Implicitly certified digital signatures
First Claim
1. A method of using an implicit certificate in a cryptography system, the method comprising:
- receiving, by a first terminal, a first modified message and a digital signature from a second terminal over a data communication network;
obtaining, by the first terminal, an unmodified message associated with the first modified message;
obtaining, by the first terminal, an implicit certificate associated with the second terminal, wherein the implicit certificate includes a public key reconstruction value of the second terminal, the public key reconstruction value of the second terminal is different than a public key of the second terminal, and the public key of the second terminal is reconstructed using the public key reconstruction value of the second terminal and a public key of a certificate authority;
generating, by the first terminal, a hash value based on the implicit certificate;
generating, by the first terminal, a second modified message by combining the unmodified message with the hash value and the public key reconstruction value of the second terminal; and
verifying, by the first terminal, the unmodified message based on the digital signature and the second modified message.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.
18 Citations
10 Claims
-
1. A method of using an implicit certificate in a cryptography system, the method comprising:
-
receiving, by a first terminal, a first modified message and a digital signature from a second terminal over a data communication network; obtaining, by the first terminal, an unmodified message associated with the first modified message; obtaining, by the first terminal, an implicit certificate associated with the second terminal, wherein the implicit certificate includes a public key reconstruction value of the second terminal, the public key reconstruction value of the second terminal is different than a public key of the second terminal, and the public key of the second terminal is reconstructed using the public key reconstruction value of the second terminal and a public key of a certificate authority; generating, by the first terminal, a hash value based on the implicit certificate; generating, by the first terminal, a second modified message by combining the unmodified message with the hash value and the public key reconstruction value of the second terminal; and verifying, by the first terminal, the unmodified message based on the digital signature and the second modified message. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations comprising:
-
accessing, by a first terminal, a first modified message to be verified based on a digital signature, wherein the first modified message and the digital signature are received over a data communication network from a second terminal; obtaining, by the first terminal, an unmodified message associated with the first modified message; obtaining, by the first terminal, an implicit certificate associated with the second terminal, wherein the implicit certificate includes a public key reconstruction value of the second terminal, the public key reconstruction value of the second terminal is different than a public key of the second terminal, and the public key of the second terminal is reconstructed using the public key reconstruction value of the second terminal and a public key of a certificate authority; generating, by the first terminal, a hash value based on the implicit certificate; generating, by the first terminal, a second modified message by combining the unmodified message with the hash value and the public key reconstruction value of the second terminal; and verifying, by the first terminal, the unmodified message based on the digital signature and the second modified message. - View Dependent Claims (8, 9, 10)
-
Specification