Method for the application of implicit signature schemes
First Claim
1. A method of a certifying a correspondent in a data communication system by a certifying authority, said certifying authority including a cryptographic unit, said method comprising:
- said certifying authority generating a random number cA using said cryptographic unit;
said certifying authority generating implicit certificate components based on said random number cA using said cryptographic unit, said implicit certificate components having a first component γ
A and a second component sA;
said certifying authority providing said implicit certificate components for use in said data communication system; and
said certifying authority providing a public key of said certifying authority for use in derivation of a public key of said correspondent from said first component γ
A;
wherein said certifying authority recertifies said correspondent by providing implicit certificate components using a changed value for said random number.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of certifying a correspondent in a data communication system by a certifying authority. The certifying authority includes a cryptographic unit. The method includes generating a random number and implicit certificate components based on the random number using the cryptographic unit. The implicit certificate components have a first component and a second component. The method also includes providing the implicit certificate components for use in the data communication system and providing a public key of the certifying authority for use in derivation of a public key of the correspondent from the first component. The certifying authority recertifies the correspondent by providing implicit certificate components using a changed value for the random number.
39 Citations
20 Claims
-
1. A method of a certifying a correspondent in a data communication system by a certifying authority, said certifying authority including a cryptographic unit, said method comprising:
-
said certifying authority generating a random number cA using said cryptographic unit; said certifying authority generating implicit certificate components based on said random number cA using said cryptographic unit, said implicit certificate components having a first component γ
A and a second component sA;said certifying authority providing said implicit certificate components for use in said data communication system; and said certifying authority providing a public key of said certifying authority for use in derivation of a public key of said correspondent from said first component γ
A;
wherein said certifying authority recertifies said correspondent by providing implicit certificate components using a changed value for said random number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium having stored thereon computer-executable instructions for certifying a correspondent in a data communication system by a certifying authority, said computer-executable instructions comprising instructions for:
-
generating a random number cA; generating implicit certificate components based on said random number cA, said implicit certificate components having a first component γ
A and a second component sA;providing said implicit certificate components for use in said data communication system; and providing a public key of said certifying authority for use in derivation of a public key of said correspondent from said first component γ
A;wherein said computer-executable instructions further comprise instructions for recertifying said correspondent by providing implicit certificate components using a changed value for said random number. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
said second component sA=h(γ
A∥
IDA∥
cP)c+CA (mod n), wherein c is a private key of said certifying authority, n is a large prime number, IDA is an identifier of said correspondent and includes at least one distinguishing feature of said correspondent; and
h indicates a secure hash function.
-
-
13. The non-transitory computer-readable medium of claim 10, wherein
said first component γ -
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
said second component sA=h(γ
A∥
IDA∥
cP)cA+c (mod n), wherein c is a private key of said certifying authority, n is a large prime number, IDA is an identifier of said correspondent and includes at least one distinguishing feature of said correspondent; and
h indicates a secure hash function.
-
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
-
14. The non-transitory computer-readable medium of claim 10, wherein
said first component γ -
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
said second component sA=cA±
ch(IDA∥
γ
A) (mod n), wherein c is a private key of said certifying authority, n is a large prime number, IDA is an identifier of said correspondent and includes at least one distinguishing feature of said correspondent; and
h indicates a secure hash function.
-
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
-
15. The non-transitory computer-readable medium of claim 10, wherein
said first component γ -
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
said second component sA=cAh(IDA∥
γ
A)±
c (mod n), wherein c is a private key of said certifying authority, n is a large prime number, IDA is an identifier of said correspondent and includes at least one distinguishing feature of said correspondent; and
h indicates a secure hash function.
-
A=aP+cAP, wherein aP is provided to said certifying authority by said correspondent and P is a point on a curve; and
-
16. The non-transitory computer-readable medium of claim 10, said computer-executable instructions further comprising instructions for recertifying one or more correspondents whose certificates have not been revoked.
-
17. The non-transitory computer-readable medium of claim 10, wherein said recertifying utilizes information previously received from said correspondent.
-
18. The non-transitory computer-readable medium of claim 10, wherein said recertifying occurs with a certification period.
-
19. A certifying authority for certifying a correspondent in a data communication system, said certifying authority including a cryptographic unit for:
-
generating a random number cA; generating implicit certificate components based on said random number cA, said implicit certificate components having a first component γ
A and a second component sA;providing said implicit certificate components for use in said data communication system; providing a public key of said certifying authority for use in derivation of a public key of said correspondent from said first component γ
A;wherein said certifying authority further includes said cryptographic unit for recertifying said correspondent by providing implicit certificate components using a changed value for said random number. - View Dependent Claims (20)
-
Specification