×

Identification and/or signature process

  • US 5,987,138 A
  • Filed: 04/07/1997
  • Issued: 11/16/1999
  • Est. Priority Date: 04/09/1996
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method by which a claimant is identified by a verifier with a desired security level, comprising:

  • selecting a number n, k numbers s1, s2, . . . sk less than n, and an exponent e, wherein n is a product of two prime numbers, k is an integer, and e≦

    3;

    generating a secret key comprising said k numbers, s1, s2, . . . sk, said secret key being known only to the claimant;

    calculating k numbers v1, v2, . . . vk, wherein vi =si-e mod n, and i is an integer index from 1 to k included;

    generating a public key comprising said number n, said numbers v1, v2, . . . vk, and said exponent e, said public key being accessible by the verifier;

    drawing by the claimant a number r, wherein 0≦

    r≦

    n-1;

    calculating by a processor in the claimant a control number x, wherein x=re mod n;

    transmitting said control number x from the claimant to the verifier;

    choosing an integer p based on the desired security level, wherein 1<

    p<

    k;

    drawing p integers between 1 and k included;

    drawing p numbers ap '"'"'s such that 1≦

    ap

    e-1;

    setting ai =0 for i≠

    p and for 1≦

    i≦

    k;

    transmitting a question from said verifier to said claimant, said question comprising said a1, a2, . . . , ak ;

    calculating by said processor in the claimant an answer y, wherein ##EQU18## transmitting said answer from the claimant to the verifier;

    calculating by a processor in the verifier a verifying expression given by;

    ##EQU19## verifying the claimant identity by the verifier, wherein the claimant identity is verified if said verifying expression equals the control number x.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×