Systems and methods for efficient authentication
First Claim
Patent Images
1. A communication system configured to operate in an ad hoc network, comprising:
- a transmission device configured to receive a message; and
a verifying module configured to hierarchically verify a predetermined portion of the message, the verifying module being configured to;
break the message into n k-bit words b1, b2, . . . , bn;
break a hierarchical signature into components σ
1, σ
2, . . . , σ
n, γ
1, γ
2, . . . , γ
n;
determine a number of words p;
set a public key V to Vp=[Z1, Z2, . . . , Zp];
for each i in a set iε
{1, p};
generate Xi′
=H2k−
bi(σ
i) and Yi′
=Hbi(γ
i); and
calculate Zi′
=H(Xi′
∥
Yi′
);
set a public key check Vp′
to Vp′
=[Z1′
,Z2′
, . . . ,Zp′
]; and
compare the public key Vp to the public key check Vp′
.
4 Assignments
0 Petitions
Accused Products
Abstract
A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.
37 Citations
18 Claims
-
1. A communication system configured to operate in an ad hoc network, comprising:
-
a transmission device configured to receive a message; and a verifying module configured to hierarchically verify a predetermined portion of the message, the verifying module being configured to; break the message into n k-bit words b1, b2, . . . , bn; break a hierarchical signature into components σ
1, σ
2, . . . , σ
n, γ
1, γ
2, . . . , γ
n;determine a number of words p; set a public key V to Vp=[Z1, Z2, . . . , Zp]; for each i in a set iε
{1, p};generate Xi′
=H2k −
bi (σ
i) and Yi′
=Hbi (γ
i); andcalculate Zi′
=H(Xi′
∥
Yi′
);set a public key check Vp′
to Vp′
=[Z1′
,Z2′
, . . . ,Zp′
]; andcompare the public key Vp to the public key check Vp′
. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A communication system configured to operate in an ad hoc network, comprising:
-
a transmission device configured to transmit a message; and a signing module configured to generate a hierarchical signature using the message, the signing module being configured to generate the hierarchical signature by; dividing the message into n words b1, b2, . . . , bn; generating 2n random variables s1, s2, . . . , sn and c1, c2, . . . , cn; setting a private key S as the 2n random variables S={s1, s2, . . . , sn, c1, c2, . . . , cn}; for each i in a set iε
{1,n};generating Xi=H2 k (si) and Yi=H2k (ci); andcalculating Zi=H(Xi∥
Yi);setting a public key V as V=[Z1, Z2, . . . , Zn]; for each i in a set iε
{1,n};generating σ
i=Hbi (si) and γ
i=H2k −
bi (ci); andsetting the hierarchical signature σ
as σ
=σ
1∥
. . . ∥
σ
n∥
γ
1∥
. . . ∥
γ
n. - View Dependent Claims (16)
-
-
17. A non-transitory computer readable medium on which are stored executable authentication instructions for:
signing a message for use by a communication system, comprising; dividing the message into n words b1, b2, . . . , bn; generating 2n random variables s1, s2, . . . , sn and c1, c2, . . . , cn; setting a private key S as the 2n random variables S={s1, s2, . . . , sn, c1, c2, . . . , cn}; for each i in a set iε
{1,n};generating Xi=H2 k (si) and Yi=H2k (ci); andcalculating Zi=H(Xi∥
Yi);setting a public key V as V=[Z1, Z2, . . . , Zn]; for each i in a set iε
{1,n};generating σ
i=Hbi (si) and Yi=H2k −
bi (ci); andsetting a hierarchical signature σ
as σ
=σ
1∥
. . . ∥
σ
n∥
γ
1∥
. . . ∥
γ
n.- View Dependent Claims (18)
Specification