Transmitting messages over a network
First Claim
1. A method of identifying a private key of a user re-using a digital coin, comprising the steps of:
- taking a message to be signed by the user;
signing the message into a digital signature of the user, the digital signature being generated as a function of that message using public and secret signature generators of the user, and a private key of the user; and
transmitting the signed message over a network to a receiver;
wherein;
the message to be signed by the user incorporates a first value which is a first predetermined function of the user'"'"'s public signature generator, and upon re-use of the message subtracting the secret signature generator from the digital signature to enable the private key to be determined.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of transmitting a message over a network from a sender to a receiver, comprises the steps of: taking a message (Coin) to be signed by the sender; signing the message into a digital signature (e, y) of the sender (steps 56,58), the digital signature being generated as a function of that message using public and secret signature generators (x, r) of the sender, a private key (s) of the sender, and other publicly known values (a, p, q); and transmitting the signed message over the network to the receiver (step 60); characterised in that: the message to be signed by the sender incorporates a first value (f(x)) which is a first predetermined function (such as a secure one-way hash function) of the sender'"'"'s public signature generator (x) (step 48). It is thus possible that the incorporation of a proper first value can be verified by a receiver of the message who requires the sender to sign the message using a public signature generator, and furthermore that if a sender signs and transmits the same message more than once, the private key of the sender can be derived from the plurality of signed messages and a relationship between the public and private signature generators.
81 Citations
18 Claims
-
1. A method of identifying a private key of a user re-using a digital coin, comprising the steps of:
-
taking a message to be signed by the user;
signing the message into a digital signature of the user, the digital signature being generated as a function of that message using public and secret signature generators of the user, and a private key of the user; and
transmitting the signed message over a network to a receiver;
wherein;
the message to be signed by the user incorporates a first value which is a first predetermined function of the user'"'"'s public signature generator, and upon re-use of the message subtracting the secret signature generator from the digital signature to enable the private key to be determined. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
calculating an apparent public signature of the user using the signed message, and a public key of the user;
calculating a further value which is the predetermined function of the apparent public signature generator; and
comparing the further value with the value incorporated in the received signed message.
-
-
8. A method as claimed in claim 7, wherein the digital signature includes a second value which is a second predetermined function dependent on the first value, including the further steps of:
-
calculating a sixth value which is the second predetermined function of the fifth value; and
comparing the sixth value with the second value included in the received signature.
-
-
9. A method as claimed in claim 7, wherein the message to be signed by the sender incorporates a fourth value which is a fourth predetermined function of a public key of the sender including the further steps of:
-
calculating a seventh value which is the fourth predetermined function of a public key of the sender received over the network; and
comparing the seventh value with the fourth value incorporated in the signed message.
-
-
10. A method as claimed in claim 6, wherein the fourth predetermined function is a secure one-way hash function.
-
11. A method of verifying the public key of a user of a signed message received over a network, the signed message purporting to have been transmitted in accordance with the method of claim 6, comprising the steps of:
-
calculating a seventh value which is the fourth predetermined function of the public key of the user received over the network; and
comparing the seventh value with the fourth value incorporated in the signed message.
-
-
12. A method according to claim 1, wherein the message represents a sum of money.
-
13. A method of identifying a private key of a user re-using a digital coin, comprising the steps of:
-
taking a message to be signed by the user;
signing the message into a digital signature of the user, the digital signature being generated as a function of that message using public and secret signature generators of the user, and public and private keys of the user; and
transmitting the signed message over a network to a receiver;
wherein;
the message to be signed by the user incorporates another value which is another predetermined function of the public key of the user, and upon re-use of the message subtracting the secret signature generator from the digital signature to enable the private key to be determined. - View Dependent Claims (14, 15, 16)
calculating a further value which is the another predetermined function of the public key of the user received over the network; and
comparing the further value with the another value incorporated in the signed message.
-
-
16. A method according to claim 13, wherein the message represents a sum of money.
-
17. Apparatus for identifying a private key of a user re-using a digital coin, comprising:
-
a store for taking a message to be signed by the user;
a signature generator for signing the message into a digital signature of the user, the digital signature being generated as a function of that message using public and secret signature generators of the user and a private key of the user, and wherein the signature generator is arranged so that (1) a value which is a predetermined function of the user'"'"'s public signature generator is incorporated into the message to be signed by the user and (2) upon re-use of the message the secret signature is subtractable from the digital signature for enabling the private key to be determined; and
a transmitter for transmitting the signed message over the network to a receiver.
-
-
18. Apparatus for identifying a private key of a user re-using a digital coin comprising:
-
a store for taking a message to be signed by the user;
a signature generator for signing the message into a digital signature of the user, the digital signature being generated as a function of that message using public and secret signature generators of the user, public and private keys of the user, and wherein the signature generator is arranged so (1) a value which is a predetermined function of the public key of the user and (2) upon re-use of the message the secret signature is subtractable from the digital signature for enabling the private key to be determined and is incorporated into the message to be signed by the user; and
a transmitter for transmitting the signed message over the network to a receiver.
-
Specification