Cryptography – Key management – Key distribution
Reexamination Certificate
2005-08-23
2005-08-23
Barrón, Gilberto (Department: 2132)
Cryptography
Key management
Key distribution
C380S282000, C380S285000, C713S171000
Reexamination Certificate
active
06934392
ABSTRACT:
This invention relates to a method for generating a shared secret value between entities in a data communication system, one or more of the entities having a plurality of members for participation in the communication system, each member having a long term private key and a corresponding long term public key. The method comprises the steps of generating a short term private and a corresponding short term public key for each of the members; exchanging short term public keys of the members within an entity. For each member then computing an intra-entity shared key by mathematically combining the short term public keys of each the members computing an intra-entity public key by mathematically combining its short-term private key, the long term private key and the intra-entity shared key. Next, each entity combines intra-entity public keys to derive a group short-term Sipublic key; each entity transmitting its intra-entity shared key and its group short term public key to the other entities; and each entity computing a common shared key K by combining its group short term public key (Si), with the intra-entity shared key ({overscore (X)}i), and a group short term public ({overscore (S)}i) key received from the other entities.
REFERENCES:
patent: 5491750 (1996-02-01), Bellare
patent: 6530020 (2003-03-01), Aoki
patent: 2241705 (1998-09-01), None
patent: 2277633 (1999-07-01), None
patent: 0661844 (1995-07-01), None
patent: 0739106 (1996-10-01), None
patent: WO 00/01109 (2000-01-01), None
patent: WO 01/06697 (2001-01-01), None
Steiner, M. et al., Cliques: A New Approach to Group Key Agreement, May 1998, IEEE.
Menezes, A. et al., Handbook of Applied Cryptography, 1997, CRC Press, pp 570-72.
Colin Boyd and Wenbo Mao, “Design and Analysis of key Exchange Protocols via Secure Channel Identification”, article, Nov. 28, 1994, 11, University of Manchester, Manchester.
Paul C. Van Oorschot and Michael J. Wiener, “Authentication and Authenticated key Exchanges”, article, Mar. 6, 1992, 19, Kluwer Academic Publishers, Netherlands.
Ateniese, Giuseppe et al., “New Multiparty Authentication Services and Key Agreement Protocols”, IEEE journal on selected areas in communications, Apr. 2000, vol. 18, No. 4.
Langford, Susan K., “Weaknesses in Some Threshold Cryptosystems”, Aug. 18, 1996, San Jose, California.
Barrón Gilberto
Certicom Corp
Chari Santosh
Dinh Minh
Orange John
LandOfFree
Split-key key-agreement protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Split-key key-agreement protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Split-key key-agreement protocol will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3514938