×

Method and system for generating implicit certificates and applications to identity-based encryption (IBE)

  • US 9,071,445 B2
  • Filed: 05/03/2013
  • Issued: 06/30/2015
  • Est. Priority Date: 07/17/2007
  • Status: Active Grant
First Claim
Patent Images

1. In a communication system comprising at least a certification authority computer of a certification authority, a sender computer of a sender and a recipient computer of a recipient, the certification authority computer, the sender computer and the recipient computer communicating with each other over a communication network, a computer-implemented method of transmitting messages encrypted with identity-based public keys derived from information provided by the certification authority, said certification authority having a pair of public and private keys, said method comprising:

  • the recipient computer providing a recipient'"'"'s registration request to the certification authority computer over the communication network, said registration request correlating to a first secret value selected by the recipient computer;

    upon receiving a request from the sender computer, said request from the sender computer including an identity information of the recipient selected by the sender, the certification authority computer generating a public key reconstruction data from said registration request, said identity information selected by the sender, a second secret value selected by the certification authority computer and a certificate information selected by the certification authority computer;

    the certification authority computer transmitting an implicit certificate to the sender computer over the communication network, said implicit certificate including said public key reconstruction data and said certificate information;

    wherein said implicit certificate, said certificate information and the certification authority'"'"'s public key is configured for subsequent use by the sender computer for allowing the sender computer in reconstructing a public key of the recipient; and

    ,wherein said public key of the recipient is configured for subsequent use by the sender computer for allowing the sender computer to encrypt a message with said public key of the recipient and a private key of the sender for transmission of the message to the recipient computer over the communication network.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×