Voltage Security Patents

Strong Intellectual Property Portfolio

Voltage Security continues to innovate, and patents relating to Identity-Based Encryption™ (IBE), Format-Preserving Encryption™ (FPE) and other Voltage innovations have now been issued. Voltage has been awarded several patents for encryption technology innovations by the U.S. Patent and Trademark Office. These additions strengthen Voltage’s IP and patent portfolio, and are at the core of Voltage’s breakthrough technologies and processes that enable pervasive data security and privacy throughout the enterprise, cloud, mobile devices and beyond.

We are also working closely with standards bodies such as the IETF and IEEE to explore making these technologies available to a broad range of ISV’s through reasonable and non-discriminatory licensing programs in accordance with our commitments to these organizations.

Patents granted include:

  • US Patents 7,113,594; 7,103,911; 7,017,181; 7,003,117; and 6,886,096. These broadly cover the systems and methods for IBE cryptographic techniques, district policy information, messaging with public parameter host servers, securing data distribution, and more.
  • US Patent 7,864,952 which describes the core cryptography behind Format-Preserving Encryption (FPE).

Voltage FPE Patent Licensing

The Voltage FPE patent covers all three modes of format-preserving encryption defined in the NIST Methods For Format-Preserving Encryption Standard (NIST 800-38G): FF1 (FFX mode), FF2 (VAES mode) and FF3 (BPS mode). All modes employ the Feistel structure of encryption, and Voltage has published a letter of assurance related to these Intellectual Property Rights (IPR) for FF modes of FPE on the NIST website located here.

Voltage has agreed to make available a non-exclusive FPE patent license to an unrestricted number of applicants on a worldwide basis with reasonable terms and conditions for the purpose of implementing the approved standard. For more information on the Voltage FPE patent license program, please contact us at: partner@voltage.com

Academic and Research Links

There are over 200 research papers on Identity-Based Encryption (IBE), pairing based crypto and bi-linear maps. The following is a short selection of papers concerning IBE:

Seminal Papers

D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil pairing,” in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in Advances in Cryptology – Crypto 2001, Vol. 2139 of Lecture Notes in Computer Science, Springer-Verlag, pp. 213-229, 2001.

A. Shamir, “Identity-based Cryptosystems and Signature Schemes,” in Advances in Cryptology – Crypto 1984, Vol. 196 of Lecture Notes in Computer Science, Springer-Verlag, pp. 47-53, 1984.

Voltage Research

X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, “Secure Remote Authentication Using Biometric Data,” in Advances in Cryptology – Eurocrypt 2005, Lecture Notes in Computer Science series, Springer-Verlag, 2005. (To appear.)

D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,” in Advances in Cryptology – Eurocrypt 2005, Lecture Notes in Computer Science series, Springer-Verlag, 2005. (To appear.)

X. Boyen, “Reusable Cryptographic Fuzzy Extractors,” in 11th ACM Conference on Computer and Communications Security – CCS 2004, ACM Press, pp. 82-91, 2004.

D. Boneh and X. Boyen, “Secure Identity Based Encryption Without Random Oracles,” in Advances in Cryptology – Crypto 2004, Vol. 3152 of Lecture Notes in Computer Science, Springer-Verlag, pp. 443-459, 2004.

D. Boneh, X. Boyen, and H. Shacham, “Short Group Signatures,” in Advances in Cryptology – Crypto 2004, Vol. 3152 of Lecture Notes in Computer Science, Springer-Verlag, pp. 41-55, 2004.

D. Boneh and X. Boyen, “Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles,” in Advances in Cryptology – Eurocrypt 2004, Vol. 3027 of Lecture Notes in Computer Science, Springer-Verlag, pp. 223-238, 2004.

D. Boneh and X. Boyen, “Short Signatures Without Random Oracles,” in Advances in Cryptology – Eurocrypt 2004, Vol. 3027 of Lecture Notes in Computer Science, Springer-Verlag, pp. 56-73, 2004.

X. Boyen, “Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography,” in Advances in Cryptology – Crypto 2003, Vol. 2729 of Lecture Notes in Computer Science, Springer-Verlag, pp. 383-399, 2003.

Industry Reports

M. Gagné, “Identity-Based Encryption: a Survey,” in CryptoBytes, Vol. 6, No. 1, pp. 10-19, RSA Laboratories, 2003.

M. Casassa Mont and P. Bramhall, “IBE Applied to Privacy and Identity Management,” in Hewlett-Packard Laboratories, technical report HPL-2003-101, 2003.

M. Casassa Mont, S. Pearson, and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,” in Hewlett-Packard Laboratories, technical report HPL-2003-49, 2003.

M. Casassa Mont, P. Bramhall, C. R. Dalton, and K. Harrison, “A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial,” in Hewlett-Packard Laboratories, technical report HPL-2003-21, 2003.

Academic Publications

K. Eisentraeger, K. Lauter, and P. L. Montgomery, “Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves,” in Algorithmic Number Theory Symposium – ANTS-VI, Vol. 3076 of Lecture Notes on Computer Science, Springer-Verlag, pp. 169-183, 2004.

R. Canetti, S. Halevi, and J. Katz, “Chosen-Ciphertext Security from Identity-Based Encryption,” in proceedings of Eurocrypt 2004, Vol. 3027 of Lecture Notes on Computer Science, Springer-Verlag, 2004.

R. Canetti, S. Halevi, and J. Katz, “A Forward-Secure Public-Key Encryption Scheme,” in Advances in Cryptology – Eurocrypt 2003, Vol. 2656 of Lecture Notes in Computer Science, Springer-Verlag, pp. 255-271, 2003.

P. S. L. M. Barreto, B. Lynn, and M. Scott, “Constructing Elliptic Curves with Prescribed Embedding Degrees,” in Proceedings of the Third Workshop on Security in Communication Networks – SCN 2002, Vol. 2576 of Lecture Notes in Computer Science, Springer-Verlag, pp. 257-267, 2003.

C. Gentry and A. Silverberg, “Hierarchical ID-Based Cryptography,” in Proceedings of Asiacrypt 2002, Vol. 2501 of Lecture Notes on Computer Science, Springer-Verlag, pp. 548-566, 2002.

P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, “Efficient Algorithms for Pairing-Based Cryptosystems,” in Advances in Cryptology – Crypto 2002, Vol. 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp. 354-368, 2002.

A. Joux, “The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems,” in Algorithm Number Theory Symposium – ANTS-V, Vol. 2369 of Lecture Notes on Computer Science, Springer-Verlag, pp. 20-32, 2002.

T. Okamoto and D. Pointcheval, “The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes,” in Practice and Theory in Public Key Cryptography – PKC 2001, Vol. 1992 of Lecture Notes on Computer Science, Springer-Verlag, pp. 104-118, 2001.

On-Line References

Y. Yacobi, “A Note on the Bilinear Diffie-Hellman Assumption,” in Cryptology ePrint Archive, Report 2002/113. http://eprint.iacr.org/2003/113

S. D. Galbraith, H. J. Hopkins, and I. E. Shparlinski, “Secure Bilinear Diffie-Hellman Bits,” in Cryptology ePrint Archive, Report 2002/155. http://eprint.iacr.org/2002/155

B. Lynn, “Authenticated Identity-Based Encryption,” in Cryptology ePrint Archive, Report 2002/072. http://eprint.iacr.org/2002/072

Paulo Barreto’s “Pairing-Based Crypto Lounge”, an extensive repository of IBE and pairing-based crypto resources available
online at: http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html