1
Juan Alberto Garay, Rosario Gennaro, Charanjit Singh Jutla, Tal D Rabin: Method and apparatus for the secure distributed storage and retrieval of information. International Business Machines Corporation, Louis B Herzberg, McGuireWoods, February 20, 2001: US06192472 (760 worldwide citation)

A solution to the general problem of Secure Storage and Retrieval of Information (SSRI) guarantees that also the process of storing the information is correct even when some processors fail. A user interacts with the storage system by depositing a file and receiving a proof that the deposit was corr ...


2
Juan Alberto Garay, Rosario Gennaro, Charanjit Singh Jutla, Tal D Rabin: Method and apparatus for the secure distributed storage and retrieval of information. International Business Machines Corporation, Louis P Herzberg, Whitham Curtis & Whitham, November 23, 1999: US05991414 (736 worldwide citation)

A solution to the general problem of Secure Storage and Retrieval of Information (SSRI) guarantees that also the process of storing the information is correct even when some processors fail. A user interacts with the storage system by depositing a file and receiving a proof that the deposit was corr ...


3
Mihir Bellare, Juan Alberto Garay, Charanjit Singh Jutla, Marcel Mordechay Yung: Method for electronic payment system with issuer control. International Business Machines Corporation, Douglas W Cameron, Whitham Curtis & Whitham, December 7, 1999: US05999625 (64 worldwide citation)

A cryptographic method implemented on an electronic communication network interconnecting a plurality of terminals represents funds in a way that is secure at the issuer and secure when funds move from payer to payee and back to the issuer. The cryptographic method mints, issues, pays and redeems fu ...


4
Pradeep Dubey, Charanjit Singh Jutla, Vijay Kumar, Ravindran Sai Anand, Prasanna Ganesan: Protocols for anonymous electronic communication and double-blind transactions. International Business Machines Corporation, Whitham Curtis & Christofferson P C, T Rao Coca, October 4, 2005: US06952769 (27 worldwide citation)

A system and associated protocols for communication between two entities across a computer network operate such that the identities of the two entities remain concealed from each other, while ensuring that no third party is able to trace the existence of a conversation between them. The two entities ...


5
Charanjit Singh Jutla: Symmetric key authenticated encryption schemes. International Business Machines Corporation, Louis P Herzberg, November 8, 2005: US06963976 (23 worldwide citation)

The present invention provides encryption schemes and apparatus which securely generate a cipher-text which in itself contains checks for assuring message integrity. It also provides compatible decryption schemes confirming message integrity. The encryption scheme generates a cipher-text with messag ...


6
William Eric Hall, Charanjit Singh Jutla: Simple universal hash for plaintext aware encryption. International Business Machines Corporation, F Chau & Associates, January 22, 2008: US07321659 (6 worldwide citation)

A simple universal hash apparatus and method include input means for inputting at least one of a plurality of Plaintext blocks into an integrity aware encryption scheme using at least one of two secret keys to obtain a plurality of Ciphertext blocks; Plaintext checksum means for computing a Plaintex ...


7
Pooja Aggarwal, Krishnendu Chatterjee, Pradeep Kumar Dubey, Charanjit Singh Jutla, Vijay Kumar: Remote authentication of fingerprints over an insecure network. International Business Machines Corporation, T Rao Coca Esq, McGinn & Gibb PLLC, August 17, 2004: US06778688 (5 worldwide citation)

The present invention relates to a method, system and computer program product for enabling the remote authentication of fingerprints over an insecure network using a client-server architecture by generation of a set of random queries relating to fingerprint patterns based on stored fingerprint data ...


8
Alok Aggarwal, Pradeep K Dubey, Charanjit Singh Jutla, Vijay Kumar, Marco Martens, Michael Ira Shub, Charles P Tresser, Chai Wah Wu: Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries. International Business Machines Corporation, Whitman Curtis & Christofferson P C, T Rao Coca, March 29, 2005: US06873977 (3 worldwide citation)

A method and system offer confidential purchase of electronic data which can be used without any need of knowledge in cryptography nor mastery of computer use beyond usual usage of the World Wide Web (WWW). The method and system which guarantee confidentiality as long as there is no collusion betwee ...


9
Charanjit Singh Jutla, Arnab Roy: Single-round password-based key exchange protocols. International Business Machines Corporation, F Chau & Associates, Anne V Dougherty Esq, March 25, 2014: US08681986 (2 worldwide citation)

A method for initializing encrypted communications using a common reference string and a shared password, includes determining a secret key of a peer using a first message, a second message and the common reference string, wherein the first message and the second message each comprise a tuple of ele ...


10
William Eric Hall, Charanjit Singh Jutla: Simple universal hash for plaintext aware encryption. International Business Machines Corporation, F Chau & Associates, March 15, 2011: US07907725

A simple universal hash apparatus and method include input means for inputting at least one of a plurality of Plaintext blocks into an integrity aware encryption scheme using at least one of two secret keys to obtain a plurality of Ciphertext blocks; Plaintext checksum means for computing a Plaintex ...