The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 30, 2022

Filed:

Feb. 12, 2020
Applicants:

Nxm Labs Canada Inc., Toronto, CA;

Ryerson University, Toronto, CA;

Inventors:

Brian Goncalves, Toronto, CA;

Atefeh Mashatan, Toronto, CA;

Jay Fallah, Toronto, CA;

Kristopher Byrne, Toronto, CA;

Prathap Siddavaatam, Toronto, CA;

Assignees:

NXM Labs, Inc., Mountain View, CA (US);

Reyerson University, Toronto, CA;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); H04L 9/30 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); G06N 10/00 (2022.01);
U.S. Cl.
CPC ...
H04L 9/30 (2013.01); H04L 9/0825 (2013.01); H04L 9/0869 (2013.01); H04L 9/3236 (2013.01); G06N 10/00 (2019.01);
Abstract

A hybrid encryption scheme links a first public key encryption (PKE) scheme with a second PKE scheme through a true random or pseudo-random element, which is used by a sender to encapsulate a symmetrically encrypted message and its associated symmetric key to generate a pair of ciphertexts for transmission to a recipient. The recipient decrypts and decapsulates the ciphertexts, retrieves the random element, and may conduct one or more verification steps to ensure that the ciphertexts were well-formed, and to detect any re-encryption or encapsulation attacks. To encrypt a message, the message and initial random value are encrypted with a symmetric key to provide an intermediate ciphertext. The symmetric key and the encrypted message-value are each encapsulated by distinct algorithms using distinct values derived from the initial random value, such as different hashes, and public keys to provide first and second ciphertexts.


Find Patent Forward Citations

Loading…