ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGE
First Claim
1. In a method including the steps of, (a) identifying domain parameters that define a finite cyclic group, the domain parameters including a generating point, and (b) performing a cryptographic operation as a deterministic function that is based upon the domain parameters, an improvement comprising the steps of, (c) transforming the generating point into another member of the finite cyclic group as a deterministic function of shared knowledge, and (d) substituting said transformed generating point of said step (c) for said identified generating point of said step (a) in the deterministic function of said step (b).
3 Assignments
0 Petitions
Accused Products
Abstract
An asymmetric key cryptosystem is provided using a private key of a public-private key pair by: identifying domain parameters of a finite cyclic group, the domain parameters including an initial generating point; transforming the initial generating point into a new generating point as a deterministic function; generating the public key as a deterministic function of the private key and the domain parameters, in which the new generating point is substituted for the initial generating point; and generating the digital signature as a deterministic function of the private key and the domain parameters, in which the new generating point is substituted for the initial generating point.
139 Citations
23 Claims
-
1. In a method including the steps of,
(a) identifying domain parameters that define a finite cyclic group, the domain parameters including a generating point, and (b) performing a cryptographic operation as a deterministic function that is based upon the domain parameters, an improvement comprising the steps of, (c) transforming the generating point into another member of the finite cyclic group as a deterministic function of shared knowledge, and (d) substituting said transformed generating point of said step (c) for said identified generating point of said step (a) in the deterministic function of said step (b).
-
22. A method including the steps of,
(a) transforming an initial generating point of domain parameters that define a finite cyclic group into another member of the finite cyclic group as a deterministic function of shared knowledge, and (b) performing a cryptographic operation as a deterministic function that is based upon the domain parameters, wherein said transformed generating point of said step (a) is substituted for the initial generating point of the domain parameters.
-
23. A computer-readable medium having computer-executable instructions for performing the steps comprising:
-
(a) transforming an initial generating point of domain parameters that define a finite cyclic group into another member of the finite cyclic group as a deterministic function of shared knowledge, and (b) performing a cryptographic operation as a deterministic function that is based upon the domain parameters, wherein said transformed generating point of said step (a) is substituted for the initial generating point of the domain parameters.
-
Specification