Patents by Inventor Jill Pipher
Jill Pipher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10924287Abstract: A method is set forth for signing and subsequently verifying a plurality of digital messages, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q, a relatively smaller integer p that is coprime with q, and a Gaussian function parameter; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a plurality of message digests by hashing each of the digital messages with the public key; for each message digest, producing a digital signature using the message digest, the private key, and a Gaussian noise polynomial related to the Gaussian function parameter; and performing a batch verification procedure utilizing the plurality of digital signatures and the publicType: GrantFiled: June 22, 2018Date of Patent: February 16, 2021Assignee: OnBoard Security, Inc.Inventors: Jeffrey Hoffstein, Jill Pipher, William J Whyte, Zhenfei Zhang
-
Patent number: 10277403Abstract: A method for signing and subsequently verifying a digital message, including the following steps: generating an irreducible monic polynomial f(x) of degree n in a ring Fq[x]; generating an irreducible monic polynomial F(y) of degree n in a ring Fq[y]; producing first and second finite fields as Fq[x]/(f(x)) and Fq[y]/(F(y)), respectively; producing a secret isomorphism from the first finite field to the second finite field; producing and publishing a public key that depends on F(y); producing a private key that depends on the secret isomorphism; producing a message digest by applying a hash function to the digital message and the public key; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key.Type: GrantFiled: February 24, 2017Date of Patent: April 30, 2019Assignee: Onboard Security, Inc.Inventors: Jeffrey Hoffstein, Jill Pipher, Joseph H Silverman, William J Whyte, Zhenfei Zhang
-
Publication number: 20190020486Abstract: A method is set forth for signing and subsequently verifying a plurality of digital messages, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q, a relatively smaller integer p that is coprime with q, and a Gaussian function parameter; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse off mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a plurality of message digests by hashing each of the digital messages with the public key; for each message digest, producing a digital signature using the message digest, the private key, and a Gaussian noise polynomial related to the Gaussian function parameter; and performing a batch verification procedure utilizing the plurality of digital signatures and the public kType: ApplicationFiled: June 22, 2018Publication date: January 17, 2019Inventors: Jeffrey Hoffstein, Jill Pipher, William J. Whyte, Zhenfei Zhang
-
Publication number: 20170250819Abstract: A method for signing and subsequently verifying a digital message, including the following steps: generating an irreducible monic polynomial f(x) of degree n in a ring Fq[x]; generating an irreducible monic polynomial F(y) of degree n in a ring Fq[y]; producing first and second finite fields as Fq[x]/(f(x)) and Fq[y]/(F(y)), respectively; producing a secret isomorphism from the first finite field to the second finite field; producing and publishing a public key that depends on F(y); producing a private key that depends on the secret isomorphism; producing a message digest by applying a hash function to the digital message and the public key; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key.Type: ApplicationFiled: February 24, 2017Publication date: August 31, 2017Inventors: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, William J. Whyte, Zhenfei Zhang
-
Patent number: 9722798Abstract: A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.Type: GrantFiled: January 5, 2015Date of Patent: August 1, 2017Assignee: Security Innovation Inc.Inventors: Jeffrey Hoffstein, Jill Pipher, John M Schanck, Joseph H Silverman, William J Whyte
-
Publication number: 20150229478Abstract: A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.Type: ApplicationFiled: January 5, 2015Publication date: August 13, 2015Inventors: Jeffrey Hoffstein, Jill Pipher, John M Schanck, Joseph H Silverman, William J Whyte
-
Publication number: 20020136401Abstract: Methods, systems and computer readable media for signing and verifying a digital message m are described. First, ideals p and q of a ring R are selected. Elements f and g of the ring R are generated, followed by generating an element F, which is an inverse of f, in the ring R. A public key h is produced, where h is equal to a product that can be calculated using g and F. Then, a private key that includes f is produced. A digital signature s is signed to the message m using the private key. The digital signature is verified by confirming one or more specified conditions using the message m and the public key h. A second user also can authenticate the identity of a first user. A challenge communication that includes selection of a challenge m in the ring R is generated by the second user. A response communication that includes computation of a response s in the ring R, where s is a function of m and f, is generated by the first user.Type: ApplicationFiled: March 20, 2001Publication date: September 26, 2002Inventors: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
-
Patent number: 6298137Abstract: A method of communicating information between users of a communications system includes the following steps: generating a ring R, ideals P and Q in R, a set of coset representatives CQ for the ring R modulo the ideal Q, and a set of coset representatives Cp for the ring R modulo the ideal P; generating at least one public key element h1, . . . , hk in the ring R as a function of at least two private key elements ƒ1, . . . ƒn in R and the ideal Q of the first user; and transmitting from a first user to a second user a description of the ring R, the ideal Q, the ideal P, and the elements h1, . . . , hk in R; generating an element e in R as a function of the ideals P and Q, the public key elements h1, . . . , hk, a private message element m in R, and at least one private random element ø1, . . .Type: GrantFiled: April 5, 2000Date of Patent: October 2, 2001Assignee: NTRU Cryptosystems, Inc.Inventors: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
-
Patent number: 6081597Abstract: The public key encryption system of the present invention has short and easily created encryption keys and wherein the encoding and decoding processes are performed extremely rapidly, and has low memory requirements. The encoding and decoding processes use both the addition and multiplication operations in a ring modulo with two different ideals. The cryptosystem of the present invention allows encryption keys to be chosen essentially at random from a large set of binary vectors, for which key lengths are comparable to the key lengths of the most widely used prior art cryptosystems. The present invention features an appropriate security level (.about.2.sup.80), with encoding and decoding processes ranging from approximately one to two orders of magnitude faster than the prior art, particularly the exponentiation cryptosystems.Type: GrantFiled: August 19, 1997Date of Patent: June 27, 2000Assignee: NTRU Cryptosystems, Inc.Inventors: Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman