Secure communication and computation in an insecure environment

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, 380 25, H04K 100

Patent

active

054695074

ABSTRACT:
A mechanism which secures the communication and computation between processors in an insecure distributed environment implements efficient "compilers" for a protocol between processors. The protocol is one that assures some input-output relation when executed by processors which are not all trusted but with secret and authenticated communication links between every two processors. This protocol is transformed by a compiler into a protocol that guarantees essentially the same input-output relations in the presence of (the same type of) insecure processors and insecure communication links. Additionally, a method maintains secret values for a sequence of periods, each secret value being shared by two or more processors for one or several periods, where the processors are connected by a communication network.
Another mechanism establishes different cryptographic keys established for each period of communication. Essentially, the effect of exposures is contained to the period in which they occur, or to a minimal number of following periods, and the effect of exposures is contained to the processors exposed. At each period a processor is called nonfaulty if the adversary does not control it. A processor is called secure at a given period if it is non-faulty and also has a secret key, unknown to the adversary.

REFERENCES:
patent: 4956863 (1990-09-01), Goss
patent: 5159633 (1992-10-01), Nakamura
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5371794 (1994-12-01), Diffie et al.
IBM Technical Disclosure Bulletin vol. 28 No. 3 Aug. 1985 pp. 1065-1069.
R. Bird et al.; "Systematic Design of a Family of Attack-Resistant Authentication Protocols"; IEEE Journal on Selected Areas in Communications, vol. 11, No. 5, pp. 679-693.
M. Bellare et al.; "Models of Entity Authentication"; Advances in Cryptology: Proc. of Crypto 93, Aug. 1993.
R. Ostrovshy et al.; "How to Withstand Mobile Virus Attacks"; Proc. of the 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, 1991, pp. 51-59.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure communication and computation in an insecure environment does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure communication and computation in an insecure environment, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure communication and computation in an insecure environment will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1144252

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.