GENERATING AN ENCRYPTED MESSAGE FOR STORAGE
First Claim
1. A method comprises:
- generating a shared secret key from a public key of another entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity;
encrypting a message using the shared secret key to produce an encrypted message; and
outputting the encrypted message to the other entity.
4 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a dispersed storage (DS) processing module generating a shared secret key from a public key of another entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity. The method continues with the DS module encrypting a message using the shared secret key to produce an encrypted message. The method continues with the DS module outputting the encrypted message to the other entity.
87 Citations
22 Claims
-
1. A method comprises:
-
generating a shared secret key from a public key of another entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity; encrypting a message using the shared secret key to produce an encrypted message; and outputting the encrypted message to the other entity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprises:
-
receiving an encrypted message from another entity; generating a shared secret key from a public key of the other entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity; and decrypting the encrypted message using the shared secret key to recapture a message. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A dispersed storage (DS) module comprises:
-
a first module, when operable within a computing device, causes the computing device to; generate a shared secret key from a public key of another entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity; a second module, when operable within the computing device, causes the computing device to; encrypt a message using the shared secret key to produce an encrypted message; and a third module, when operable within the computing device, causes the computing device to; output the encrypted message to the other entity. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A dispersed storage (DS) module comprises:
-
a first module, when operable within a computing device, causes the computing device to; receive an encrypted message from another entity; a second module, when operable within the computing device, causes the computing device to; generate a shared secret key from a public key of the other entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity; and a third module, when operable within the computing device, causes the computing device to; decrypt the encrypted message using the shared secret key to recapture a message. - View Dependent Claims (19, 20, 21, 22)
-
Specification