The patent's inventor is Sundaram, Ganapathy S. (
This patent was filed on
From the background information supplied by the inventors, news correspondents obtained the following quote: "Cryptography is a well-known technique for providing secure communication between two or more parties. Authenticated Key Agreement is a cryptographic protocol where two or more participants, authenticate each other and agree on a key for future communication. These protocols could be symmetric key or asymmetric public key protocols. Recall that symmetric key protocols require an out-of-band security mechanism to bootstrap a secret key, while public key protocols require certificates and large scale public key infrastructure (PKI). Clearly, public key methods are a bit more flexible, however, the requirement of certificates and a large scale public key infrastructure has proved to be challenging.
"Recently, Identity Based Encryption (IBE) protocols have been proposed as a viable alternative to public key methods by simplifying the PKI requirements and replacing them with a simple Key Generation Function (KGF) to generate private keys. However, one significant limitation of existing IBE methods is that the KGF can end up being a de-facto key escrow server with undesirable consequences. That is, since the KGF in the existing IBE protocol generates each private key used in the protocol, KGF can therefore decrypt all exchanges. This is an undesirable consequence since if KGF was compromised by an intruder, then exchanges between the two parties operating under the protocol would be compromised as well.
"Thus, a need exists for an improved identity based authenticated key agreement protocol."
Supplementing the background information on this patent, VerticalNews reporters also obtained the inventor's summary information for this patent: "Embodiments of the invention provide an improved identity based authenticated key agreement protocol.
"For example, in one embodiment, a method for performing an identity based authenticated key agreement protocol between a computer system of a first party (the first party) and a computer system of a second party (the second party) comprises the following steps. An encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party and encrypted using a public key of the second party in accordance with an identity based encryption operation. An encrypted random key component pair is received at the first party from the second party, the random key component pair having been encrypted at the second party using a public key of the first party in accordance with the identity based encryption operation, and the random key component pair having been formed from the first random key component and a second random key component computed at the second party. The second random key component, in encrypted form, is sent from the first party to the second party, the second random key component having been encrypted using the public key of the second party in accordance with the identity based encryption operation. A key for use in subsequent communications between the first party and the second party is computable at the first party based on the second random key component. The key may be computed at the second party based on the first random key component.
"Advantageously, embodiments of the invention provide an identity based authenticated key agreement protocol which does not suffer from the key escrow problem. Moreover, the protocol also provides perfect forward and backwards secrecy since computed key information is unrelated to any past or future authenticated key agreement sessions. Additionally, embodiments of the invention may be applied to various key agreement applications, by way of example only, end-to-end key agreement for applications over wired/wireless networks, and key agreement for networking protocols such as secure proxy based route optimization protocols.
"These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings."
For the URL and additional information on this patent, see: Sundaram, Ganapathy S.. Identity Based Authenticated Key Agreement Protocol. U.S. Patent Number 8510558, filed
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2013, NewsRx LLC
Most Popular Stories
- Twitter Names Woman to Board
- Aspen Contracting Adding 300 Jobs
- NSA Tracks 5 Billion Cellphone Records a Day
- Nelson Mandela Dies After Momentous Life
- U.S. Unemployment Rate Dips to 7 Percent
- Consumer Spending Rises, Incomes Fall
- Fast-Food Workers Want $15 an Hour
- Roybal-Allard Tours Gordon Brush Plant
- Ford Mustang Still Packs Power
- W.H. Corrects Itself on Unclegate