Efficient certified email protocol
First Claim
1. One or more computer-readable memory storing computer-executable instructions that, when executed, cause one or more processors to implement protocols for a two-party transaction, the protocols comprising:
- a setup sub-protocol that comprises using an authorized Diffie-Hellman key agreement to share an encryption key between a sending party and a trusted third party that resolves transaction disputes between the sending party and a receiving party;
an exchange sub-protocol that comprises sending a message description, a hash of the encryption key, a certificate, and a message encrypted by the encryption key from the sending party to the receiving party, sending a receipt from the receiving party to the sending party during the two-party transaction, and sending the encryption key from the sending party to the receiving party in response to receiving the receipt at the sending party; and
a dispute sub-protocol that comprises a dispute resolution mechanism to resolving disputes between the sending party and the receiving party by the trusted third party at least due to a discrepancy between the hash and an additional hash of the encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary optimistic protocol for a two-party transaction includes a setup sub-protocol that includes an authorized Diffie-Hellman key agreement, an exchange sub-protocol that includes sending a certificate from a sending party to a receiving party and sending a receipt from the receiving party to the sending party and a dispute sub-protocol that includes a dispute resolution mechanism for resolving disputes between the sending party and the receiving party due to sending of an invalid certificate, due to sending an invalid receipt, or due to abortion of the exchange sub-protocol. Other exemplary methods, systems, etc., are also disclosed.
20 Citations
20 Claims
-
1. One or more computer-readable memory storing computer-executable instructions that, when executed, cause one or more processors to implement protocols for a two-party transaction, the protocols comprising:
-
a setup sub-protocol that comprises using an authorized Diffie-Hellman key agreement to share an encryption key between a sending party and a trusted third party that resolves transaction disputes between the sending party and a receiving party; an exchange sub-protocol that comprises sending a message description, a hash of the encryption key, a certificate, and a message encrypted by the encryption key from the sending party to the receiving party, sending a receipt from the receiving party to the sending party during the two-party transaction, and sending the encryption key from the sending party to the receiving party in response to receiving the receipt at the sending party; and a dispute sub-protocol that comprises a dispute resolution mechanism to resolving disputes between the sending party and the receiving party by the trusted third party at least due to a discrepancy between the hash and an additional hash of the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method, comprising:
-
sharing an encryption key that is known to the sending party with a trusted third party using an authorized Diffie-Hellman key agreement, the encryption key for resolving transaction disputes between the sending party and a receiving party; sending a message description, a hash of the encryption key, a certificate, and an encrypted message that is encrypted by the encryption key to the receiving party; receiving a receipt from the receiving party and in response to the receiving, sending decryption information to the receiving party, wherein the decryption information provides the encryption key for decrypting the encrypted message; and receiving an indication that the receiving party sent a dispute resolution request to the trusted third party, the dispute resolution request being sent in response to detecting a discrepancy between the hash and an additional hash of the encryption key performed by the receiving party. - View Dependent Claims (17)
-
-
18. A method, implemented at least in part by a computing device, the method comprising:
under control of a computing device comprising one or more processors, receiving a message description, a hash of an encryption key, an encrypted message, and a certificate from a sending party at a receiving party, the encrypted message being encrypted based at least on the encryption key, the encryption key being shared between the sending party and a trusted third party using an authorized Diffie-Hellman key agreement prior to a transaction dispute between the sending party and the receiving party; sending a receipt from the receiving party to the sending party during a two-party transaction, and receiving the encryption key from the sending party in exchange for the receipt; and sending a dispute resolution request from the receiving party to the trusted third party in response to detecting a discrepancy between the hash and an additional hash of the encryption key. - View Dependent Claims (19, 20)
Specification