Identity-based-encryption messaging system
First Claim
1. A method for using identity-based encryption to support encryption and decryption using computing equipment in a system, wherein the system has a plurality of identity-based-encryption private key generators each of which generates associated identity-based-encryption public parameter information and associated identity-based-encryption private keys, the method comprising:
- with the computing equipment, encrypting digital information using the identity-based-encryption public parameter information that is associated with a given one of the plurality of the identity-based-encryption private key generators; and
with the computing equipment, appending identification information to the encrypted digital information, wherein the identification information specifies which one of the plurality of identity-based-encryption private key generators is the given one of the plurality of identity-based-encryption private key generators that generated the identity-based-encryption public parameter information that was used to encrypt the digital information.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that uses identity-based encryption to support secure communications between senders and recipients over a communications network. Private key generators are used to provide public parameter information. Senders encrypt messages for recipients using public keys based on recipient identities and using the public parameter information as inputs to an identity-based encryption algorithm. Recipients use private keys to decrypt the messages. There may be multiple private key generators in the system and a given recipient may have multiple private keys. Senders can include private key identifying information in the messages they send to recipients. The private key identifying information may be used by the recipients to determine which of their private keys to use in decrypting a message. Recipients may obtain the correct private key to use to decrypt a message from a local database of private keys or from an appropriate private key server.
-
Citations
11 Claims
-
1. A method for using identity-based encryption to support encryption and decryption using computing equipment in a system, wherein the system has a plurality of identity-based-encryption private key generators each of which generates associated identity-based-encryption public parameter information and associated identity-based-encryption private keys, the method comprising:
-
with the computing equipment, encrypting digital information using the identity-based-encryption public parameter information that is associated with a given one of the plurality of the identity-based-encryption private key generators; and with the computing equipment, appending identification information to the encrypted digital information, wherein the identification information specifies which one of the plurality of identity-based-encryption private key generators is the given one of the plurality of identity-based-encryption private key generators that generated the identity-based-encryption public parameter information that was used to encrypt the digital information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for using identity-based encryption to support encryption and decryption using computing equipment in a system, wherein the system has a plurality of identity-based-encryption private key generators each of which generates associated identity-based-encryption public parameter information and associated identity-based-encryption private keys, the method comprising:
-
with the computing equipment, encrypting digital information using the identity-based-encryption public parameter information that is associated with a given one of the plurality of the identity-based-encryption private key generators; and with the computing equipment, creating a data item that includes the encrypted digital information and that includes identification information that specifies which one of the plurality of identity-based-encryption private key generators is the given one of the plurality of identity-based-encryption private key generators that generated the identity-based-encryption public parameter information that was used to encrypt the digital information. - View Dependent Claims (10, 11)
-
Specification