Methods And Apparatuses For Secure Information Sharing In Social Networks Using Randomly-Generated Keys
First Claim
1. A method for secure information sharing in a social network, comprising:
- authorizing a user of the social network to obtain at least one message including data intended to be shared with the user of the social network, wherein the authorization is for access to the at least one message by a resource owner of the at least one message;
receiving the at least one message, by the user;
extracting a first ciphertext Ci and a second ciphertext CD1 from the at least one message, by a processor;
decrypting the first ciphertext Ci with a second key to obtain a random key KR, by a processor; and
decrypting the second ciphertext CD1 using the random key KR to obtain the data D1 intended to be shared, by a processor.
4 Assignments
0 Petitions
Accused Products
Abstract
There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.
14 Citations
20 Claims
-
1. A method for secure information sharing in a social network, comprising:
-
authorizing a user of the social network to obtain at least one message including data intended to be shared with the user of the social network, wherein the authorization is for access to the at least one message by a resource owner of the at least one message; receiving the at least one message, by the user; extracting a first ciphertext Ci and a second ciphertext CD1 from the at least one message, by a processor; decrypting the first ciphertext Ci with a second key to obtain a random key KR, by a processor; and decrypting the second ciphertext CD1 using the random key KR to obtain the data D1 intended to be shared, by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a memory; and at least on processor coupled to the memory and configured to; authorize a user of the social network to obtain at least one message including data intended to be shared with the user of the social network, wherein authorization is for access to the at least one message by a resource owner of the at least one message; receive the at least one message; extract a first ciphertext Ci and a second ciphertext CD1 from the at least one message; decrypt the first ciphertext Ci to obtain a random key KR; and decrypt the second ciphertext CD1 using the random key KR to obtain the data D1 intended to be shared.
-
-
15. A method for secure information sharing in a social network, comprising:
-
selecting, by a user of the social network, a random key KR; encrypting data intended to be shared with a set of users of the social network with the random key KR to create a first ciphertext CD1, by a processor; encrypting the random key KR with a second key to create a second ciphertext Ci, by a processor; creating a message including both the first and second ciphertexts, by a processor; and sending the created message to a storage location of the social network. - View Dependent Claims (16, 17, 18)
-
-
19. An apparatus comprising:
-
a memory; and at least on processor coupled to the memory and configured to; select, by a user of the social network, a random key KR; encrypt data intended to be shared with a set of users of the social network with the random key KR to create a first ciphertext CD1; encrypt the random key KR with a second key to create a second ciphertext Ci; create a message including both the first and second ciphertexts; and send the created message to a storage location of the social network.
-
-
20. A system for secure information sharing in social networks, comprising:
-
a first social network user configured to encrypt data to be shared between a set of social network users, using a random key, generate a set of ciphertexts by encrypting the random key with a second key, form a message including the encrypted data and the generated set of ciphertexts, and send the formed message to a social network host; the social network host configured to receive and store the formed message, and send the formed message to at least one of the set of social network users; and the set of social network users, each configured to receive the formed message; extract at least one ciphertext from the formed message; decrypt the at least one ciphertext using a corresponding key to the second key to obtain the random key; and decrypt data from the formed message using the decrypted random key.
-
Specification