Public Key Encryption Algorithms for Hard Lock File Encryption
First Claim
Patent Images
1. An encryption method comprising:
- encrypting, by operation of a computing device, a first portion of a message using a first secret key, the first secret key being generated based on a public key of an entity;
using a one-way function to generate a second secret key from the first secret key;
discarding the first secret key; and
encrypting, by operation of the computing device, a second portion of the message using the second secret key.
8 Assignments
0 Petitions
Accused Products
Abstract
In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
31 Citations
18 Claims
-
1. An encryption method comprising:
-
encrypting, by operation of a computing device, a first portion of a message using a first secret key, the first secret key being generated based on a public key of an entity; using a one-way function to generate a second secret key from the first secret key; discarding the first secret key; and encrypting, by operation of the computing device, a second portion of the message using the second secret key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium comprising instructions that are operable when executed by data processing apparatus to perform operations comprising:
-
encrypting a first portion of a message using a first secret key generated from a shared secret; using a one-way function to generate a second secret key from the first secret key; discarding the first secret key; encrypting a second portion of the message using the second secret key; providing the encrypted first and second portions of the message to an entity; and providing the shared secret to the entity using a public key of the entity. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A device comprising:
one or more processors operable to decrypt an encrypted message by performing operations comprising; accessing an encrypted message, the encrypted message having been encrypted using multiple secret keys based on a public key of an entity; generating a first secret key based on an ephemeral public key and a private key of the entity; decrypting a first portion of the message using the first secret key; using a one-way function to generate a second secret key from the first secret key; and decrypting a second portion of the message using the second secret key. - View Dependent Claims (15, 16, 17, 18)
Specification