Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-09-27
2005-09-27
Zand, Kambiz (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S176000, C713S177000, C380S037000, C380S042000
Reexamination Certificate
active
06950937
ABSTRACT:
An exponentiation operation or other computational task associated with a cryptographic protocol is performed in a secure distributed manner using multiple machines, e.g., a client device and multiple servers of a computer network. The computational task is transformed by an originator machine before being sent to one or more external servers for execution. The transformation may include replication and dependency operations to provide robustness to errors in the computations performed by the external servers, and blinding and permutation operations to provide privacy for secret information associated with the computational task. The transformed computational task is executed by the one or more external servers, and the results of the transformed computational task are transmitted back to the originator machine. The originator machine transforms the results of the transformed computational task in a manner which permits verification that the one or more results are appropriate results for a given input. Advantageously, the invention can operate with arbitrary inputs, and provides improved computational efficiency relative to conventional techniques for both small and large batches of cryptography-related computations.
REFERENCES:
patent: 4759063 (1988-07-01), Chaum
patent: 5878140 (1999-03-01), Chaum
patent: 6049613 (2000-04-01), Jakobsson
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6278783 (2001-08-01), Kocher et al.
patent: 6327661 (2001-12-01), Kocher et al.
patent: 6389136 (2002-05-01), Young et al.
patent: 6772339 (2004-08-01), Jakobsson et al.
patent: 2001/0002486 (2001-05-01), Kocher et al.
patent: 1043862 (2000-10-01), None
J. Bos et al., “Addition Chain Heuristics,” Proceedings of CRYPTO '89, pp. 400-407.
M. Abadi et al., “On Hiding Information from an Oracle,” Journal of Computer and System Sciences, vol. 39, No. 1, pp. 1-29, Aug. 1989.
M. Ballare et al., “Fast Batch Verification for Modular Exponentiation and Digital Signatures,” Proceedings of EUROCRYPT '98, pp. 1-27, Jun. 1998.
V. Boyko et al., “Speeding up Discrete Log and Factoring Based Schemes via Precomputations,” Proceedings of EUROCRYPT '98, 15 pages, 1998.
National Institute of Standards and Technology (NIST), “FIPS Publication 186-2: Digital Signature Standard,” Jan. 2000.
E.M. Rains et al., “Table of Constant Weight Binary Codes,” http://www.research.att.com/˜njas/codes/Andw/?, pp. 1-21, 2000.
Jakobsson Bjorn Markus
Wetzel Susanne Gudrun
Lucent Technologies - Inc.
Zand Kambiz
LandOfFree
Secure distributed computation in cryptographic applications does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure distributed computation in cryptographic applications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure distributed computation in cryptographic applications will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3380960