Identity-based-encryption system with hidden public key attributes
First Claim
1. A method for using multi-layer identity-based encryption (IBE) to support encryption and decryption using computing equipment in a system, comprising:
- encrypting digital information with the computing equipment using at least two layers of IBE encryption by using an inner layer of encryption having an associated inner-layer IBE public key to encrypt the digital information and by using an outer layer of encryption having an associated outer-layer IBE public key to encrypt the inner-layer IBE public key; and
decrypting the encrypted digital information using an outer-layer IBE private key corresponding to the outer-layer IBE public key and using an inner-layer IBE private key corresponding to the inner layer IBE public key.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient over a communications network. IBE public key information may be used to encrypt messages and corresponding IBE private key information may be used to decrypt messages. Information on which IBE public key information was used in encrypting a given message may be provided to the message recipient with the message. Multiple IBE public keys may be used to encrypt a single message. A less sensitive IBE public key may be used to encrypt a more sensitive public key, so that the more sensitive public key can remain hidden as it is sent to the recipient.
-
Citations
20 Claims
-
1. A method for using multi-layer identity-based encryption (IBE) to support encryption and decryption using computing equipment in a system, comprising:
-
encrypting digital information with the computing equipment using at least two layers of IBE encryption by using an inner layer of encryption having an associated inner-layer IBE public key to encrypt the digital information and by using an outer layer of encryption having an associated outer-layer IBE public key to encrypt the inner-layer IBE public key; and decrypting the encrypted digital information using an outer-layer IBE private key corresponding to the outer-layer IBE public key and using an inner-layer IBE private key corresponding to the inner layer IBE public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification