×

Fair cryptosystems and methods of use

  • US 5,315,658 A
  • Filed: 04/19/1993
  • Issued: 05/24/1994
  • Est. Priority Date: 04/20/1992
  • Status: Expired
First Claim
Patent Images

1. A method, using a public-key cryptosystem, for enabling a predetermined entity to monitor communications of users suspected of unlawful activities while protecting the privacy of law-abiding users, wherein each user is assigned a pair of matching secret and public keys, comprising the steps of:

  • breaking each user'"'"'s secret key into shares;

    providing trustees pieces of information enabling the trustees to verify that the pieces of information include shares of a secret key of some given public key; and

    upon a predetermined request, having the trustees reveal the shares of the secret key of a user suspected of unlawful activity to enable the entity to attempt reconstruction of the secret key; and

    monitoring communications to the suspect user during a time period specified in the predetermined request.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×