Method, system, device for proving the authenticity of an...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000, C380S273000, C713S168000, C713S169000, C713S174000, C713S175000

Reexamination Certificate

active

09869966

ABSTRACT:
The proof is provided by means of the following parameters: a public module n formed by the product of f prime factors pi, f>2; a public superscript v; m base numbers gi, m>1. The base numbers giare such that the two equations: x2≡gimod n and x2≡−gimod n cannot de solved in x in the ring of integers modulo n, and such that the equation xv≡gi2mod n can be solved in x in the ring of integers modulo n in the case where the public superscript v is in the form v=2k, wherein k is a security parameter.

REFERENCES:
patent: 5140634 (1992-08-01), Guillou et al.
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5604805 (1997-02-01), Brands
patent: 6389136 (2002-05-01), Young et al.
patent: 6697946 (2004-02-01), Miyaji
patent: 311 470 (1989-04-01), None
patent: 381 523 (1990-08-01), None
patent: 792 044 (1997-08-01), None
patent: 792044 (1997-08-01), None
patent: WO 89/11706 (1989-11-01), None
patent: WO 96/33567 (1996-10-01), None
Guillou, Louis C. et al. “Cryptographic authentication protocols for smart cards”, 2001 Computer Networks.
Guillou, Louis C. et al. “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory,” 1988 Eurocrypt '88.
Guillou, Louis C. et al. “A “paradoxical” identity-based signature scheme resulting from zero-knowledge”, 1988 Crypto '88.
Guillou, Louis. “Dynamic Authentication of Smart Cards without Crypto-Processor”, Nov. 2002.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, Inc., pp. 151-155.
Vedder, Klaus et al. “A signature with shared verification scheme”, 1989.
IBM. “Asymmetric Authentication Protocol”, IBM Technical Disclosure Bulletin vol. 36 No. 10 Oct. 1993, pp. 413-416.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press LLC, pp. 286-294, 307-311, 412-414 & 450-451.
Ohta, Kazuo et al. “A modification of the Fiat-Shamir scheme”. In Advances in CryptologyCrypto '88, LNCS 0403, pp. 232-243, Springer- Verlag, 1990.
Okamoto, Tatsuaki, “Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,” Proceedings of CRYPTO'92, pp. 31-53, 1993.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system, device for proving the authenticity of an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system, device for proving the authenticity of an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, device for proving the authenticity of an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3784588

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.