Small Public-Key Based Digital Signatures for Authentication
First Claim
1. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
- generating a pseudorandom string value from an input value;
generating a first public key value based on the modulus N and the pseudorandom string value;
generating a first private key value corresponding to the first public key value;
receiving a second public key value; and
generating a shared secret value based on the modulus N, the first private key value and the second public key value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier'"'"'s public key value; generating a shared secret value based on the modulus N, the private key value and the verifier'"'"'s public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
32 Citations
42 Claims
-
1. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
-
generating a pseudorandom string value from an input value; generating a first public key value based on the modulus N and the pseudorandom string value; generating a first private key value corresponding to the first public key value; receiving a second public key value; and generating a shared secret value based on the modulus N, the first private key value and the second public key value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
means for generating a pseudorandom string value from an input value; means for generating a first public key value based on the modulus N and the pseudorandom string value; means for generating a first private key value corresponding to the first public key value; means for receiving a second public key value; and means for generating a shared secret value based on the modulus N, the first private key value and the second public key value. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
a pseudo-random generator configured to generate a pseudorandom string value from an input value; a key generating unit configured to generate a first public key value based on the modulus N and the pseudorandom string value, and to generate a first private key value corresponding to the first public key value; a receiver unit configured to receive a second public key value; and a secret value generating unit configured to generate a shared secret value based on the modulus N, the first private key value and the second public key value. - View Dependent Claims (22, 23)
-
-
24. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
-
receiving a first authentication signature value; generating a pseudorandom string value from an input value; generating a first public key value based on the modulus N and the pseudorandom string value; generating a shared secret value based on the modulus N, a private key value and the first public key value; calculating a second authentication signature value using the shared secret value; and comparing the first authentication signature value with the second authentication signature value. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
-
32. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
means for receiving a first authentication signature value; means for generating a pseudorandom string value from an input value; means for generating a first public key value based on the modulus N and the pseudorandom string value; means for generating a shared secret value based on the modulus N, a private key value and the first public key value; means for calculating a second authentication signature value using the shared secret value; and means for comparing the first authentication signature value with the second authentication signature value. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
a receiver unit configured to receive a first authentication signature value; a pseudo-random generator configured to generate a pseudorandom string value from an input value; a key generating unit configured to generate a first public key value based on the modulus N and the pseudorandom string value; a shared secret value generating unit configured to generate a shared secret value based on the modulus N, a private key value and the first public key value; a message authentication code unit configured to calculate a second authentication signature value using the shared secret value; and a comparing unit configured to compare the first authentication signature value with the second authentication signature value. - View Dependent Claims (39)
-
-
40. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
-
receiving a public key value generated based on the modulus N; generating a private key corresponding to the public key value by solving the discrete logarithm problem modulo N; and using the private key as a shared secret key. - View Dependent Claims (41)
-
-
42. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
means for receiving a public key value generated based on the modulus N; means for generating a private key corresponding to the public key value by solving the discrete logarithm problem modulo N; and means for using the private key as a shared secret key.
-
Specification