CRYPTOGRAPHIC METHOD FOR ANONYMOUS AUTHENTICATION AND SEPARATE IDENTIFICATION OF A USER
First Claim
1. A cryptographic method for anonymous authentication and identification of a user entity by a checking entity and an identifying entity respectively, wherein:
- the checking entity receives from the user entity at least one first signature and a first message and verifies the first signature by means of the first message in order to authenticate the user entity; and
the identifying entity receives from the checking entity a second signature linked to the first signature and identifies the user entity by means of the second signature and a secret key specific to the identifying entity.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to cryptographic method for the anonymous authentication and the identification of a user entity (Ui) respectively by a checking entity (D) and an identifying entity (O). According to this method, the checking entity (D) receives (130) from the user entity (U1) at least one first signature (σ) and a first message (m), and checks (140) the first signature (σ) using the first message (m) in order to authenticate the user (U), and the identifying entity (O) receives (150) from the checking entity (D) a second signature (σ′) connected to the first signature (σ) and identifies (160) the user using the second signature and a secret key particular thereto. The invention also relates to a cryptographic system for implementing said method.
76 Citations
15 Claims
-
1. A cryptographic method for anonymous authentication and identification of a user entity by a checking entity and an identifying entity respectively, wherein:
-
the checking entity receives from the user entity at least one first signature and a first message and verifies the first signature by means of the first message in order to authenticate the user entity; and the identifying entity receives from the checking entity a second signature linked to the first signature and identifies the user entity by means of the second signature and a secret key specific to the identifying entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification