Secret key generating method, encryption method,...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S171000, C380S044000, C380S283000

Reexamination Certificate

active

06912654

ABSTRACT:
A secret key of an entity is generated at each key generating agency (center) by using divided identification information obtained by dividing identification information of the entity into a plurality of blocks and a hash value which consists of a plurality of bits and is set for each key generating agency (center). A plurality of bits of any order are selected for each key generating agency (center) from an original hash-value sequence consisting of a predetermined sequence of a plurality of bits so as to set the hash value for each key generating agency (center). When a new key generating agency (center) is added to a plurality of existing key generating agencies (centers), a hash value is set for the new key generating agency (center) without changing the hash values of the existing key generating agencies (centers).

REFERENCES:
patent: 4760600 (1988-07-01), Nakai
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5251258 (1993-10-01), Tanaka
patent: 5966449 (1999-10-01), Iwamura et al.
patent: 6332025 (2001-12-01), Takahashi et al.
patent: 6658114 (2003-12-01), Farn et al.
patent: 07013485 (1995-01-01), None
patent: 07046234 (1995-02-01), None
patent: 07175411 (1995-07-01), None
patent: 08297467 (1996-11-01), None
patent: 10164045 (1998-06-01), None
patent: 10210024 (1998-08-01), None
patent: 11163850 (1999-06-01), None
patent: 2000165374 (2000-06-01), None
Coppersmith, Don. “Attack on the Cryptographic Scheme NIKS-TAS”.
Du, Xinjun et al. “An Improved ID-based Authenticated Group Key Agreement Scheme”.
Murakami, Yasuyuki et al. “A New Probabilistic ID-based Non-interactive Key Sharing Scheme”, Jan. 2000.
Okamoto, Eiji et al. “Identity-Based Information Security Management System for Personal Computer Networks”, Feb. 1989.
Sakakibara, Hiroyuki et al. “The ID-based Non-interactive Group Communication Key Sharing Scheme using Smart Cards”, 1994 IEEE.
Tanaka, Hatsukazu. “Identity-Based Non-interactive Key Sharing Equivalent to RSA Public-Key Cryptosystem”, 1998 IEEE.
Tanaka, Hatsuichi. DERWENT Abstract of JP 07013485 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 07046234 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 0715411 A.
Tanaka, Hatsuichi. DERWENT Abstract of JP 08297467 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 10210024 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 10164045 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 11163850 A.
Tanaka, Hatsuichi et al. DERWENT Abstract of JP 2000165374 A.
Rolf Blom, “Non-Public Key Distribution”, Linköping University, New York: Plenum Press, pp. 231-236.
Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Weizmann Institute of Science, Springer-Verlag, pp. 47-53.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secret key generating method, encryption method,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secret key generating method, encryption method,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret key generating method, encryption method,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3468516

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.