Systems and methods for identity-based encryption and related cryptographic techniques
First Claim
1. A method, comprising:
- with computing equipment, encrypting data using a public key that is formed using a time element, wherein encrypting the data comprises encrypting the data using cryptographic system parameters and wherein encrypting the data comprises encrypting the data using a bilinear map.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver'"'"'s e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s. After obtaining the private decryption key from the key generator [120], the receiver [110] uses it together with the element rP and the bilinear map to compute the secret message key gIDr, which is then used to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
-
Citations
20 Claims
-
1. A method, comprising:
with computing equipment, encrypting data using a public key that is formed using a time element, wherein encrypting the data comprises encrypting the data using cryptographic system parameters and wherein encrypting the data comprises encrypting the data using a bilinear map. - View Dependent Claims (2, 3, 4, 5)
-
6. A method, comprising:
with computing equipment, encrypting data using a public key that is formed using a credential associated with a user, wherein encrypting the data comprises encrypting the data using cryptographic system parameters and wherein encrypting the data comprises encrypting the data using a bilinear map. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
17. A method comprising:
with computing equipment, performing cryptographic operations using a public key that is based on a credential associated with a party, wherein performing the cryptographic operations comprises using a bilinear map. - View Dependent Claims (18, 19, 20)
Specification