IMPLICITLY CERTIFIED PUBLIC KEYS
First Claim
1. A method comprising:
- accessing an implicit certificate associated with an entity and generated by a certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity;
accessing certificate authority public key information associated with the certificate authority;
generating a first value based on evaluating a hash function, wherein the hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity; and
generating a public key value of the entity based on the first value.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity and generated by a certificate authority. The implicit certificate includes a public key reconstruction value of the entity. Certificate authority public key information is accessed. The certificate authority public key information is associated with the certificate authority that issued the implicit certificate. A first value is generated based on evaluating a hash function. The hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity. A public key value of the entity can be generated or otherwise used based on the first value.
22 Citations
21 Claims
-
1. A method comprising:
-
accessing an implicit certificate associated with an entity and generated by a certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing certificate authority public key information associated with the certificate authority; generating a first value based on evaluating a hash function, wherein the hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storing instructions that are operable when executed by data processing apparatus to perform operations comprising:
-
accessing an implicit certificate associated with an entity and generated by a certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing certificate authority public key information associated with the certificate authority; generating a first value based on evaluating a hash function, wherein the hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computing system comprising a cryptographic module operable to perform operations, the operations comprising:
-
accessing an implicit certificate associated with an entity and generated by a certificate authority, wherein the implicit certificate includes a public key reconstruction value of the entity; accessing certificate authority public key information associated with the certificate authority; generating a first value based on evaluating a hash function, wherein the hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity; and generating a public key value of the entity based on the first value. - View Dependent Claims (19, 20, 21)
-
Specification