Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2005-06-28
2005-06-28
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S171000, C380S044000, C380S283000
Reexamination Certificate
active
06912654
ABSTRACT:
A secret key of an entity is generated at each key generating agency (center) by using divided identification information obtained by dividing identification information of the entity into a plurality of blocks and a hash value which consists of a plurality of bits and is set for each key generating agency (center). A plurality of bits of any order are selected for each key generating agency (center) from an original hash-value sequence consisting of a predetermined sequence of a plurality of bits so as to set the hash value for each key generating agency (center). When a new key generating agency (center) is added to a plurality of existing key generating agencies (centers), a hash value is set for the new key generating agency (center) without changing the hash values of the existing key generating agencies (centers).
REFERENCES:
patent: 4760600 (1988-07-01), Nakai
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5251258 (1993-10-01), Tanaka
patent: 5966449 (1999-10-01), Iwamura et al.
patent: 6332025 (2001-12-01), Takahashi et al.
patent: 6658114 (2003-12-01), Farn et al.
patent: 07013485 (1995-01-01), None
patent: 07046234 (1995-02-01), None
patent: 07175411 (1995-07-01), None
patent: 08297467 (1996-11-01), None
patent: 10164045 (1998-06-01), None
patent: 10210024 (1998-08-01), None
patent: 11163850 (1999-06-01), None
patent: 2000165374 (2000-06-01), None
Coppersmith, Don. “Attack on the Cryptographic Scheme NIKS-TAS”.
Du, Xinjun et al. “An Improved ID-based Authenticated Group Key Agreement Scheme”.
Murakami, Yasuyuki et al. “A New Probabilistic ID-based Non-interactive Key Sharing Scheme”, Jan. 2000.
Okamoto, Eiji et al. “Identity-Based Information Security Management System for Personal Computer Networks”, Feb. 1989.
Sakakibara, Hiroyuki et al. “The ID-based Non-interactive Group Communication Key Sharing Scheme using Smart Cards”, 1994 IEEE.
Tanaka, Hatsukazu. “Identity-Based Non-interactive Key Sharing Equivalent to RSA Public-Key Cryptosystem”, 1998 IEEE.
Tanaka, Hatsuichi. DERWENT Abstract of JP 07013485 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 07046234 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 0715411 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 08297467 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 10210024 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 10164045 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 11163850 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 2000165374 A.
Rolf Blom, “Non-Public Key Distribution”, Linköping University, New York: Plenum Press, pp. 231-236.
Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Weizmann Institute of Science, Springer-Verlag, pp. 47-53.
Hogan & Hartson LLP
Kasahara Masao
Murata Kikai Kabushiki Kaisha
Simitoski Michael J.
LandOfFree
Secret key generating method, encryption method,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret key generating method, encryption method,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret key generating method, encryption method,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3468516