Cryptographic key split combiner
First Claim
1. A cryptographic key split combiner, comprising:
- a) a plurality of key split generators adapted to generate cryptographic key splits;
b) a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key; and
c) a digital signature generator;
d) wherein each of the key split generators is adapted to generate key splits from seed data; and
e) wherein the digital signature generator is adapted to generate a digital signature based on the cryptographic key.
0 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.
80 Citations
4 Claims
-
1. A cryptographic key split combiner, comprising:
-
a) a plurality of key split generators adapted to generate cryptographic key splits; b) a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key; and c) a digital signature generator; d) wherein each of the key split generators is adapted to generate key splits from seed data; and e) wherein the digital signature generator is adapted to generate a digital signature based on the cryptographic key. - View Dependent Claims (2)
-
-
3. A process for forming cryptographic keys, comprising:
-
a) generating a plurality of cryptographic key splits from seed data; b) randomizing the cryptographic key splits to produce a cryptographic key; and c) generating a digital signature based on the cryptographic key. - View Dependent Claims (4)
-
Specification