Method of providing digital signatures
First Claim
Patent Images
1. In a method of providing a digital signature of the type which generates a secret number Xi, computes Yi =F(Xi) where F( ) is a one way function, authenticates Yi and F( ) at the receiver and transmits Xi to the receiver as the digital signature, the improvement characterized by:
- the step ofselecting an authentication tree with an authentication tree function comprising a one way function of the Yi ;
authenticating at the receiver the root of the authentication tree and the authentication tree function;
transmitting from the transmitter to the receiver the Yi and the corresponding authentication path values of the authentication tree; and
authenticating the Yi at the receiver by computing the authentication path of the authentication tree between the Yi and the root of the authentication tree.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention comprises a method of providing a digital signature for purposes of authentication of a message, which utilizes an authentication tree function of a one-way function of a secret number.
-
Citations
4 Claims
-
1. In a method of providing a digital signature of the type which generates a secret number Xi, computes Yi =F(Xi) where F( ) is a one way function, authenticates Yi and F( ) at the receiver and transmits Xi to the receiver as the digital signature, the improvement characterized by:
- the step of
selecting an authentication tree with an authentication tree function comprising a one way function of the Yi ; authenticating at the receiver the root of the authentication tree and the authentication tree function; transmitting from the transmitter to the receiver the Yi and the corresponding authentication path values of the authentication tree; and authenticating the Yi at the receiver by computing the authentication path of the authentication tree between the Yi and the root of the authentication tree. - View Dependent Claims (2)
- the step of
-
3. A method of authenticating an item in a list of items comprising the steps of:
-
defining an authentication tree with an authentication tree function comprising a one way function of the items in the list; authenticating the root of the authentication tree and the authentication tree function; and authenticating the item in the list of items by computing the authentication path of the authentication tree between said item and the root of the authentication tree. - View Dependent Claims (4)
-
Specification