Systems and Methods for Efficient Authentication
First Claim
Patent Images
1. A communication system configured to operate in an ad hoc network, comprising:
- a transmission device configured to receive a message; and
a verifying module configured to hierarchically verify a predetermined portion of the message.
4 Assignments
0 Petitions
Accused Products
Abstract
A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.
46 Citations
20 Claims
-
1. A communication system configured to operate in an ad hoc network, comprising:
-
a transmission device configured to receive a message; and a verifying module configured to hierarchically verify a predetermined portion of the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A communication system configured to operate in an ad hoc network, comprising:
-
a transmission device configured to transmit a message; and a signing module configured to generate a hierarchical signature using the message. - View Dependent Claims (17, 18)
-
-
19. A computer readable medium on which are stored executable authentication instructions for:
signing a message, comprising; dividing the message into n words b1, b2, . . . , bn; generating 2n random variables s1, s2, . . . , sn and c1, c2, . . . , cn; setting a private key S as the 2n random variables S={s1, s2, . . . , sn, c1, c2, . . . , cn}; for each i in a set iε
{1,n};generating Xi=H2 k (si) and Yi=H2k (ci); andcalculating Zi=H(Xi∥
Yi);setting a public key V as V=[Z1, Z2, . . . , Zn]; for each i in a set iε
{1,n};generating σ
i=Hbi (si) and Yi=H2k −
bi (ci); andsetting a hierarchical signature σ
as σ
=σ
1∥
. . . ∥
σ
n∥
γ
1∥
. . . ∥
γ
n.- View Dependent Claims (20)
Specification