×

Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys

  • US 10,652,014 B2
  • Filed: 02/16/2017
  • Issued: 05/12/2020
  • Est. Priority Date: 02/23/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of determining, at a first node (C), a common secret (CS) that is common with the first node (C), and a second node (S), wherein the first node (C) is associated with a first asymmetric cryptography pair of a cryptography system having a homomorphic property, the first asymmetric cryptography pair having a first node master private key (V1C) and a first node master public key (P1C), and the second node (S) is associated with a second asymmetric cryptography pair of the cryptography system, the second asymmetric cryptography pair having a second node master private key (V1S) and a second node master public key (P1S), wherein the first node master public key and second node master public key are based on encryption of respective first node master private key and second node master private key using the cryptography system common with the first and second nodes, and wherein the method comprises:

  • determining a first node second private key (V2C) based on at least the first node master private key (V1C) and a deterministic key (DK) common with the first and second nodes;

    determining a second node second public key (P2S) based on at least the second node master public key (P1S) and encryption of the deterministic key (DK) using the common cryptography system; and

    determining the common secret (CS) based on encryption of the first node second private key (V2C), using the common cryptography system, and the second node second public key (P2S),wherein the second node (S) has the same common secret (S) based on a first node second public key (P2C) and encryption of a second node second private key (V2S) using the common cryptography system, wherein;

    the first node second public key (P2C) is based on at least the first node master public key (P1C) and encryption of the deterministic key (DK) using the common cryptography system; and

    the second node second private key (V2S) is based on at least the second node master private key (V1S) and the deterministic key (DK).

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×