Technique for producing privately authenticatable cryptographic

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 900

Patent

active

061638412

ABSTRACT:
A technique for generating, for a given message to be signed, an authentic cryptographic signature that can be authenticated, by a recipient of the signed message, as having originated from a signor of the message; and appropriately authenticating such a signature. Specifically, this technique, given a message, such as, e.g., a numerical product copy identifier (83, 93), forms an authentic signature (87, 97), based on public-key cryptosystem, through use of generator value selected from points on an elliptic curve over a finite field. The authentic signature is generated using the generator value in conjunction with three keys; namely, a public key, a private key and a secret key, and thus substantially increases the security associated with cryptographic signatures generated through a conventional two-key public-key cryptosystem. A unique product copy indicia can be formed by concatenating the identifier, for a given product copy, with its corresponding authentic signature. During subsequent user installation of that copy to a computer, the user enters the indicia when prompted by execution of an installation program which, in turn, privately authenticates the signature contained in the indicia in order to continue or prematurely terminate the installation.

REFERENCES:
patent: 5299262 (1994-03-01), Brickell et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5638447 (1997-06-01), Micali
patent: 5737424 (1998-04-01), Elteto et al.
Okamoto et al, "An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring ZN", Proceedings of the Annual International Cryptology Conference, Berlin, Germany, vol. Conf. 12, Aug. 16, 1992, pp. 54-65.
Desmedt Yvo G. "Threshold Cryptography." ETT. Jul. 1994. pp. 35-43.
Menezes, Alfred, Paul van Oorshcot, and Scott Vanstone. "Handbook of applied cryptography." CRC Press. 1997. pp. 297 and 348.
Miller, Ray A. "The cryptographic mathematics of Enigma." Center for Cryptologic History, National Security Agency. Date unknown. all pages.
Botes, J. J. and W. T. Pezhorn. "Public-key cryptosystems based on elliptic curves." IEEE. 1993. all pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Technique for producing privately authenticatable cryptographic does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Technique for producing privately authenticatable cryptographic , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for producing privately authenticatable cryptographic will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-278051

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.