Method for enabling users of a cryptosystem to generate and use

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, H04L 908, H04L 930

Patent

active

055197787

ABSTRACT:
The present invention describes a method for enabling users of a cryptosystem to agree on secret keys. In one embodiment, a trusted agent chooses at least one individual key for each user, with at least a portion of such individual key being secret. At least some of the individual keys are then stored in physically secure devices, and the pair of users i and j use their individual keys to compute a common secret key. In another embodiment, each trustee of a group of trustees choose at least one individual key for each user, with at least some portion of such individual key being secret. The keys chosen by a sufficiently small number of such trustees, however, are insufficient for computing the common secret key of the users. Other hardware and software key exchange protocols based on these two techniques are also disclosed.

REFERENCES:
patent: 5124117 (1992-06-01), Tatebayashi et al.
patent: 5144665 (1992-09-01), Takaragi et al.
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
"Perfectly-Secure Key Distribution for Dynamic Conferences" Blundo, et al.; Crypto '92, pp. 11-6-11-13.
"Key Storage in Secure Networks" Mitchell, et al.; Discrete Applied Mathematics 21 (1988), pp. 215-228.
"Using Encryption for Authentication in Large Networks of Computers" Needham, et al.; Communications of the ACM (Dec. 1978), pp. 993-999.
"Securely Replicating Authentication Services" Gong, Li; IEEE 1989, pp. 85-91.
"An Optimal Class of Symmetric Key Generation Systems" Blom, Rolf; Advances in Cryptology: Proceedings of Eurocrypt '84; Lecture Notes in Computer Science; pp. 335-338.
"An Optimal Algorithm for Synchronous Byzantine Agreement" Feldman, et al.; MIT Laboratory for Computer Science (Jun. 1990).
"Data & Computer Security: Dictionary of Standards Concepts and Terms: " Longley, et al.; Macmillan Publishers (1987) pp. 11-13, 182-185, 188-191.
"Crypto Users'Handbook" Christoffersson, et al.; Elsevier Science Publishing Company, Inc. (1988) pp. 39-47, 66-67, 72-73.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for enabling users of a cryptosystem to generate and use does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for enabling users of a cryptosystem to generate and use , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for enabling users of a cryptosystem to generate and use will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2045646

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.