Controlled publication of sensitive content
First Claim
1. A method, performed by a computing device, for publishing sensitive content at a future time, the method comprising:
- prior to a future time at which sensitive content is to be published, receiving an encrypted version of the sensitive content;
applying an interactive zero knowledge proof to the encrypted version of the sensitive content, wherein applying the interactive zero knowledge proof comprises repeating more than once the steps of;
requesting a sample of the sensitive content corresponding to a random portion of the encrypted version of the sensitive content,receiving a hash of the requested sample of the sensitive content that does not reveal the sensitive content, andcomparing the hash to a particular aspect expected in the requested sample of the sensitive content,wherein the particular aspect expected in the sample of the sensitive content comprises grammar or format;
upon successful application of the interactive zero knowledge proof, preparing the encrypted version of the sensitive content for publication;
at the future time, receiving an encryption key for the encrypted version of the sensitive content;
decrypting the encrypted version of the sensitive content with the encryption key to produce the sensitive content at a publication location from which the sensitive content is accessible via a network; and
publishing the decrypted sensitive content.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of the sensitive content is received and a sequence of proof rules are applied to random portions of the encrypted version of the sensitive content. Upon successful application of the sequence of proof rules, the encrypted version of the sensitive content is prepared for publication and optionally published in encrypted form. At the future time, an encryption key is received for the encrypted version of the sensitive content and the encrypted version of the sensitive content is decrypted with the encryption key to produce the sensitive content.
-
Citations
16 Claims
-
1. A method, performed by a computing device, for publishing sensitive content at a future time, the method comprising:
-
prior to a future time at which sensitive content is to be published, receiving an encrypted version of the sensitive content; applying an interactive zero knowledge proof to the encrypted version of the sensitive content, wherein applying the interactive zero knowledge proof comprises repeating more than once the steps of; requesting a sample of the sensitive content corresponding to a random portion of the encrypted version of the sensitive content, receiving a hash of the requested sample of the sensitive content that does not reveal the sensitive content, and comparing the hash to a particular aspect expected in the requested sample of the sensitive content, wherein the particular aspect expected in the sample of the sensitive content comprises grammar or format; upon successful application of the interactive zero knowledge proof, preparing the encrypted version of the sensitive content for publication; at the future time, receiving an encryption key for the encrypted version of the sensitive content; decrypting the encrypted version of the sensitive content with the encryption key to produce the sensitive content at a publication location from which the sensitive content is accessible via a network; and publishing the decrypted sensitive content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-based system for publishing sensitive content at a future time, the system comprising:
-
at least one memory including instructions; and at least one processor that executes the instructions stored in memory, that causes the processor to implement; a means for receiving an encrypted version of sensitive content prior to a future time at which the sensitive content is to be published; a means for applying an interactive zero knowledge proof to the encrypted version of the sensitive content, wherein the means for applying the interactive zero knowledge proof comprises; a means for requesting a sample of the sensitive content corresponding to a random portion of the encrypted version of the sensitive content, a means for receiving a hash of the requested sample of the sensitive content that does not reveal the sensitive content, and a means for comparing the hash to a particular aspect expected in the requested sample of the sensitive content, wherein the particular aspect expected in the sample of the sensitive content comprises grammar or format; a means for preparing the encrypted version of the sensitive content for publication; a means for decrypting the encrypted version of the sensitive content with an encryption key provided at the future time to produce the sensitive content at a publication location from which the sensitive content is accessible via a network; and a means for publishing the decrypted sensitive content. - View Dependent Claims (11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions for causing a computing device to perform operations comprising:
-
receiving an encrypted version of a sensitive document prior to a future desired publication time; applying an interactive zero knowledge proof to the encrypted version of the sensitive document, wherein the instructions for causing a computing device to apply the interactive zero knowledge proof comprises instructions for causing the computing device to perform operations comprising; requesting a sample of the sensitive content corresponding to a random portion of the encrypted version of the sensitive content, receiving a hash of the requested sample of the sensitive content that does not reveal the sensitive content, and comparing the hash to a particular aspect expected in the requested sample of the sensitive content, wherein the particular aspect expected in the sample of the sensitive content comprises grammar or format; preparing the encrypted version of the sensitive document for publication; at the future desired publication time, receiving an encryption key for the encrypted version of the sensitive document; decrypting the encrypted version of the sensitive document with the encryption key to produce the sensitive document; and publishing the decrypted sensitive content. - View Dependent Claims (14, 15, 16)
-
Specification