×

Method of public key cryptography that includes key escrow

  • US 5,920,630 A
  • Filed: 02/25/1997
  • Issued: 07/06/1999
  • Est. Priority Date: 02/25/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of encryption that includes key escrow, comprising the steps of:

  • a) having, by a first user, n secret encryption keys, where n is a positive integer, and where Si1 denotes the ith secret encryption key of the first user;

    b) having, by the first user, n public encryption keys corresponding to the n secret encryption keys of the first user, where Pi1 denotes the ith public encryption key of the first user;

    c) having, by a second user, n secret encryption keys, where Si2 denotes the ith secret encryption key of the second user;

    d) having, by the second user, n public encryption keys corresponding to the n secret encryption keys of the second user, where Pi2 denotes the ith public encryption key of the second user;

    e) receiving, by the first user, the n public encryption keys of the second user;

    f) receiving, by the first user, a unique identifier ID2 of the second user;

    g) generating, by the first user, n values ai =F1 (Si1, Pi2, ID1, ID2, r1), where ai =F1 (Si2, Pi1, ID1, ID2, r1), where ai does not equal F1 (Si1, Pi2, ID2, ID1, r1), where F1 is a first function, where ID1 is a unique identifier of the first user, where r1 is a first of m access restriction values r1, r2, . . . ,rm, and where m is a positive integer;

    h) generating, by the first user, n values bi =hm-1 ( . . . h2 (h1 (a1,r2),r3), . . . ,rm), where h1,h2, . . . ,hm-1 are one-way hash functions;

    i) generating, by the first user, key=h(F2 (b1, b2, . . . ,bn),x), where F2 is a second function, where h is a one-way hash function, and where x is a random number;

    j) encrypting, by the first user, a message using key;

    k) appending, by the first user, r1,r2, . . . ,rm, x, ID1, and ID2 to the encrypted message; and

    l) transmitting, by the first user, the result of step (k) to a storage medium.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×