Method of passing a cryptographic key that allows third party access to the key - id: 6724893









A method of passing a cryptographic key that allows recovery of the key by a third party by generating a first random number by a first user; generating "key.sub.1 " by the first user; generating a second random number "k.sub.2a " by the first user; computing "y.sub.1 " by the first user; computing "y.sub.2 " by the first user; computing "r.sub.1 " by the first user; computing "z" by the first user; computing "s" by the first user; computing "G" by the first user; passing (G,z,r.sub.1,s) from the first user to the second user; receiving "Y" by the second user; computing "T" by the second user; computing "y.sub.1 " by the second user; computing "k.sub.1a " by the second user; computing "key.sub.1 " by the second user; intercepting, by a third party, (G,z,r.sub.1,s) transmitted from the first user to the second user; presenting "G" and "z," by the third party, to a key-escrow agent; computing "y.sub.2 " by the key-escrow agent; computing "key.sub.2 " by the key-escrow agent, where key.sub.2 =key.sub.1 ; returning "key" from the key-escrow agent to the third party if the third party is authorized to receive "key.sub.2 "; and using "key.sub.2 " by the authorized third party, to decrypt an encrypted message sent between the first user and the second user which was encrypted using "key.sub.1."Method of passing a cryptographic key that allows third party access to the key672489320/04/200411/10/199620042,748Petro; JohnUS Patent and Trademark OfficeGoogle Patent Searchpatentimages.storage.googleapis.com/US6724893B1/US06724893-20040420-D00000.pngUnique