ENCRYPTION SCHEMES WITH ADDITIONAL PROPERTIES
First Claim
Patent Images
1. A method of encrypting a message m using a Paillier cryptosystem, comprising:
- computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r∈
[1, N);
computing a first verification value based upon u and N, where u is randomly chosen such that u∈
[1, N);
computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments relate to a method of encrypting a message m using a Paillier cryptosystem, including: computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r∈[1, N); computing a first verification value based upon u and N, where u is randomly chosen such that u∈[1, N); computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H.
1 Citation
19 Claims
-
1. A method of encrypting a message m using a Paillier cryptosystem, comprising:
-
computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r∈
[1, N);computing a first verification value based upon u and N, where u is randomly chosen such that u∈
[1, N);computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of decrypting a ciphertext using a Paillier cryptosystem including a value c, a first verification value, and a second verification value s, comprising:
-
validating the ciphertext by checking the first verification value based upon the second verification value s, N, the value c, and a hash function H, where N is the product of two distinct primes p and q; deciphering the ciphertext to produce a message m from the value c using a secret key and N. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification