Generating digital signatures
First Claim
Patent Images
1. A method for generating a digital signature, the method comprising:
- accessing a symmetric key, wherein the symmetric key is based on an ephemeral public key, and the ephemeral public key is associated with an ephemeral private key;
generating, by a hardware processor on a computing device, a ciphertext based on the symmetric key and a first portion of a message;
obtaining an input value independent of a hash function and based on the ciphertext, wherein obtaining the input value comprises;
producing a concatenation of the ciphertext and a second portion of the message; and
applying at least one of a truncation function or a reduction function on the concatenation;
generating, by the hardware processor on the computing device, a digital signature value from the ephemeral private key, the input value, and a long term private key; and
transmitting the digital signature value, the ciphertext, and the second portion of the message from the computing device to another computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for generating a digital signature are disclosed. In some aspects, a symmetric key is accessed. The symmetric key is based on an ephemeral public key. The ephemeral public key is associated with an ephemeral private key. A ciphertext is generated based on the symmetric key and a message. An input value is obtained based on the ciphertext independent of a hash function. A digital signature is generated from the ephemeral private key, the input value, and a long term private key.
17 Citations
15 Claims
-
1. A method for generating a digital signature, the method comprising:
-
accessing a symmetric key, wherein the symmetric key is based on an ephemeral public key, and the ephemeral public key is associated with an ephemeral private key; generating, by a hardware processor on a computing device, a ciphertext based on the symmetric key and a first portion of a message; obtaining an input value independent of a hash function and based on the ciphertext, wherein obtaining the input value comprises; producing a concatenation of the ciphertext and a second portion of the message; and applying at least one of a truncation function or a reduction function on the concatenation; generating, by the hardware processor on the computing device, a digital signature value from the ephemeral private key, the input value, and a long term private key; and transmitting the digital signature value, the ciphertext, and the second portion of the message from the computing device to another computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing device comprising data processing apparatus operable to:
-
access a symmetric key, wherein the symmetric key is based on an ephemeral public key, and the ephemeral public key is associated with an ephemeral private key; generate a ciphertext based on the symmetric key and a first portion of a message; obtain an input value independent of a hash function and based on the ciphertext by; producing a concatenation of the ciphertext and a second portion of the message; and applying at least one of a truncation function or a reduction function on the concatenation; generate a digital signature value from the ephemeral private key, the input value, and a long term private key; and transmit the digital signature value, the ciphertext, and the second portion of the message from the computing device to another computing device. - View Dependent Claims (8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations for generating a digital signature, the operations comprising:
-
accessing a symmetric key, wherein the symmetric key is based on an ephemeral public key, and the ephemeral public key is associated with an ephemeral private key; generating a ciphertext based on the symmetric key and a first portion of a message; obtaining an input value independent of a hash function and based on the ciphertext, wherein obtaining the input value comprises; producing a concatenation of the ciphertext and a second portion of the message; and applying at least one of a truncation function or a reduction function on the concatenation; generating, at a computing device, a digital signature value from the ephemeral private key, the input value, and a long term private key; and transmitting the digital signature value, the ciphertext, and the second portion of the message from the computing device to another computing device. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification