Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data
Reexamination Certificate
2008-05-02
2011-12-06
Colin, Carl (Department: 2493)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Packet header designating cryptographically protected data
C380S028000, C380S046000, C380S212000, C713S162000, C713S163000, C709S208000, C709S209000, C709S211000
Reexamination Certificate
active
08074068
ABSTRACT:
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices with the random number data, the divided secret data, and the generator matrix G, and delivers the shared information formed by the shared partial data and the header information individually to the storage units. The secret sharing device calculates a recovery matrix and multiplies the shared information by the recovery matrix, hence to recover the secret information.
REFERENCES:
patent: 5485474 (1996-01-01), Rabin
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5764767 (1998-06-01), Beimel et al.
patent: 6182214 (2001-01-01), Hardjono
patent: 6477254 (2002-11-01), Miyazaki et al.
patent: 2004/0148512 (2004-07-01), Park et al.
patent: 2007/0160197 (2007-07-01), Kagaya et al.
patent: 2004-213650 (2004-07-01), None
“Secret image sharing with smaller shadow images” by Ran-Zan Wang (Oct. 25, 2005); Pattern Recognition Letters; pp. 551-555; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0167865505002734.
“A Reliable (k, n) Image Secret Sharing Scheme” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 6 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=4030863&tag=1.
“A Strong Ramp Secret Sharing Scheme Using Matrix Projection” by Li Bai (2006); Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06); 5 pages; originally downloaded from http://ieeexplore.ieee.org/xpls/abs—all.jsp?arnumber=1648530.
“Constructions and Properties of k out of n Visual Secret Sharing Schemes” by Eric R. Verheul (1997); Designs, Codes and Cryptography; pp. 179-196; originally downloaded from http://portal.acm.org/citation.cfm?id=257518.
“Efficient visual secret sharing scheme for color images” by Shyong Jian Shyu (Jun. 3, 2005); Pattern Recognition; pp. 866-880; originally downloaded from http://linkinghub.elsevier.com/retrieve/pii/S0031320305002268.
“New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications” by Dario Catalano (Aug. 26, 1999); 30 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.9201.
“Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman Group” by Joonsang Baek (2003); GLOBECOM; pp. 1491-1495; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.1717.
“Computer and Network Security—Key Escrow and Secret Sharing” by R.E. Newman (2000); 15 pages; originally downloaded from http://www.cise.ufl.edu/˜nemo/crypto/key-escrow.pdf.
“Key Escrow” by Ozalp Babaoglu (2006); 6 pages; originally downloaded from http://www.cs.unibo.it/˜babaoglu/courses/security06-07/lucidi/key-escrow.pdf.
“Linear Algebra and Its Applications—Second Edition” by David C. Lay (Mar. 1997); pp. xx, 2-4, 8, 26 (6 pages total); relevant pages converted to PDF originally from noted book.
“Implementation of Shamir's method for sharing a secret” by Charles Karney (Aug. 21, 2001); 1 page; converted to PDF originally from http://charles.karney.info/misc/secret.html.
“SSSS: Shamir's Secret Sharing Scheme—Windows port” by Alex Seidlitz (Jan. 16, 2006); 1 page; converted to PDF originally from http://www.seidlitz.ca/ssss/.
“On secret sharing systems” by Ehud Karnin et al. (1983); 7 pages; originally downloaded from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.9203.
“Applied Cryptography—Second Edition” by Bruce Schneier (1996); pp. 528-531 (4 pages total); relevant pages converted to PDF originally from noted book.
Adi Shamir, “How to Share a Secret”, Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Yoshihiro Fujii, et al., “A Fast (2,n)-Threshold Scheme and Its Application”, Proc. CSS2005, 6 pages, 2005.
Jun Kurihara, et al., “A (3,n)-Threshold Secret Sharing Scheme using XOR Operations”, Proc. SCIS2007, 2007, 6 pages.
Fujii Yoshihiro
Hosaka Norikazu
Kato Takehisa
Tada Minako
Auger Phillip
Colin Carl
Kabushiki Kaisha Toshiba
Oblon, Spivak McClelland, Maier & Neustadt, L.L.P.
Toshiba Solutions Corporation
LandOfFree
Secret sharing device, method, and program does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret sharing device, method, and program, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret sharing device, method, and program will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4256578