×

Secure user identification based on constrained polynomials

  • US 6,076,163 A
  • Filed: 10/20/1997
  • Issued: 06/13/2000
  • Est. Priority Date: 10/20/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. An authentication method, carried out between a prover and a verifier, the method comprising the steps of:

  • generating a response signal as a function of (i) information used to generate a commitment signal representative of a first polynomial, (ii) a challenge signal representative of a second polynomial, and (iii) a private key of the prover, such that the response signal is representative of a third polynomial having two or more terms and satisfying a set of constraints; and

    sending the response signal from the prover to the verifier, such that the verifier can authenticate a communication from the prover by evaluating a function of information contained in at least a subset of (i) the commitment signal, (ii) the challenge signal, (iii) the response signal and (iv) a public key of the prover.

View all claims
  • 17 Assignments
Timeline View
Assignment View
    ×
    ×