METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
First Claim
1. A computer implemented method for cryptographic key creation, the method comprising the acts of:
- accepting a cryptographic key component generated on a computer system by a plurality of parties thereby yielding a plurality of cryptographic key components;
verifying participation of the plurality of parties;
constructing, by a computer processor, a public key based on at least a portion of the plurality of cryptographic key components; and
generating, after a predetermined time, a secret key based on at least a portion of the plurality of cryptographic key components.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided (“the Service”) based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components,
85 Citations
55 Claims
-
1. A computer implemented method for cryptographic key creation, the method comprising the acts of:
-
accepting a cryptographic key component generated on a computer system by a plurality of parties thereby yielding a plurality of cryptographic key components; verifying participation of the plurality of parties; constructing, by a computer processor, a public key based on at least a portion of the plurality of cryptographic key components; and generating, after a predetermined time, a secret key based on at least a portion of the plurality of cryptographic key components. - View Dependent Claims (2, 3, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 18, 20, 21, 22, 23, 24, 26, 27, 28, 30)
-
-
4. (canceled)
- 12. (canceled)
-
19. (canceled)
-
25. (canceled)
-
29. (canceled)
-
31. (canceled)
-
32. (canceled)
-
33. A computer-readable medium having computer-readable signals stored thereon that define instructions that, as a result of being executed by a computer, instruct the computer to perform a method for cryptographic encoding, the method comprising:
-
generating a cryptographic key component by a plurality of parties to yield a plurality of cryptographic key components; verifying participation of the plurality of parties; constructing a public key based on at least a portion of the plurality of cryptographic key components; and generating, after a predetermined time, a secret key based on at least a portion of the plurality of cryptographic key components.
-
-
34-53. -53. (canceled)
-
54. A system for cryptographic encoding, the system comprising:
-
a cryptographic key generation component adapted to create a cryptographic key component for the plurality of parties to yield a plurality of cryptographic key components; a communication component for communicating between the plurality of parties; a construction component adapted to construct a public key based on at least a portion of the plurality of cryptographic key components, wherein the construction component is further adapted to generate, after a predetermined time, a secret key, based on at least a portion of a plurality of cryptographic key components; and a verification component adapted to verify proper participation of the plurality of parties.
-
-
55-73. -73. (canceled)
Specification