×

Software for providing based on shared knowledge public keys having same private key

  • US 7,869,593 B2
  • Filed: 08/08/2005
  • Issued: 01/11/2011
  • Est. Priority Date: 01/07/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. An invention comprising a method for facilitating digital signature communications of a first party with multiple third parties, the method comprising executing computer program instructions by one or more processors for:

  • (a) communicating software to the first party, the software including computer-executable instructions for,(i) providing a first public key of the first party by performing the steps of,(A) with respect to domain parameters of an elliptic curve for use in elliptic curve cryptography and, in particular, a generating point of the elliptic curve, transforming within the computer system the generating point into a first new generating point as a deterministic function of first data specified by the first party, wherein the deterministic function comprises a deterministic function of shared knowledge,(B) generating within the computer system the first public key as a deterministic function of a private key and the domain parameters, in which the first new generating point of said step (i)(A) is substituted for the generating point of the domain parameters, and(C) exporting the first public key of said step (i)(B) from the computer system, and(ii) providing a second public key of the first party by performing the steps of,(A) transforming within the computer system the generating point of the domain parameters of said step (i)(A) into a second new generating point as a deterministic function of second data specified by the first party,(B) generating within the computer system the second public key as a deterministic function of the same private key and the same domain parameters, in which the second new generating point of said step (ii)(A) is substituted for the generating point of the domain parameters, and(C) exporting the second public key of said step (ii)(B) from the computer system,(iii) wherein,(A) said generated first public key comprises, in conjunction with the private key, a first public-private key pair of the first party for use in elliptic curve cryptography, and(B) said generated second public key comprises, in conjunction with the private key, a second different public-private key pair of the first party for use in elliptic curve cryptography;

    (b) receiving from the first party both the first and second public keys generated using the software communicated to the first party in said step (a); and

    (c) recording in a database said received public keys of the first party in association with information pertaining to said communicated software of said step (a).

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×