scispace - formally typeset
Patent

Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem

Reads0
Chats0
TLDR
In this article, the authors proposed a blocking set cryptosystem, where the cipher on the complement of the blocking set is not required to be transmitted to the receiver in order to decipher the cipher.
Abstract
The encryption key based on a blocking set cryptosystem includes knowledge of the blocking set, and ciphers (usually independent) on the blocking set and its complement. In order to decipher, a legitimate receiver needs to know only the blocking set and the cipher used on it. Thus it is not necessary for the sender to transmit to anyone the cipher on the complement of the blocking set. The fact that part of the encryption key need not be transmitted is the fundamental difference between the proposed cryptosystem and the so-called private key system, where both the sender and receiver know, but keep secret, the encryption and decryption keys. Particularly useful applications of this scheme are two situations where a central person, institution or computer send out confidential information to several parties, but where none of the parties has the authority to transmit information to the group. This might apply to the main branch of a company, or to a certification authority in a cryptographic protocol. It can also be used to establish an access hierarchy in a computer or security network.

read more

Citations
More filters
Patent

Information record infrastructure, system and method

TL;DR: In this paper, a business model for the creation, maintenance, transmission, and use of digital medical records is presented, which allows financial burdens to be reallocated optimally and equitably, resulting in decreased overall societal cost.
Patent

System and method for secure three-party communications

TL;DR: In this paper, the authors propose a system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first parties and the second parties.
Patent

Adaptive pattern recognition based control system and method

TL;DR: An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context, is presented for confirmation by the user, and the predictive mechanism is updated based on this feedback as mentioned in this paper.
Patent

Multifactorial optimization system and method

TL;DR: In this paper, the authors propose a method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent, providing a synthetic economic value to a first set of agents at the a high level of the hierarchy, allocating portions of the synthetic economy value by the first sets of agents to a second subset of agents, at respectively different hierarchal ranks than the first set, and conducting an auction amongst agents using the synthetic economic values as the currency.
Patent

System and method for providing a payment to a non-winning auction participant

TL;DR: In this article, a system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof.
References
More filters
Book ChapterDOI

A decomposition theorem for partially ordered sets

TL;DR: In this article, a partially ordered set P is considered and two elements a and b of P are camparable if either a ≧ b or b ≧ a. If b and a are non-comparable, then they are independent.
Patent

Method and system for secure online transaction processing

TL;DR: In this paper, a secure online transaction between a vendor computer and a user computer is described, in which the user computer (12) transmits a transaction request message to the vendor computer (14) via the computer network (16), the financial transaction request comprising user identification data unique to the user and data indicative of the requested transaction; in response to receiving the transaction verification request, the trust server computer (18) authenticating the user computers by using the user identification and communicating with the user Computer (12), for verification with the users identification data.
Journal ArticleDOI

An updated table of minimum-distance bounds for binary linear codes

TL;DR: An updated table of upper and lower bounds on the maximum minimum-distance for binary linear error-correcting codes up to length 127 is presented, incorporating numerous improvements that have appeared since then.
Patent

Electronic document processing system and method of forming digital signature

TL;DR: In this article, when a user changes the contents of the received electronic document, a new digital signature is produced by enciphering signature data by using a secret key of the user, the signature data including a hash total of the document of a new version, personal information of a user (signatory), and version management information necessary to restore an electronic document from the electronic document of the new version.