UTILIZING ERROR CORRECTION (ECC) FOR SECURE SECRET SHARING
First Claim
Patent Images
1. A method for utilizing error correction (ECC) for secure secret sharing, the method comprising:
- computing an encrypted key using a key and a number of random values;
computing, based on a first error correction (ECC) scheme, an encrypted key ECC for the encrypted key and the random values; and
storing a number of key fragments on a number of storage servers, the number of key fragments comprising the encrypted key, the random values, and the encrypted key ECC.
3 Assignments
0 Petitions
Accused Products
Abstract
Utilizing error correction (ECC) for secure secret sharing includes computing an encrypted key using a key and a number of random values, computing, based on a first ECC scheme, a key ECC for the encrypted key and the random values, and storing a number of key fragments on a number of storage servers, the number of key fragments includes the encrypted key, the random values, and the key ECC.
-
Citations
15 Claims
-
1. A method for utilizing error correction (ECC) for secure secret sharing, the method comprising:
-
computing an encrypted key using a key and a number of random values; computing, based on a first error correction (ECC) scheme, an encrypted key ECC for the encrypted key and the random values; and storing a number of key fragments on a number of storage servers, the number of key fragments comprising the encrypted key, the random values, and the encrypted key ECC. - View Dependent Claims (2, 3, 4, 5)
-
-
6. The method of claim 6, in which reconstructing the encrypted object, the encrypted key, and the random values from the threshold number of the storage servers comprises:
-
reconstructing the encrypted object from a number of object fragments from the threshold number of the storage servers; reconstructing the encrypted key from the number of key fragments from the threshold number of the storage servers; reconstructing the random values from the key fragments from the threshold number of the storage servers; decrypting, based on the encrypted key and the random values, the encrypted key to obtain the key; and decrypting the encrypted object using the key to obtain an object.
-
-
7. A system for utilizing error correction (ECC) for secure secret sharing, the system comprising:
-
an encrypted key computing engine to compute an encrypted key using a key and a number of random values; an encrypted key error correction (ECC) computing engine to compute, based on a first ECC scheme, an encrypted key ECC for the encrypted key and the random values; a key fragment storing engine to store a number of key fragments on a number of storage servers, the number of key fragments comprising the encrypted key, the random values, and the encrypted key ECC; an encrypted object computing engine to compute an encrypted object with the key; an encrypted object ECC computing engine to compute, based on a second ECC scheme, an object ECC for the encrypted object; an object fragment storing engine to store a number of object fragments on the number of storage servers, the number of object fragments comprising the encrypted object and the object ECC; and a reconstructing engine to reconstruct the encrypted object, the encrypted key, and the random values from a threshold number of the storage servers. - View Dependent Claims (8, 9, 10)
-
-
11. A computer program product for utilizing error correction (ECC) for secure secret sharing, comprising:
-
a tangible computer readable storage medium, said tangible computer readable storage medium comprising computer readable program code embodied therewith, said computer readable program code comprising program instructions that, when executed, causes a processor to; compute an encrypted key using a key and a number of random values; compute, based on a first error correction (ECC) scheme, an encrypted key ECC for the encrypted key and the random values; store a number of key fragments on a number of storage servers, the number of key fragments comprising the encrypted key, the random values, and the encrypted key ECC; compute an encrypted object with the key; compute, based on a second ECC scheme, an object ECC for the encrypted object; and store a number of object fragments on the number of storage servers, the number of object fragments comprising the encrypted object and the object ECC. - View Dependent Claims (12, 13, 14, 15)
-
Specification