发明名称 |
Generation of exfiltration-resilient cryptographic keys |
摘要 |
Improved techniques are provided for the generation of exfiltration-resilient cryptographic keys. A method is provided for generating exfiltration-resilient cryptographic keys for authentication and/or digital signing. A set of authentication information sk[i] is stored in a device associated with a user and a set of public keys pk[i] are provided to a verifier corresponding to the set of authentication information sk[i], where sk[i] is mapped to pk[i] using a hash function. The device obtains a challenge from the verifier comprising a sequence C of k indices. A response is provided to the verifier comprising elements of the set of authentication information sk[i] corresponding to the k indices. The set of authentication information sk optionally has a size that satisfies one or more leakage-resilient criteria. |
申请公布号 |
US8954728(B1) |
申请公布日期 |
2015.02.10 |
申请号 |
US201213730343 |
申请日期 |
2012.12.28 |
申请人 |
EMC Corporation |
发明人 |
Juels Ari;Triandopoulos Nikolaos |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
Ryan, Mason & Lewis, LLP |
代理人 |
Ryan, Mason & Lewis, LLP |
主权项 |
1. A method, comprising:
storing a set of authentication information sk[i] in a device associated with a user; providing a set of public keys pk[i] to a verifier corresponding to said set of authentication information sk[i], where sk[i] is mapped to pk[i] using a hash function; obtaining a challenge at said device from said verifier, wherein the challenge comprises a sequence C of k indices of elements of said set of authentication information sk[i]; and providing a response to said verifier comprising said elements of said set of authentication information sk[i] corresponding to said k indices. |
地址 |
Hopkinton MA US |