, vol. 330 of Lecture Notes in Computer Science, May 1988, pp. 415-418.
“The Oil and Vinegar Scheme,” Presented at the Dagstuml Workshop on Cryptography, Sep. 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Public-key signature methods and systems does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Public-key signature methods and systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Public-key signature methods and systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3647891

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.