Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
First Claim
Patent Images
1. A computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of:
- generating a private key, wherein generating the private key comprises;
receiving an input value, wherein the input value is a user-selected secret;
storing the user-selected secret in memory;
computing the private key by applying an embedding or randomizing function onto the user-selected secret; and
storing the private key in memory;
calculating a set of public keys using the private key, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair;
erasing the user-selected secret and the private key from memory; and
outputting the identifiers comprising the public keys.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of: calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair; and outputting the identifiers comprising the public keys.
161 Citations
11 Claims
-
1. A computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of:
-
generating a private key, wherein generating the private key comprises; receiving an input value, wherein the input value is a user-selected secret; storing the user-selected secret in memory; computing the private key by applying an embedding or randomizing function onto the user-selected secret; and storing the private key in memory; calculating a set of public keys using the private key, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair; erasing the user-selected secret and the private key from memory; and outputting the identifiers comprising the public keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system for generating a set of identifiers from a private key, the system comprising:
-
a processing unit being operable for; calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair; generating the private key, wherein generating the private key comprises; receiving an input value, wherein the input value is a user-selected secret; storing the user-selected secret in memory; computing the private key by applying an embedding or randomizing function onto the user-selected secret; storing the private key in memory; computing the set of public keys using the private key; and erasing the user-selected secret and the private key from memory; and an interface for outputting the identifiers comprising the public keys.
-
Specification