Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1996-02-28
1998-09-22
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 23, 380 24, 380 30, 380 49, H04L 900, H04L 930
Patent
active
058126708
ABSTRACT:
Encryption is a common tool to achieve privacy of communication in networks whose lines are not physically protected. In most communication networks, however, having a sender S send an encrypted message to a recipient R does not hide the very fact that S has sent a message to R, and this may in itself constitute valuable information that the parties would rather keep confidential. A transmission method is described that (1) keeps the identities of senders and receivers confidential, but (2) can trace senders and receivers under certain given circumstances.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 4789928 (1988-12-01), Fujisaki
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 5117358 (1992-05-01), Winkler
patent: 5202977 (1993-04-01), Pasetes, Jr. et al.
patent: 5214700 (1993-05-01), Pinkas et al.
patent: 5220501 (1993-06-01), Lawlor et al.
patent: 5243515 (1993-09-01), Lee
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5436972 (1995-07-01), Fischer
patent: 5440634 (1995-08-01), Jones et al.
patent: 5453601 (1995-09-01), Rosen
patent: 5455407 (1995-10-01), Rosen
patent: 5497421 (1996-03-01), Kaufman et al.
patent: 5509071 (1996-04-01), Petrie, Jr. et al.
patent: 5519778 (1996-05-01), Leighton et al.
patent: 5521980 (1996-05-01), Brands
patent: 5553145 (1996-09-01), Micali
patent: 5604805 (1997-02-01), Brands
patent: 5606617 (1997-02-01), Brands
patent: 5610982 (1997-03-01), Micali
patent: 5631961 (1997-05-01), Mills et al.
patent: 5647000 (1997-07-01), Leighton
patent: 5712913 (1998-01-01), Chaum
Needham et al, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999.
Chor et al., "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", Extended Abstract, IEEE, 1985, pp. 383-395.
Even, S., "Secure Off-Line Electronic Fund Transfer Between Nontrusting Parties", Abstract, Jan. 31, 1988, 10 pps.
Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613.
Chaum, D., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, vol. 24, No. 2, Feb. 1981, pp. 84-88.
Desmedt et al., "Threshold cryptosystems", EE & CS Department, University of Wisconsin-Milwaukee.
Rabin, M., "How to Exchange Secrets", May 20, 1981, pp. 1-21.
Kolata, G., "Cryptographers Gather to Discuss Research-Analyses of how to break codes and new ways to use codes were featured at the meeting", Science, vol. 214, Nov. 6, 1981, pp. -646-647.
Blum, M., "How to Exchange (Secret) Keys", ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193.
Luby et al., "How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin", IEEE, 1983, pp. 11-21.
Even et al., "A Randomized Protocol for Signing Contracts", Communications of the ACM, vo. 28, No. 6, Jun. 1985, pp. 637-647.
Goldreich et al., "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority", Proceedings of the 27th Annual IEEE ACM Symposium on Theory of Computing, May 1987, pp. 218-229.
Goldwasser et al., "The Knowledge Complexity of Interactive Proof Systems", Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208.
Damgard, I., "Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals", Extended Abstract, pp. 328-335, Proceedings of Crypto '88.
Chaum et al., "Untraceable Electronic Cash", Extended Abstract, pp. 319-327, Proceedings of Crypto '88.
Dolev et al., "Non-Malleable Cryptography", Extended Abstract, Communications of the ACM, Mar. 1991, pp. 542-552.
Batelaan et al., "Internet Billing Service Design and Prototype Implementation", Carnegie Mellon University Information Networking Institute 1992 Final Project, Mar. 30, 1993, 16 pps.
Burk et al., "Digital Payment Systems Enabling Security and Unobservability", Computers & Security, vol. 8, 1989, pp. 399-416.
Rabin, M., "Transaction Protection by Beacons", Harvard University, Cambridge, MA, Nov. 1981, 21 pps.
Ben-Or et al., "A Fair Protocol for Signing Contracts", IEEE Transactions On Information Theory, vol. 36, No. 1, Jan. 1990, pp. 40-46.
Rivest, et al., "A Method for Obtaining Digital Signatures and Public--Key Cryptosystems," Communications of the ACM, Feb. 1978, pp. 120-126.
Goldreich et al., "Proofs That Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems", Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729.
Low, Steven H., "Anonymous Credit Cards," Proceedings of the 2nd ACM Cocnference on Computer and Communication Security, Fairfax, Virginia, Nov. 2-4, 1994, pp. 1-10.
Sirbu, Marvin, "NetBill: An Internet Commerce system Opitmized for Network Delivered Services," Carnegie Mellon University, Pittsburgh, Pennsylvania.
Bellare, Mihir, "iKP--A Family of Secure Electronic Payment Protocols" (Extended Abstract), Jul. 12, 1995, pp. 1-21.
Pedersen, Torben P., "Electronic Payments of Small Amounts," Computer Science Department, Aarhus University.
Chaum, David, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Communications of the ACM, Oct. 1985, vol. 28 at 1032-1033.
Dukach, Semyon, "SNPP: A Simple Network Payment Protocol," MIT Laboratory for Computer Science.
Cheng, Pau-Chen, "Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX," IBM Thomas J. Watson Research Center, Apr. 28, 1995.
Janson, P., "Electronic Payment Over Open Networks," IBM Zurich Research Laboratory, Apr. 18, 1995.
Hickman, Kipp E.B., "Standards Documentation: The SSL Protocol," Netscape Communications Corporation, Jun. 1995.
Rescorla, E., "The Secure HyperText Transfer Protocol," Enterprise Integration Technologies, Jul. 1995.
Neuman, Clifford B., "Requirements for Network Payment: The NetCheque.TM. Perspective," Proceedings of the IEEE Compcon '95, San Francisco, Mar. 1995.
Stein, Lee H., "The Green Commerce Model," Stein, Stefferud, Borenstein, Rose, Oct. 1994, pp. 1-18.
LandOfFree
Traceable anonymous transactions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Traceable anonymous transactions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Traceable anonymous transactions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1631410