Identity-based encryption system
First Claim
1. A method for using identity-based encryption to support encrypted communications in a system in which users at user equipment communicate over a communications network, wherein the system has a plurality of private key generators and a plurality of respective associated sets of public parameters, wherein each private key generator generates private keys for a group of associated users, wherein each user'"'"'s private key may be used by that user to decrypt messages for the user that have been encrypted using the user'"'"'s identity and the set of public parameters associated with the private key generator that generates that user'"'"'s private key, and wherein computers coupled to the communications network are used to store the plurality of sets of public parameters, comprising:
- at a sender having user equipment coupled to the communications network, downloading an appropriate one of the stored plurality of sets of the public parameters to use to encrypt a message for a receiver at user equipment coupled to the communications network, wherein the sender and the receiver are not associated with a common private key generator.
11 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver'"'"'s identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver generates a private key for the receiver. The encrypted message may be decrypted by the receiver using the receiver'"'"'s private key. The system may have multiple private key generators, each with a separate set of public parameters. Directory services may be used to provide a sender that is associated with one private key generator with appropriate public parameters to use when encrypting messages for a receiver that is associated with a different private key generator. A certification authority may be used to sign directory entries for the directory service. A clearinghouse may be used to avoid duplicative directory entries.
-
Citations
15 Claims
-
1. A method for using identity-based encryption to support encrypted communications in a system in which users at user equipment communicate over a communications network, wherein the system has a plurality of private key generators and a plurality of respective associated sets of public parameters, wherein each private key generator generates private keys for a group of associated users, wherein each user'"'"'s private key may be used by that user to decrypt messages for the user that have been encrypted using the user'"'"'s identity and the set of public parameters associated with the private key generator that generates that user'"'"'s private key, and wherein computers coupled to the communications network are used to store the plurality of sets of public parameters, comprising:
at a sender having user equipment coupled to the communications network, downloading an appropriate one of the stored plurality of sets of the public parameters to use to encrypt a message for a receiver at user equipment coupled to the communications network, wherein the sender and the receiver are not associated with a common private key generator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for using identity-based encryption to support encrypted communications in a system in which users at user equipment communicate over a communications network, wherein the system has a plurality of private key generators and a plurality of respective associated sets of public parameters, wherein each private key generator generates private keys for a group of associated users, wherein each user'"'"'s private key may be used by that user to decrypt messages for the user that have been encrypted using the user'"'"'s identity and the set of public parameters associated with the private key generator that generates that user'"'"'s private key, wherein a given sender having user equipment coupled to the communications network downloads an appropriate set of the public parameters to use to encrypt a message for a receiver at user equipment coupled to the communications network, and wherein the given sender and the receiver are not associated with a common private key generator, comprising:
using computers coupled to the communications network to store the plurality of sets of public parameters including the appropriate set of public parameters that the given sender downloads. - View Dependent Claims (10, 11, 12, 13, 14, 15)
Specification