Small public-key based digital signatures for authentication
First Claim
1. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
- generating a pseudorandom string value from an input value;
generating a first public key value based on the modulus N and the pseudorandom string value;
generating a first private key value corresponding to the first public key value;
receiving a second public key value;
generating a shared secret value based on the modulus N, the first private key value and the second public key value;
calculating an authentication signature value using the shared secret value; and
transmitting the authentication signature value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier'"'"'s public key value; generating a shared secret value based on the modulus N, the private key value and the verifier'"'"'s public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
22 Citations
20 Claims
-
1. A method for use in authentication between two entities having agreed on the use of a common modulus N, the method comprising:
-
generating a pseudorandom string value from an input value; generating a first public key value based on the modulus N and the pseudorandom string value; generating a first private key value corresponding to the first public key value; receiving a second public key value; generating a shared secret value based on the modulus N, the first private key value and the second public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
means for generating a pseudorandom string value from an input value; means for generating a first public key value based on the modulus N and the pseudorandom string value; means for generating a first private key value corresponding to the first public key value; means for receiving a second public key value; means for generating a shared secret value based on the modulus N, the first private key value and the second public key value; means for calculating an authentication signature value using the shared secret value; and means for transmitting the authentication signature value. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. Apparatus for use in authentication between two entities having agreed on the use of a common modulus N, the apparatus comprising:
-
a storage unit storing instructions; and a processor communicatively coupled to the storage unit and configured to execute the instructions to implement; a pseudo-random generator configured to generate a pseudorandom string value from an input value; a key generating unit configured to generate a first public key value based on the modulus N and the pseudorandom string value, and to generate a first private key value corresponding to the first public key value; a receiver unit configured to receive a second public key value; a secret value generating unit configured to generate a shared secret value based on the modulus N, the first private key value and the second public key value; a message authentication code unit configured to calculate an authentication signature value using the shared secret value; and a transmitter unit configured to transmit the authentication signature value. - View Dependent Claims (20)
-
Specification