Patents by Inventor Olivier Sanders
Olivier Sanders has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12192354Abstract: A cryptographic method including: generating by a first device having a datum x an RSA module N; computing by the first device a number C=gbaxh1, g being an element of sub-group G of order bd, h1 being an element of sub-group H of order f, and a, b, d, f being integers, b and f being mutually prime, and x and y being less than d/a; sending C to a second device having datum y; computing by the second device D=Cu·bd?ay(gh3)vh2, u and v being random numbers and h2 and h3 being elements of H, and a first fingerprint (gh3)v; sending to the first device, D and the first fingerprint; computing by the first device (Df)f?, f?=1/f; obtaining based on (Df)f? a second fingerprint; and determining whether x is greater than or equal to y or x is less than y by comparing the first and the second fingerprints.Type: GrantFiled: September 20, 2019Date of Patent: January 7, 2025Assignee: ORANGEInventors: Florian Bourse, Olivier Sanders, Jacques Traore
-
Publication number: 20240396739Abstract: Method and device for authentication of non-revocation. A revocation list includes at least one pair extracted from a signature generated by a revoked entity, where hi is an element of a mathematical group and ki=hixi, where xi is a secret of the revoked entity. A first entity sends, to a second entity, to authenticate itself therewith: a signature generated by the first entity for this authentication; a character string; an element of the group for each pair in the revocation list; and a zero-knowledge proof that the first entity used a secret of this first entity and the character string to obtain the group element for each pair. The second entity rejects the first entity if the zero-knowledge proof is not valid or if, for at least one the pair, the group element is such that Ci=hiA, where A is a known value.Type: ApplicationFiled: September 9, 2022Publication date: November 28, 2024Inventor: Olivier Sanders
-
Publication number: 20230198778Abstract: A method for deriving a partial signature for a subset of a set of messages. The method includes: receiving the set of messages and a signature of the set, which includes signature elements of the set; generating anonymized elements of the signature; generating a first verification element from messages other than those of the subset; generating a second verification element to prove the first verification element is well formed; and sending, to a verification entity, a partial signature specific to the subset. The partial signature includes a constant number of elements having at least the elements of the signature of the set of anonymized messages, the first verification element and the second verification element. The partial signature is verifiable with only the messages of the subset of messages. The second verification element is a function of derived values calculated from at least the other elements of the partial signature.Type: ApplicationFiled: May 31, 2021Publication date: June 22, 2023Inventor: Olivier Sanders
-
Publication number: 20230040203Abstract: A method for deriving a partial signature for a subset of a set of messages. The method is implemented by a partial signature derivation entity and includes: receiving the set of messages and a signature of the set of messages, the signature including signature elements of the set of messages; deriving a first verification element calculated from the messages of the set other than those of the subset; deriving a second verification element to prove that the first verification element is formed correctly; and sending to a verification entity a partial signature specific to the subset, the partial signature including a constant number of elements having at least the elements of the signature of the set of messages, the first verification element and the second verification element, the partial signature being verifiable with only messages of the subset.Type: ApplicationFiled: October 6, 2020Publication date: February 9, 2023Inventor: Olivier Sanders
-
Publication number: 20220038277Abstract: A cryptographic method including: generating by a first device having a datum x an RSA module N; computing by the first device a number C=gbaxh1, g being an element of sub-group G of order bd, h1 being an element of sub-group H of order f, and a, b, d, f being integers, b and f being mutually prime, and x and y being less than d/a; sending C to a second device having datum y; computing by the second device D=Cu·bd?ay(gh3)vh2, u and v being random numbers and h2 and h3 being elements of H, and a first fingerprint (gh3)v; sending to the first device, D and the first fingerprint; computing by the first device (Df)f?, f?=1/f; obtaining based on (Df)f? a second fingerprint; and determining whether x is greater than or equal to y or x is less than y by comparing the first and the second fingerprints.Type: ApplicationFiled: September 20, 2019Publication date: February 3, 2022Inventors: Florian Bourse, Olivier Sanders, Jacques Traore
-
Patent number: 11233646Abstract: A method for searchable encryption of a system defining a secret key and a public is provided. A data stream cipher can include n elementary data (b1, b2, . . . , bn). The method can include generation of a variate for all elementary data bj, for values of j from 1 to n, generation of an element function of the public key (gx(bj),zj) and the variate, the element being associated with a random element of a group of a bilinear environment, the element associated with the random element of the group forming first encryption data (Cj,1). The method can also include generation of a shift factor (ga.zj?1) function of the variate and the public key, and associated with the random element of the group, the shift factor representing a position of the monomial in the encrypted stream, the shift factor associated with the random element of the group forming second encryption data. The data stream cipher can include the first and second encryption data for all values of j from 1 to n.Type: GrantFiled: November 15, 2017Date of Patent: January 25, 2022Assignee: ORANGEInventor: Olivier Sanders
-
Patent number: 11196571Abstract: A cryptographic method for signing a message m by a user device on behalf of a group managed by a group manager, which has a secret key generated from two variates x and y, the group having a public key formed from a plurality of elements comprising an element g and an element gz pertaining to a cyclic group of order p, p being a whole prime number and z a variate, and an element h, an element hx, an element h1/z and an element hy/z pertaining to a cyclic group of order p. The method includes: receiving a certificate from the group manager, including elements S1=gr, S2=gr(x+y.u) and S3=gz.r where r is a variate selected by the group manager for the user device; and generating a group signature for the message m, based on the certificate, a variate t generated by the user device, and the secret u.Type: GrantFiled: December 18, 2018Date of Patent: December 7, 2021Assignee: ORANGEInventor: Olivier Sanders
-
Publication number: 20210006414Abstract: A cryptographic method for signing a message m by a user device on behalf of a group managed by a group manager, which has a secret key generated from two variates x and y, the group having a public key formed from a plurality of elements comprising an element g and an element gz pertaining to a cyclic group of order p, p being a whole prime number and z a variate, and an element h, an element hx, an element h1/z and an element hy/z pertaining to a cyclic group of order p. The method includes: receiving a certificate from the group manager, including elements S1=gr, S2=gr(x+y.u) and S3=gz.r where r is a variate selected by the group manager for the user device; and generating a group signature for the message m, based on the certificate, a variate t generated by the user device, and the secret u.Type: ApplicationFiled: December 18, 2018Publication date: January 7, 2021Inventor: Olivier Sanders
-
Publication number: 20190394038Abstract: A method for searchable encryption of a system defining a secret key and a public is provided. A data stream cipher can include n elementary data (b1, b2, . . . , bn). The method can include generation of a variate for all elementary data bj, for values of j from 1 to n, generation of an element function of the public key (gx(bj).zj) and the variate, the element being associated with a random element of a group of a bilinear environment, the element associated with the random element of the group forming first encryption data (Cj,1). The method can also include generation of a shift factor (ga.zj?1) function of the variate and the public key, and associated with the random element of the group, the shift factor representing a position of the monomial in the encrypted stream, the shift factor associated with the random element of the group forming second encryption data. The data stream cipher can include the first and second encryption data for all values of j from 1 to n.Type: ApplicationFiled: November 15, 2017Publication date: December 26, 2019Inventor: Olivier Sanders
-
Patent number: 10122530Abstract: One embodiment relates to a method for enabling an entity to delegate calculation of a bilinear pairing value e(A,B) between two values A and B to a calculation server. The entity may select public elements P1 and P2 and secret elements S1 and S2, two of the elements from among P1, P2, S1, and S2 being selected to be equal to A and B, generate elements R1=vS1, R2=uS2, T1=uP1+S1, T2=vP2=S2, where u and v are random numbers, and transmit R1, R2, T1, and T2 to the calculation server. The server may calculate (a1)y=e(T1,T2)[e(R1,P2)e(P1,R2)]?1, and (a2)z=e(D1,D2), y and z designating two integers equal to 1 or to an integer c, D1 and D2 designating two public elements from among A and B or from among R1 and R2 and transmit a1 and a2 to the entity. The entity may obtain the value e(A,B) from a1 or a2.Type: GrantFiled: June 10, 2014Date of Patent: November 6, 2018Assignee: ORANGEInventors: Sébastien Canard, Julien Devigne, Olivier Sanders
-
Publication number: 20160142206Abstract: One embodiment relates to a method for enabling an entity to delegate calculation of a bilinear pairing value e(A,B) between two values A and B to a calculation server. The entity may select public elements P1 and P2 and secret elements S1 and S2, two of the elements from among P1, P2, S1, and S2 being selected to be equal to A and B, generate elements R1=vS1, R2=uS2, T1=uP1+S1, T2=vP2=S2, where u and v are random numbers, and transmit R1, R2, T1, and T2 to the calculation server. The server may calculate (a1)y=e(T1,T2)[e(R1,P2)e(P1,R2)]?1, and (a2)z=e(D1,D2), y and z designating two integers equal to 1 or to an integer c, D1 and D2 designating two public elements from among A and B or from among R1 and R2 and transmit a1 and a2 to the entity. The entity may obtain the value e(A,B) from a1 or a2.Type: ApplicationFiled: June 10, 2014Publication date: May 19, 2016Inventors: Sébastien Canard, Julien Devigne, Olivier Sanders