Implicitly certified public keys
First Claim
1. A method comprising:
- accessing an implicit certificate associated with an entity and generated by a subordinate certificate authority that is subordinate to a root certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity;
accessing subordinate certificate authority public key information associated with the subordinate certificate authority;
accessing root certificate authority public key information associated with the root certificate authority;
generating a first value based on evaluating a hash function, wherein evaluating the hash function produces a hash function output from hash function inputs comprising the subordinate certificate authority public key information, the root certificate authority public key information, and the public key reconstruction value of the entity; and
generating a public key value of the entity based on the first value.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity and generated by a certificate authority. The implicit certificate includes a public key reconstruction value of the entity. Certificate authority public key information is accessed. The certificate authority public key information is associated with the certificate authority that issued the implicit certificate. A first value is generated based on evaluating a hash function. The hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity. A public key value of the entity can be generated or otherwise used based on the first value.
18 Citations
18 Claims
-
1. A method comprising:
-
accessing an implicit certificate associated with an entity and generated by a subordinate certificate authority that is subordinate to a root certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing subordinate certificate authority public key information associated with the subordinate certificate authority; accessing root certificate authority public key information associated with the root certificate authority; generating a first value based on evaluating a hash function, wherein evaluating the hash function produces a hash function output from hash function inputs comprising the subordinate certificate authority public key information, the root certificate authority public key information, and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations comprising:
-
accessing an implicit certificate associated with an entity and generated by a subordinate certificate authority that is subordinate to a root certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing subordinate certificate authority public key information associated with the subordinate certificate authority; accessing root certificate authority public key information associated with the root certificate authority; generating a first value based on evaluating a hash function, wherein evaluating the hash function produces a hash function output from hash function inputs comprising the subordinate certificate authority public key information, the root certificate authority public key information, and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (12, 13, 14)
-
-
15. A computing system comprising:
-
memory; and one or more processors operable to perform operations, the operations comprising; accessing an implicit certificate associated with an entity and generated by a subordinate certificate authority that is subordinate to a root certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing subordinate certificate authority public key information associated with the subordinate certificate authority; accessing root certificate authority public key information associated with the root certificate authority; generating a first value based on evaluating a hash function, wherein evaluating the hash function produces a hash function output from hash function inputs comprising the subordinate certificate authority public key information, the root certificate authority public key information, and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (16, 17, 18)
-
Specification