首页>
外国专利>
Authentication methods and apparatus using key-encapsulating ciphertexts and other techniques
Authentication methods and apparatus using key-encapsulating ciphertexts and other techniques
展开▼
机译:使用密钥封装密文和其他技术的身份验证方法和设备
展开▼
页面导航
摘要
著录项
相似文献
摘要
In one aspect, one or more key-encapsulating ciphertexts are generated and stored in a processing device. The processing device receives authentication information from another processing device, and utilizes the authentication information to decrypt at least one of the key-encapsulating ciphertexts to recover an associated key. The authentication information may comprise, for example, a tokencode. In an illustrative embodiment, the authentication information may comprise a plurality of gradually rotating keys with overlapping refresh intervals. As a more particular example, the authentication information may comprise a plurality of hash chains wherein successive ones of the hash chains overlap one another in a designated number of time steps.
展开▼