Cryptography – Particular algorithmic function encoding – Public key
Patent
1994-03-01
1995-11-21
Swann, Tod R.
Cryptography
Particular algorithmic function encoding
Public key
380 23, 380 25, H04K 100
Patent
active
054695074
ABSTRACT:
A mechanism which secures the communication and computation between processors in an insecure distributed environment implements efficient "compilers" for a protocol between processors. The protocol is one that assures some input-output relation when executed by processors which are not all trusted but with secret and authenticated communication links between every two processors. This protocol is transformed by a compiler into a protocol that guarantees essentially the same input-output relations in the presence of (the same type of) insecure processors and insecure communication links. Additionally, a method maintains secret values for a sequence of periods, each secret value being shared by two or more processors for one or several periods, where the processors are connected by a communication network.
Another mechanism establishes different cryptographic keys established for each period of communication. Essentially, the effect of exposures is contained to the period in which they occur, or to a minimal number of following periods, and the effect of exposures is contained to the processors exposed. At each period a processor is called nonfaulty if the adversary does not control it. A processor is called secure at a given period if it is non-faulty and also has a secret key, unknown to the adversary.
REFERENCES:
patent: 4956863 (1990-09-01), Goss
patent: 5159633 (1992-10-01), Nakamura
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5371794 (1994-12-01), Diffie et al.
IBM Technical Disclosure Bulletin vol. 28 No. 3 Aug. 1985 pp. 1065-1069.
R. Bird et al.; "Systematic Design of a Family of Attack-Resistant Authentication Protocols"; IEEE Journal on Selected Areas in Communications, vol. 11, No. 5, pp. 679-693.
M. Bellare et al.; "Models of Entity Authentication"; Advances in Cryptology: Proc. of Crypto 93, Aug. 1993.
R. Ostrovshy et al.; "How to Withstand Mobile Virus Attacks"; Proc. of the 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, 1991, pp. 51-59.
Canetti Ran
Herzberg Amir
Cameron Douglas
International Business Machines - Corporation
Swann Tod R.
LandOfFree
Secure communication and computation in an insecure environment does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure communication and computation in an insecure environment, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure communication and computation in an insecure environment will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1144252