Public key diversification method
First Claim
1. A method of generating key values for use in public key cryptography by a requesting entity, including the step of generating at a parent entity, public key values N, e, where N is the product of first and second prime numbers P,Q and e is a corresponding public key integer value, comprising:
- selecting, at said parent entity, third and fourth prime numbers R,S;
transmitting to said requesting entity a first value Nmi and a second value Φ
(Nmi) where said first value Nmi =N·
R·
S and where said second value Φ
(Nmi)=Φ
(N)·
(R-1)·
(S-1), wherein the symbol Φ
represents Euler'"'"'s totient function;
selecting, at said requesting entity, fifth and sixth prime numbers, T,U; and
computing, at said requesting entity, a third value Nm and a fourth value dm, where Nm =Nmi ·
T·
U, and where dm =[1+K Φ
(Nm)]/e;
wherein Φ
(Nm)=Φ
(Nmi)·
(T-1)·
(U-1); and
wherein K and dm are integers, whereby dm is adapted to be used by said requesting entity as a secret key counterpart of the public key value e with respect to Nm.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed whereby individual members of a group of members or entities may be provided, under the control of a trusted member, referred to as the parent, with respective individual secret keys for use in public key cryptography, such that the matching public key can be readily derived, and group membership authenticated. The parent initially establishes a public key (e,N) where N=P.Q is the product of two primes. In response to a request from a group member, the parent selects two further primes R,S and communicates two values dependent thereon to the requesting member, which selects two more primes T and U for use in conjunction with the received values to establish the member'"'"'s secret key.
51 Citations
8 Claims
-
1. A method of generating key values for use in public key cryptography by a requesting entity, including the step of generating at a parent entity, public key values N, e, where N is the product of first and second prime numbers P,Q and e is a corresponding public key integer value, comprising:
-
selecting, at said parent entity, third and fourth prime numbers R,S; transmitting to said requesting entity a first value Nmi and a second value Φ
(Nmi) where said first value Nmi =N·
R·
S and where said second value Φ
(Nmi)=Φ
(N)·
(R-1)·
(S-1), wherein the symbol Φ
represents Euler'"'"'s totient function;selecting, at said requesting entity, fifth and sixth prime numbers, T,U; and computing, at said requesting entity, a third value Nm and a fourth value dm, where Nm =Nmi ·
T·
U, and where dm =[1+K Φ
(Nm)]/e;wherein Φ
(Nm)=Φ
(Nmi)·
(T-1)·
(U-1); andwherein K and dm are integers, whereby dm is adapted to be used by said requesting entity as a secret key counterpart of the public key value e with respect to Nm. - View Dependent Claims (2, 3, 4, 5, 7, 8)
-
-
6. A method according to claim 6 wherein said public key integer value e is a prime number.
Specification