Cryptography – Key management – Having particular key generator
Reexamination Certificate
2006-06-20
2006-06-20
Vu, Kim (Department: 2135)
Cryptography
Key management
Having particular key generator
C726S003000, C380S259000
Reexamination Certificate
active
07065210
ABSTRACT:
A cryptographic communications method based on ID-NIKS, wherewith mathematical structures are minimized, the collusion problem can be circumvented, and building the cryptosystem is simplified. A plurality of centers are provided for distributing a plurality of secret keys to a plurality of entities, respectively. Each secret key is unique to each entity. Information specifying the entities (entity ID information) is divided into a plurality of pieces or segments. All secret keys produced for the pieces of entity ID information are distributed to the entities. Using a component contained in the secret key peculiar to itself, each entity generates a common key to be shared by another entity. This component corresponds to a piece of ID information of another entity.
REFERENCES:
patent: 4736423 (1988-04-01), Matyas
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5220606 (1993-06-01), Greenberg
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5539827 (1996-07-01), Liu
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5987128 (1999-11-01), Baba
patent: 5987129 (1999-11-01), Baba
patent: 04-245287 (1992-09-01), None
A. Fujikawa et al., “Computationally Secure ID-NIKS”, Technical Report of IEICE, Jul. 1996.
S. Tsujii et al., “A New Concept of Key Sharing Systems”, The 1999 Symposium on Cryptography and Information Security, Jan. 1999.
M. Kasahara et al., “Common-key Sharing Scheme Based on Double Exponential Function”, Technical Report of IEICE May 1999.
Rolf Blom, “Non-Public Key Distribution”, Advances in cryptology: proceedings of CRYPTO 82 / edited by David Chaum, Ronald L. Rivest, and Alan T. Sherman / New York: Plenum Press, pp. 231-236.
Adi Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Advances in Cryptology: proceedings of CRYPTO 84 / edited by G.R. Blakley and David Caum / Berlin; Tokyo: Springer-Verlag, pp. 47-53.
Kasahara Masao
Tsujii Shigeo
Hogan & Hartson,L.L.P.
Murata Kikai Kabushiki Kaisha
Truong T. B.
LandOfFree
Secret key generation method, encryption method,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret key generation method, encryption method,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret key generation method, encryption method,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3634117