System and method for establishing trust without revealing identity
First Claim
Patent Images
1. A method comprising:
- receiving an authentication request from a challenger device; and
sending information to the challenger device from a prover device; and
convincing the challenger device that a valid signature that is not on a revocation list of compromised device signatures is known by the prover device without revealing the signature to the challenger device.
1 Assignment
0 Petitions
Accused Products
Abstract
One aspect of an embodiment of the invention provides a method, system, and device to prove to a challenger that a prover device has a signature from a device manufacturer without revealing the signature to the challenger. According to one implementation, a challenger is provided with the result of a one-way function of a secret held by a prover device. An interactive proof is employed, between the prover device and the challenger, to prove to the challenger that the secret used in the one-way function has been signed by a device signature without revealing the secret or the device signature or the prover device'"'"'s identity to the challenger.
264 Citations
31 Claims
-
1. A method comprising:
-
receiving an authentication request from a challenger device; and sending information to the challenger device from a prover device; and convincing the challenger device that a valid signature that is not on a revocation list of compromised device signatures is known by the prover device without revealing the signature to the challenger device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
convincing a challenger that a prover has a valid signature of a known entity without revealing the signature; and convincing the challenger that the signature is not on a revocation list of compromised signatures without revealing the signature. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method comprising:
-
convincing a first challenger device that a second device has a valid signature without disclosing the signature to the first device; and convincing a third challenger device that the second device has a valid signature without disclosing the signature to the third device, wherein the information provided by the second device to the first challenger device and third challenger device is insufficient to permit the first challenger device and third challenger device to determine whether they are communicating with the same second device. - View Dependent Claims (13, 14)
-
-
15. A method comprising:
-
revealing to a first challenger platform the result of a one-way function of a secret held by a prover platform; and proving to the first challenger platform that the secret has a valid signature without revealing the secret to the first challenger platform. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method comprising:
-
convincing a challenger a first time that a prover has a valid signature of a known entity without revealing the signature; and convincing the same challenger a second time that the prover has a valid signature of a known entity without revealing the signature, wherein the challenger is not able to determine that the same signature was used during the first and second times. - View Dependent Claims (21, 22)
-
-
23. A method comprising:
-
generating a first signature key pair in a first device, the first signature key pair including a public signature key and a private signature key; providing the first public signature key to a first challenger; and proving to the first challenger that the first device has a signed secret without revealing a signature used to sign the secret or revealing the private signature key. - View Dependent Claims (24, 25, 26)
-
-
27. A device comprising:
-
a communication port; and a processing unit, the processing unit configured to communicate with a challenger platform over the communication port, and convince the challenger platform that it is probabilistically likely that the prover device knows a secret without revealing the identity of the device. - View Dependent Claims (28)
-
-
29. A system comprising:
-
a challenger device; and a prover device communicatively coupled to the challenger device, the prover device configured to convince the challenger that the prover device has a valid signature of a known entity that is not on a revocation list of compromised signatures without revealing the signature. - View Dependent Claims (30, 31)
-
Specification