METHOD AND SYSTEM FOR CALCULATIONS ON ENCRYPTED DATA
First Claim
1. A method at a computing device for generating a communal decryption key among at least three participants to permit sharing of sensitive data, the method comprising:
- at a current participant;
generating a secret value;
adding the generated secret value to an in progress key to create a modified in progress key; and
forwarding the modified in progress key to a subsequent participant in accordance with a predetermined ordering of participants; and
wherein said communal decryption key is derived upon performing said generating, adding and forwarding over a predetermined number of rounds.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and device for generating a communal decryption key among participants to permit sharing of sensitive data, the method at a current participant includes generating a secret value; adding the generated secret value to an in progress key to create a modified in progress key; and forwarding the modified in progress key to a subsequent participant in accordance with a predetermined ordering of participants, over a predetermined number of rounds. Further a method for sharing of sensitive data among participants, the method at a current participant includes constructing an exponent by combining a secret value of the current participant and the sensitive data; creating an encrypted value using the constructed exponent; publishing the encrypted value; finding a product of encrypted values of all participants; and decrypting the product of encrypted values using a communal decryption key, wherein the communal decryption key includes secret values of all the participants.
-
Citations
21 Claims
-
1. A method at a computing device for generating a communal decryption key among at least three participants to permit sharing of sensitive data, the method comprising:
at a current participant; generating a secret value; adding the generated secret value to an in progress key to create a modified in progress key; and forwarding the modified in progress key to a subsequent participant in accordance with a predetermined ordering of participants; and wherein said communal decryption key is derived upon performing said generating, adding and forwarding over a predetermined number of rounds. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method at a computing device for sharing of sensitive data among at least three participants, the method comprising:
-
at a current participant; constructing an exponent by mathematically combining a secret value of the current participant and the sensitive data; creating an encrypted value using the constructed exponent; publishing the encrypted value; finding a product of encrypted values of all said participants; and decrypting the product of encrypted values using a communal decryption key, wherein the communal decryption key includes secret values of all said participants. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification