×

Identity-based-encryption messaging system

  • US 7,571,321 B2
  • Filed: 03/14/2003
  • Issued: 08/04/2009
  • Est. Priority Date: 03/14/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for using identity-based encryption to support encrypted communications in a system in which users at user equipment communicate over a communications network, wherein the system has a plurality of identity-based-encryption private key generators each of which generates private keys for the users and each of which generates respective public parameter information for use in the identity-based encryption of messages to be sent to those users that are associated with that private key generator, wherein senders of messages in the system encrypt each of the messages using an identity-based-encryption algorithm that has as inputs (1) the public parameter information associated with the private key generator associated with an intended message recipient and (2) an identity-based-encryption public key that is based on the identity of that intended recipient, wherein users may have relationships with more than one of the private key generators so that when a given recipient receives a given encrypted message from a given sender, the given recipient may not know in advance which private key generator and which associated public parameter information was used by the given sender to encrypt the given message and may not know in advance which of that given recipient'"'"'s corresponding private keys to use to decrypt the given encrypted message, the method comprising:

  • receiving private key identification information at the recipient that was sent from the given sender to the given recipient with the given encrypted message, wherein the private key identification information identifies for the recipient which of the plurality of identity-based-encryption private key generators to contact to obtain an appropriate private key to decrypt the given encrypted message;

    with the private key identification information received at the given recipient, identifying which of the plurality of identity-based-encryption private key generators to contact to obtain the appropriate private key to decrypt the given encrypted message; and

    at the given recipient, retrieving the appropriate private key from the identified private key generator over the communications network.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×