Efficient Certified Email Protocol
First Claim
1. An optimistic protocol for a two-party transaction, the optimistic protocol comprising:
- a setup sub-protocol that comprises an authorized Diffie-Hellman key agreement;
an exchange sub-protocol that comprises sending a certificate from a sending party to a receiving party and sending a receipt from the receiving party to the sending party; and
a dispute sub-protocol that comprises a dispute resolution mechanism for resolving disputes between the sending party and the receiving party due to sending of an invalid certificate, due to sending an invalid receipt, or due to abortion of the exchange sub-protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary optimistic protocol for a two-party transaction includes a setup sub-protocol that includes an authorized Diffie-Hellman key agreement, an exchange sub-protocol that includes sending a certificate from a sending party to a receiving party and sending a receipt from the receiving party to the sending party and a dispute sub-protocol that includes a dispute resolution mechanism for resolving disputes between the sending party and the receiving party due to sending of an invalid certificate, due to sending an invalid receipt, or due to abortion of the exchange sub-protocol. Other exemplary methods, systems, etc., are also disclosed.
28 Citations
20 Claims
-
1. An optimistic protocol for a two-party transaction, the optimistic protocol comprising:
-
a setup sub-protocol that comprises an authorized Diffie-Hellman key agreement; an exchange sub-protocol that comprises sending a certificate from a sending party to a receiving party and sending a receipt from the receiving party to the sending party; and a dispute sub-protocol that comprises a dispute resolution mechanism for resolving disputes between the sending party and the receiving party due to sending of an invalid certificate, due to sending an invalid receipt, or due to abortion of the exchange sub-protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, implemented at least in part by a computing device, the method comprising:
-
providing a public key to a certification authority; receiving a certificate from the certification authority that binds the public key; sending an encrypted message and the certificate to a receiving party; receiving a signature from the receiving party; and in response to the receiving, sending information to the receiving party to decrypt the message. - View Dependent Claims (17)
-
-
18. A method, implemented at least in part by a computing device, the method comprising:
-
generating a signature; receiving an encrypted message and a certificate from a sending party; sending the signature to the sending party; receiving information from the sending party to decrypt the message; and decrypting the message. - View Dependent Claims (19, 20)
-
Specification