Method and apparatus for encrypting, decrypting, and providing privacy for data values
First Claim
1. An apparatus comprising:
- a duplicator for duplicating a first vector of encrypted inputs;
a first operation module comprised of a first and a second processor, the first and second processors of the first operation module each comprised of a partial operation device;
a second operation module comprised of a first and a second processor, the first and second processors of the second operation module each comprised of a partial operation device;
wherein the duplicator duplicates the first vector of encrypted inputs to provide first and second duplicated vectors,wherein the first duplicated vector is supplied to and operated on by the first operation module by supplying the first duplicated vector to the first processor of the first operation module whose partial operation device partially operates on the first duplicated vector, and then by supplying the partially operated on first duplicated vector to the second processor of the first operation module whose partial operation device partially operates on the already partially operated on first duplicated vector to form a fully operated on first duplicated vector;
wherein the second duplicated vector is supplied to and operated on by the second operation module by supplying the second duplicated vector to the first processor of the second operation module whose partial operation device partially operates on the first duplicated vector, and then by supplying the partially operated on first duplicated vector to the second processor of the second operation module whose partial operation device partially operates on the already partially operated on second duplicated vector to form a fully operated on second duplicated vector;
wherein the apparatus is further comprised of a means for comparing which compares the fully operated on first duplicated vector with the fully operated on second duplicated vector;
and wherein the first vector, the first and second duplicated vectors, the partially operated on first and second duplicated vectors, and the fully operated on first and second duplicated vectors each are comprised of one or more data values on one or more data lines.
0 Assignments
0 Petitions
Accused Products
Abstract
A mix network with superior privacy and robustness is provided. An apparatus comprising a duplicator and first and second operation modules is disclosed. The first and second operation modules are each comprised of first and second processors. Each processor is comprised of a partial operation device. The duplicator preferably duplicates a vector of encrypted inputs, and provides first and second substantially similar duplicated vectors, to the first and second operation modules, respectively. The partial operation device of the first processor of the first operation module partially operates on the first duplicated vector, then supplies the result to the partial operation device of the second processor of the first operation module which partially operates on it to provide a fully operated on first duplicated vector. Likewise, the partial operation device of the first processor of the second operation module partially operates on the second duplicated vector, then supplies the result to the partial operation device of the second processor of the second operation module which partially operates on the partially operates on the second duplicated vector to provide a fully operated on first duplicated vector. A means for comparing compares the fully operated on first duplicated vector with the fully operated on second duplicated vector.
-
Citations
17 Claims
-
1. An apparatus comprising:
-
a duplicator for duplicating a first vector of encrypted inputs; a first operation module comprised of a first and a second processor, the first and second processors of the first operation module each comprised of a partial operation device; a second operation module comprised of a first and a second processor, the first and second processors of the second operation module each comprised of a partial operation device; wherein the duplicator duplicates the first vector of encrypted inputs to provide first and second duplicated vectors, wherein the first duplicated vector is supplied to and operated on by the first operation module by supplying the first duplicated vector to the first processor of the first operation module whose partial operation device partially operates on the first duplicated vector, and then by supplying the partially operated on first duplicated vector to the second processor of the first operation module whose partial operation device partially operates on the already partially operated on first duplicated vector to form a fully operated on first duplicated vector; wherein the second duplicated vector is supplied to and operated on by the second operation module by supplying the second duplicated vector to the first processor of the second operation module whose partial operation device partially operates on the first duplicated vector, and then by supplying the partially operated on first duplicated vector to the second processor of the second operation module whose partial operation device partially operates on the already partially operated on second duplicated vector to form a fully operated on second duplicated vector; wherein the apparatus is further comprised of a means for comparing which compares the fully operated on first duplicated vector with the fully operated on second duplicated vector; and wherein the first vector, the first and second duplicated vectors, the partially operated on first and second duplicated vectors, and the fully operated on first and second duplicated vectors each are comprised of one or more data values on one or more data lines. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification