Cryptography – Particular algorithmic function encoding – Public key
Patent
1996-08-20
1997-05-13
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Public key
H04L 930
Patent
active
056299826
ABSTRACT:
A number of electronic communications methods are described involving a first and a second party (i.e., sender and recipient), with assistance from at least a trusted party, enabling electronic transactions in which the first party has a message for the second party. The first party, the second party and the trusted party undertake an exchange of transmissions, such that if all transmissions reach their destinations the second party only receives the message if the first party receives at least one receipt. Preferably, the identity of the first party is temporarily withheld from the second party during the transaction. At least one receipt received to the first party enables the first party to prove the content of the message received by the second party.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman
patent: 4218582 (1980-08-01), Hellman
patent: 4405829 (1983-09-01), Rivest
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 4789928 (1988-12-01), Fujisaki
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 5117358 (1992-05-01), Winkler
patent: 5202977 (1993-04-01), Pasetes
patent: 5214700 (1993-05-01), Pinkas et al.
patent: 5220501 (1993-06-01), Lawlor
patent: 5243515 (1993-09-01), Lee
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5440634 (1995-08-01), Jones et al.
patent: 5453601 (1995-09-01), Rosen
patent: 5455407 (1995-10-01), Rosen
patent: 5497421 (1996-03-01), Kaufman et al.
patent: 5509071 (1996-04-01), Petrie, Jr. et al.
patent: 5553145 (1996-09-01), Micali
Bellare, M., et al., "iKP--A Family of Secure Electronic Payment Protocols", Abstract, 21 pp., Jul. 12, 1995.
Burk, et al., "Digital Payment Systems Enabling Security and Unobservability", Computers & Security, vol. 8, pp. 399-416 (1989).
Chaum et al., "Untraceable Electronic Cash", Extended Abstract, Proceedings of Crypto '88, pp. 319-327 (1988).
U.S. application No. 08/408,551, Micali, filed Mar. 21, 1995.
U.S. application No. 60/027,614, Micali, filed Oct. 1, 1996.
Chaum, "Security Without Identification: Transaction Systems to Make Big Brother Obsolete", Communications of the ACM, vol. 28, No. 10, pp. 1030-1044, Oct. 1985.
Cheng, et al., "Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX", Abstract, 14 pp., Apr. 28, 1995.
Damgard, "Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals", Extended Abstract, Proceedings of Crypto '88, pp. 328-335, (1988).
Dukach, S., "SNPP: A Simple Network Payment Protocol" Abstract, 7 pp.
Hickman et al., "The SSL Protocol", Netscape Communications Corp., 132 pp., Jun. 1995.
Janson, et al., "Electronic Payment Over Open Networks", Abstract, 9 pp., Apr. 18, 1995.
Low, et al., "Anonymous Credit Cards".
Neuman, et. al., "Requirements for Network: The NetCheque Perspective", Proceedings of IEEE Compcon '95, 5 pp., Mar. 1995.
Pedersen, T., "Electronic Payments of Small Amounts", Abstract, 12 pp., Aarhaus University Technical Report DAIMI PB-495, Aug. 1995.
Rescorla, et. al., "The Secure HyperText Transfer Protocol", Internet Draft, 40 pp., Jul. 1995.
Sirbu, et. al., "NetBill: An Internet Commerce System Optimized for Network Delivered Services", Carnegie Mellon University, pp. 1-11.
Stein, et al., "The Green Commerce Model", 18 pp., Oct. 1994.
Batelaan et al., "Internet Billing Service Design and Prototype Implementation", The Information Networking Institute at Carnegie Mellon University, 1992 Final Project, 16 pp., Mar. 30, 1993.
Rabin, "Transaction Protection by Beacons", Harvard University Center for Research in Computer Technology, Nov. 1981, pp. 1-21.
Even, et al, "A Randomized Protocol for Signing Contracts," Communications of the ACM, Jun. 1985, vol. 28, No. 6, pp. 637-647.
Ben-Or, et al., "A Fair Protocol for Signing Contracts," IEEE Transactions on Information Theory, vol. 36, No. 1, Jan. 1990.
Luby, et al, "How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Baised Coin," 1983, pp. 11-21.
Goldreich, et al, "Proofs that Yield Nothing But Their Validity or All Languages In NP Have Zero-Knowledge Proof Systems," Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729.
Goldreich, et al, "How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority," Proceedings of the 27th Annual IEEE ACM Symposium on Theory of Computing, May 1987, pp. 218-229.
Desmedt, et al, "Threshold cryptosystems," EE & CS Department, University of Wisconsin-Milwaukee.
Shamir, "How to Share a Secret," Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 612-613.
Needham, et al, "Using Encryption for Authentication in Large Networks of Computers", Communication of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999.
Chor, et al, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," POC, 26th FOCS, 1985, pp. 383-395.
Goldwasser, et al, "The Knowledge of Complexity of Interactive Proof Systems", Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208.
Kolata, "Cryptographers Gather to Discuss Research-Analysis of how to break codes and new ways to use codes were featured at the meeting," Science, vol. 214, Nov. 6, 1981, pp. 646-647.
Blum, "How to Exchange (Secret) Keys," ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193.
Rabin, Michael O., "How to Exchange Secrets," May 20, 1981, pp. 1-21.
Dolev, et al, "Non-Malleable Cryptography" (Extended Abstract), 1991, pp. 542-552.
Chaum, David L., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, Feb. 1981, vol. 24, No. 2, pp. 84-88.
LandOfFree
Simultaneous electronic transactions with visible trusted partie does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Simultaneous electronic transactions with visible trusted partie, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Simultaneous electronic transactions with visible trusted partie will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1391938