Cryptographic keys using random numbers instead of random primes
First Claim
Patent Images
1. A method for providing cryptographic keys usable in a network of connected computer nodes applying a signature scheme, the method executable by a first computer node comprising the steps of:
- generating a random secret key;
generating an exponent interval having a first random limit, wherein, with a probability close to certainty, each element of the exponent interval has a unique prime factor that is larger than a given security parameter;
providing a public key comprising an exponent-interval description and a public key value derived from the random secret key, such that the random secret key and a selected exponent value from the exponent interval are usable for deriving a signature value on a message to be sent within the network to a second computer node for verification.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides systems, apparatus and methods for providing cryptographic keys which are usable in a network of connected computer nodes applying a signature scheme. Further, the present invention provides systems, apparatus and methods for providing a signature value on a message in a network of connected computer nodes, and systems, apparatus and methods for verifying the signature value on the message.
19 Citations
21 Claims
-
1. A method for providing cryptographic keys usable in a network of connected computer nodes applying a signature scheme, the method executable by a first computer node comprising the steps of:
-
generating a random secret key;
generating an exponent interval having a first random limit, wherein, with a probability close to certainty, each element of the exponent interval has a unique prime factor that is larger than a given security parameter;
providing a public key comprising an exponent-interval description and a public key value derived from the random secret key, such that the random secret key and a selected exponent value from the exponent interval are usable for deriving a signature value on a message to be sent within the network to a second computer node for verification. - View Dependent Claims (2, 3, 4, 13, 14)
-
-
5. A method for providing a signature value on a message in a network of connected computer nodes, the method executable by a first computer node comprising the steps of:
-
selecting an exponent value from an exponent interval, wherein each element of the exponent interval has, with a probability close to certainty, a unique prime factor that is larger than a given security parameter; and
deriving the signature value from a provided secret key, the selected exponent value, and the message, the signature value being sendable within the network to a second computer node for verification. - View Dependent Claims (6, 15, 16)
-
-
7. A method for verifying a signature value on a message in a network of connected computer nodes, the method executable by a second computer node comprising the steps of:
-
receiving the signature value from a first computer node; and
verifying whether an exponent value is contained in an exponent interval, wherein each element of the exponent interval has, with a probability close to certainty, a unique prime factor that is larger than a given security parameter, the signature value is invalid if the exponent value is not contained in the exponent interval. - View Dependent Claims (8, 17, 18)
-
-
9. An apparatus to provide a signature value on a message in a network of connected computer nodes, the apparatus executable by a first computer node comprising:
-
means for selecting an exponent value from an exponent interval, wherein each element of the exponent interval has, with a probability close to certainty, a unique prime factor that is larger than a given security parameter; and
means for deriving the signature value from a provided secret key, the selected exponent value, and the message, the signature value being sendable within the network to a second computer node for verification. - View Dependent Claims (11, 19)
-
-
10. An apparatus to verify a signature value on a message in a network of connected computer nodes, the apparatus executable by a second computer node comprising:
-
means for receiving the signature value from a first computer node; and
means for verifying whether an exponent value is contained in an exponent interval, wherein each element of the exponent interval has, with a probability close to certainty, a unique prime factor that is larger than a given security parameter , the signature value is invalid if the exponent value is not contained in the exponent interval. - View Dependent Claims (20)
-
-
12. An apparatus to provide cryptographic keys usable in a network of connected computer nodes applying a signature scheme, the apparatus executable by a first computer node comprising:
-
means for generating a random secret key;
means for generating an exponent interval having a first random limit, wherein, with a probability close to certainty, each element of the exponent interval has a unique prime factor that is larger than a given security parameter; and
means for providing a public key comprising an exponent-interval description and a public key value derived from the random secret key, such that the random secret key and a selected exponent value from the exponent interval are usable for deriving a signature value on a message to be sent within the network to a second computer node for verification. - View Dependent Claims (21)
-
Specification