Secure computation of private values
First Claim
1. A system comprising:
- a processing unit toencrypt a private value of a party with a public-key encryption system and a public key to generate an encrypted private value anddecrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and
a communication unit tosend the encrypted private value to a further party,receive the encrypted blinded result of a function, the function having as input the private value, andsend the blinded result to the further party.
2 Assignments
0 Petitions
Accused Products
Abstract
An embodiment may include a system having a communication unit and a processing unit. The communication unit may be configured to receive an encrypted private value of a party, the encrypted private value being generated from a private value with a public-key encryption system and a public key, to send an encrypted blinded result to the party, and to receive a blinded result generated from the encrypted blinded result. The processing unit may be configured to compute a result of a function, the function having as input the private value, to blind the result of the function to generate the encrypted blinded result, and to compute the result by unblinding the blinded result.
-
Citations
34 Claims
-
1. A system comprising:
-
a processing unit to encrypt a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and decrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and a communication unit to send the encrypted private value to a further party, receive the encrypted blinded result of a function, the function having as input the private value, and send the blinded result to the further party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a communication unit to receive an encrypted private value of a party, the encrypted private value being generated from a private value with a public-key encryption system and a public key, send an encrypted blinded result to the party, and receive a blinded result generated from the encrypted blinded result; and a processing unit to compute a result of a function, the function having as input the private value, blind the result of the function to generate the encrypted blinded result, and compute the result by unblinding the blinded result. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
encrypting a private value of a party with a public-key encryption system and a public key to generate an encrypted private value; sending the encrypted private value to a further party; receiving an encrypted blinded result of a function, the function having as input the private value; decrypting the encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and sending the blinded result to the further party. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
receiving an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key; computing a result of a function, the function having as input the private value; blinding the result of the function to generate an encrypted blinded result; sending the encrypted blinded result to the party; receiving a blinded result generated from the encrypted blinded result; and computing the result of the function by unblinding the blinded result. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A computer program product having instructions that are executable by a computer system, the computer program product comprising instructions of:
-
a processing module to encrypt a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and to decrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and a communication module to send the encrypted private value to a further party, to receive the encrypted blinded result of a function, the function having as input the private value, and to send the blinded result to the further party.
-
-
32. A computer program product having instructions that are executable by a computer system, the computer program product comprising instructions of:
-
a communication module to receive an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key, to send an encrypted blinded result to the party, and to receive a blinded result generated from the encrypted blinded result; and a processing module to compute a result of a function, the function having as input the private value, to blind the result of the function to generate the encrypted blinded result, and to compute the result by unblinding the blinded result.
-
-
33. A participant system comprising:
-
first means for encrypting a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and for decrypting an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and second means for sending the encrypted private value to a further party, for receiving the encrypted blinded result of a function, the function having as input the private value, and for sending the blinded result to the further party.
-
-
34. A platform provider system comprising:
-
first means for receiving an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key, for sending an encrypted blinded result to the party, and for receiving a blinded result generated from the encrypted blinded result; and second means for computing a result of a function, the function having as input the private value, for blinding the result of the function to generate the encrypted blinded result, and for computing the result by unblinding the blinded result.
-
Specification