Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2006-05-09
2009-12-15
Smithers, Matthew B (Department: 2437)
Cryptography
Particular algorithmic function encoding
C380S030000, C380S277000, C380S280000
Reexamination Certificate
active
07634087
ABSTRACT:
A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dIDis computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s. After obtaining the private decryption key from the key generator [120], the receiver [110] uses it together with the element rP and the bilinear map to compute the secret message key gIDr, which is then used to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest
patent: 4748668 (1988-05-01), Shamir et al.
patent: 5016276 (1991-05-01), Matumoto
patent: 5146500 (1992-09-01), Maurer
patent: 5150411 (1992-09-01), Maurer
patent: 5159632 (1992-10-01), Crandall
patent: 5179301 (1993-01-01), Hughes
patent: 5271061 (1993-12-01), Crandall
patent: 5272755 (1993-12-01), Miyaji
patent: 5581616 (1996-12-01), Crandall
patent: 6061448 (2000-05-01), Smith
patent: 6307935 (2001-10-01), Crandall
patent: 6886096 (2005-04-01), Appenzeller
patent: 2002/0076042 (2002-06-01), Sandhu
patent: 2002-26892 (2002-01-01), None
patent: 2002-26892 (2006-01-01), None
patent: WO/00/35142 (2000-06-01), None
patent: WO 02/51066 (2002-06-01), None
patent: WO 2007042419 (2007-04-01), None
Adi Shamir, Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO '84 on Advances in Cryptology, Springer-Verlag, pp. 47-53, Aug. 1985.
Joonsang Baek, Willy Susilo, Jianying Zhou, “New constructions of fuzzy identity-based encryption”, Mar. 2007, ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, Publisher: ACM, pp. 368-370.
Joux, Antoine “A One Round Protocol For Tripartite Diffle-Hellman” (2000) W. Bosma (ed.) pp. 385-393.
Koblitz, Neal “Elliptic Curve Cryptosystems” (1986) Mathematics Subject Classification; pp. 203-209.
Paterson, Kenneth G. in a paper “ID-Based Signatures From Pairing on Elliptic Curbes”.
Sakai, Ryuichi et al. in a paper “Crypt Shemes Based on Weil Pairing”.
Sakai, Ryuichi et al. in a paper “Cryptosystems Based on Pairing” (2000) SCIS.
Sakai, Ryuichi et al. in a paper “Cryptosystems Based on Pairing Over Elliptic Curve” (2001) SCIS.
Menezes, Vanstone, Oorschot: “Handbook of Applied Cryptography” 1997, CRC Press LLC , USA , XP002518153 * p. 493 * * p. 561-p. 562 *.
Sakazaki, Okamoto, Mambo: “The Application of ID-Based Distribution Systems to an Elliptic Curve”[Online] 1998, XP002518151 Retrieved from the Internet: URL:http://www.springerlink.com/content/m22161g1t8460w3q/fulltext.pdf> [retrieved on Mar. 6, 2009].
Adi Shamir: “Identity-Based Cryptosystems and Signature Schemes”[Online] 1998, XP002518152 Retrieved from the Internet: URL:http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C84/47.PDF> [retrieved on Mar. 6, 2009].
Boneh et al., “Identity based encryption from the Weil pairing,” Extended abstract in Advances in Cryptology—Crypto 2001, Lecture Notes in Computer Science, vol. 2139 Springer-Verlag, pp. 231-229, 2001.
Baek et al., “A Survey of Identity-Based Cryptography,” Proc. 10th Annual Conf. for Australian Unix User's Group (AUUG 2004), pp. 95-102, 2004.
Xuejia Lai et al, “A proposal for a new block encryption standard,” pp. 389-404 in Advances in Cryptology-Eurocrypt '90 Proc., LNCS 473, Springer-Verlag, 1991.
Hatsukazu Tanaka, “A realization scheme for the identity-based cryptosystem,” Proc. Crypts '87.
Clifford Cocks “An identity based encryption scheme based on quadratic residues,” Proc. IMA, Dec. 2001.
Maurer et al., “Non-interactive public-key cryptography.” Proc. Eurocrypt. '91.
Jeremy Horowitz et al., “Toward hierarchical identity-based encryption,” Lecture Note in Computer Science, 2002, 2332 466-481.
Boneh-Franklin et al., “IBE Secure E-mail” Last update: Apr. 8, 2002, retrieved on xxx <http://www.crypto.stanford.edu>.
Voltage Security, “Voltage Identity-Based Encryption,” web document, http://www.voltage.com/technology/ibe.htm, accessed Mar. 2009.
Ryuichi Sakai, Shigeo Mitsunari, Masao Kasahara, “Two or Three Cryptographic Schemes Based on Pairing Over Elliptic Curves” The Institute of Electronics, Information and Communication Engineers, Technical Report of IEICE, ISEC3002-29 (Jul. 2001).
Ryuichi Sakai, Masao Kasahara, “Cryptographic Schemes Based on Pairing Over Elliptic Curve (Part 2)” Technical Report of IEICE, ISEC2002-52 (Jul. 2002).
Ryuichi Sakai, Masao Kasahara, “Two or Three Cryptographic Schemes Based on Pairing Over Elliptic Curves (Part 3)” Technical Report of IEICE, ISEC2002-63 (Sep. 2002).
Boneh et al., “Identity-Based Encryption from the Weil Pairing,” document made available on the website crypto.stanford.edu in Feb. 2001.
Mitsunari et al., “A new traitor tracing,” IEICE Trans. Fundamentals, vol. E85-A, No. 2, Feb. 2002.
Sakai et al., “Cryptosystems based on Pairing over Elliptic Curve,” SCIS 2001: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, Jan. 23-26, 2001, The Institute of Electronics, Information and Communication Engineers.
Sakai et al., “Cryptosystems Based on Pairing,” SCIS 2000-C20, The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, Jan. 26-28, 2000.
Boneh Dan
Franklin Matthew
Fields Courtney D
Lumen Patent Firm
Smithers Matthew B
The Board of Trustees of the Leland Stanford Junior University
The Regents of the University of California, Davis
LandOfFree
Systems and methods for identity-based encryption and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for identity-based encryption and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for identity-based encryption and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4144740