System, apparatus and method for replacing a cryptographic key
First Claim
1. A method for authentication in a public cryptographic system comprising:
- creating a first private key and corresponding first public key;
creating a second private key associated with the first private key and creating a second public key corresponding to the second private key;
outputting the second private key once such that it can be re-created;
outputting the second public key when outputting the first public key; and
using the first private key for authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.
57 Citations
51 Claims
-
1. A method for authentication in a public cryptographic system comprising:
-
creating a first private key and corresponding first public key;
creating a second private key associated with the first private key and creating a second public key corresponding to the second private key;
outputting the second private key once such that it can be re-created;
outputting the second public key when outputting the first public key; and
using the first private key for authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for verification in a public cryptographic system comprising:
-
receiving a first public key;
receiving a second public key associated with the first public key;
using the first public key for authentication; and
using the second public key for authentication if the first public key fails. - View Dependent Claims (12, 13)
-
-
14. Apparatus for authentication in a public cryptographic system comprising:
-
means for creating a first private key and corresponding first public key;
means for creating a second private key associated with the first private key and creating a second public key corresponding to the second private key;
means for outputting the second private key once such that it can be re-created;
means for outputting the second public key when outputting the first public key; and
means for using the first private key for authentication. - View Dependent Claims (15, 16, 17, 18)
-
-
19. Apparatus for verification in a public cryptographic system comprising:
-
means for receiving a first public key;
means for receiving a second public key associated with the first public key;
means for using the first public key for authentication; and
means for using the second public key for authentication if the first public key fails. - View Dependent Claims (20, 21)
-
-
22. An article of manufacture comprising a computer system having a public cryptographic system, said article of manufacture comprising a machine readable medium having machine readable code means embodied in said medium comprising:
-
machine readable code means embodied in said machine readable medium for causing the computer to create a first private key and corresponding first public key;
machine readable code means embodied in said machine readable medium for causing the computer to create a second private key associated with the first private key and creating a second public key corresponding to the second private key;
machine readable code means embodied in said machine readable medium for causing the computer to output the second private key once such that it can be re-created;
machine readable code means embodied in said machine readable medium for causing the computer to output the second public key when outputting the first public key; and
machine readable code means embodied in said machine readable medium for causing the computer to use the first private key for authentication. - View Dependent Claims (23, 24, 25)
-
-
26. An article of manufacture comprising a computer system having a public cryptographic system, said article of manufacture comprising a machine readable medium having machine readable code means embodied in said medium comprising:
-
machine readable code means embodied in said machine readable medium for causing the computer to receive a first public key;
machine readable code means embodied in said machine readable medium for causing the computer to receive a second public key associated with the first public key;
machine readable code means embodied in said machine readable medium for causing the computer to use the first public key for authentication; and
machine readable code means embodied in said machine readable medium for causing the computer to use the second public key for authentication if the first public key fails. - View Dependent Claims (27, 28)
-
-
29. A method for authentication in a public cryptographic system comprising:
-
creating a private key, a public key corresponding to the private key, and an associated system parameter;
outputting the system parameter when outputting the public key; and
using the private key for authentication. - View Dependent Claims (30, 31, 32)
-
-
33. A method for verification in a public cryptographic system comprising:
-
receiving a public key;
receiving a system parameter associated with the public key;
authenticating using the public key; and
generating a new public key and authenticating using the new public key, if a previous public key fails, the new public key being derived from the previous public key and the system parameter. - View Dependent Claims (34, 35)
-
-
36. Apparatus for authentication in a public cryptographic system comprising:
-
means for creating a private key, a public key corresponding to the private key, and an associated system parameter;
means for outputting the system parameter when outputting the public key; and
means for using the private key for authentication. - View Dependent Claims (37, 38, 39)
-
-
40. Apparatus for verification in a public cryptographic system comprising:
-
means for receiving a public key;
means for receiving a system parameter associated with the public key;
means for authenticating using the public key; and
means for generating a new public key and authenticating using the new public key, if a previous public key fails, the new public key being derived from the previous public key and the system parameter. - View Dependent Claims (41, 42)
-
-
43. An article of manufacture comprising a computer system having a public cryptographic system, said article of manufacture comprising a machine readable medium having machine readable code means embodied in said medium comprising:
-
machine readable code means embodied in said machine readable medium for causing the computer to create a private key, a public key corresponding to the private key, and an associated system parameter;
machine readable code means embodied in said machine readable medium for causing the computer to output the system parameter when outputting the public key; and
machine readable code means embodied in said machine readable medium for causing the computer to use the private key for authentication. - View Dependent Claims (44, 45, 46)
-
-
47. An article of manufacture comprising a computer system having a public cryptographic system, said article of manufacture comprising a machine readable medium having machine readable code means embodied in said medium comprising:
-
machine readable code means embodied in said machine readable medium for causing the computer to receive a public key;
machine readable code means embodied in said machine readable medium for causing the computer to receive a system parameter associated with the public key;
machine readable code means embodied in said machine readable medium for causing the computer to authenticate using the public key;
machine readable code means embodied in said machine readable medium for causing the computer to generate a new public key and authenticating using the new public key, if a previous public key fails, the new public key being derived from the previous public key and the system parameter. - View Dependent Claims (48, 49)
-
-
50. Apparatus used for authentication comprising:
-
a processor configured to generate a first private key and corresponding first public key, the processor configured to generate a second private key associated with the first private key and to create a second public key corresponding to the second private key;
a storage medium coupled to the processor, configured to store the first private key; and
a transmitter coupled to the processor, configured to output the second private key once such that it can be re-created and to output the second public key when outputting the first public key;
wherein the processor uses the first private key for authentication.
-
-
51. Apparatus used for verification comprising:
-
a receiver configured to receive a first public key and to receive a second public key associated with the first public key;
a storage medium coupled to the receiver, configured to store the first and second public keys; and
a processor coupled to the receiver, configured to use the first public key for authentication, the processor configured to use the second public key for authentication if the first public key fails.
-
Specification