Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2006-02-07
2006-02-07
Moise, Emmanuel L. (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S193000, C380S028000, C380S037000, C380S044000, C380S260000, C380S277000, C380S286000
Reexamination Certificate
active
06996724
ABSTRACT:
At the time when generating a secret key of each entity by using each divided identification information (ID division vector) obtained by dividing identification information (ID vector) of each entity into a plurality of blocks and by using a secret symmetric matrix of each key generating agency (center), a part of the components of the symmetric matrix is extracted in accordance with each divided identification information (ID division vector) so that the extracted components are synthesized with a random number particular to each entity so as to generate a secret key of each entity.
REFERENCES:
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4399323 (1983-08-01), Henry
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5220606 (1993-06-01), Greenberg
patent: 5966449 (1999-10-01), Iwamura et al.
patent: 5987129 (1999-11-01), Baba
patent: 6289454 (2001-09-01), Eslinger et al.
patent: 6298137 (2001-10-01), Hoffstein et al.
patent: 2000-332744 (2000-11-01), None
Rolf Blom, “Non-Public Key Distribution”, Linköping University, New York: Plenum Press, pp. 231-236.
Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Weizmann Institute of Science, Springer-Verlag, pp. 47-53.
“A New Concept of Key Sharing Systems”, by Shigeo Tsujii, Yasuyuki Murakami and Masao Kasahara The 1999 Symposium on Cryptography and Information Security—Jan. 26, 1999, vol. 1, pp. 135-140.
“Common Key Sharing Scheme Based on Double Exponent Function”, by Masao Kasahara, Yasuyuki Murakami and Shigeo Tsujii Research Conference Report of the Institute of Electronics, Information and Communication Engineers (I Sec 99-2) Published by The Institute of Electronics, Information and Communication Engineers—May 20, 2000, vol. 99, No. 57, pp. 9-13.
Kasahara Masao
Murakami Yasuyuki
Tsujii Shigeo
Arani Taghi T.
Hogan & Hartson LLP
Kasahara Masao
Moise Emmanuel L.
Murata Kikai Kabushiki Kaisha
LandOfFree
Secret key generating method, common key generating method,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret key generating method, common key generating method,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret key generating method, common key generating method,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3694641