Method and apparatus for generating a cryptographic key
First Claim
1. Computer apparatus comprising a processor arranged to generating a cryptographic key using a first data set that corresponds to a first identifier, a second data set that corresponds to a first trusted party'"'"'s public key, a third data set that corresponds to a second identifier and a fourth data set corresponds to a second trusted party'"'"'s public key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for generating a cryptographic key from multiple data sets each related to a respective association of a trusted party and user identity. The cryptographic key is, for example, one of an encryption key, a decryption key, a signature key and a verification key, and is preferably generated by applying Tate or Weil bilinear mappings to the data sets. At least two of the data sets may relate to different user identities and/or different trusted authorities. Where multiple trusted authorities are involved, these authorities may be associated with different elements to which the bilinear mapping can be applied, each trusted authority having an associated public key formed from its associated element and a secret of that trusted authority.
-
Citations
49 Claims
- 1. Computer apparatus comprising a processor arranged to generating a cryptographic key using a first data set that corresponds to a first identifier, a second data set that corresponds to a first trusted party'"'"'s public key, a third data set that corresponds to a second identifier and a fourth data set corresponds to a second trusted party'"'"'s public key.
- 25. A method comprising generating a cryptographic key using a first data set that corresponds to a first identifier, a second data set corresponds to a first trusted party'"'"'s public key, a third data set that corresponds to a second identifier and a fourth data set that corresponds to a second trusted party'"'"'s public key.
-
28. A computer system comprising a first computer entity arranged to generate a first data set that corresponds to a first trusted party'"'"'s public key;
- a second computer entity arranged to generate a second data set that corresponds to a second trusted party'"'"'s public key; and
a third computer entity arranged to generate a cryptographic key using a first identifier in conjunction with the first data set and a second identifier in conjunction with the second data set. - View Dependent Claims (29, 30, 31, 32, 33)
- a second computer entity arranged to generate a second data set that corresponds to a second trusted party'"'"'s public key; and
- 34. A method of generating a cryptographic key wherein a bilinear mapping function is used to process multiple data sets each comprising data related to a respective association of trusted authority and user identity.
-
43. A computer program product arranged, when installed in computing apparatus, to condition the apparatus for generating a cryptographic key by using a bilinear mapping function to process multiple data sets each comprising data related to a respective association of trusted authority and user identity.
Specification