Method and system for quorum controlled asymmetric proxy encryption
First Claim
1. A method of forwarding an encrypted message sent to a primary recipient having a secret key to at least one secondary recipient comprising the steps ofsharing portions of said secret key among a plurality of proxy servers, upon receipt of an encrypted message by said plurality of proxy servers, each of said plurality of proxy servers modifying said encrypted message by applying said key portion to said encrypted message, the result of said modifications comprising a message secret to said plurality of proxy servers but decryptable by said at least one secondary recipient, forwarding said resultant encrypted message to said at least one secondary recipient, and a first one of said plurality of proxy servers modifying said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of forwarding an encrypted message sent to a primary recipient having a secret key to at least one secondary recipient comprising the steps of sharing portions of the secret key among a predetermined threshold number of proxy servers greater than one, upon receipt of an encrypted message by the predetermined threshold number of proxy servers, each of the predetermined threshold number of proxy servers modifying the message by applying the key portion to the encrypted message, the result of the modification comprising a message secret to the predetermined threshold number of proxy servers but decryptable by at least one secondary recipient, and forwarding the resultant message to at least one secondary recipient. This method and system for quorum controlled asymmetric proxy encryption has uses ranging from efficient key distribution for pay-tv, to methods for distributively maintaining databases. The scheme, which can use either an ElGamal, or an ElGamal encryption based on Elliptic Curves or an ElGamal related encryption algorithm, leaks no information as long as there is no dishonest quorum of proxy servers.
99 Citations
30 Claims
-
1. A method of forwarding an encrypted message sent to a primary recipient having a secret key to at least one secondary recipient comprising the steps of
sharing portions of said secret key among a plurality of proxy servers, upon receipt of an encrypted message by said plurality of proxy servers, each of said plurality of proxy servers modifying said encrypted message by applying said key portion to said encrypted message, the result of said modifications comprising a message secret to said plurality of proxy servers but decryptable by said at least one secondary recipient, forwarding said resultant encrypted message to said at least one secondary recipient, and a first one of said plurality of proxy servers modifying said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
-
19. An apparatus for forwarding an encrypted message sent to a primary recipient having a secret key to at least one secondary recipient comprising
a means for sharing portions of said secret key among a plurality of proxy servers, a means for each of said plurality of proxy servers to modify said encrypted message by applying said key portion to said encrypted message, the result of said modifications comprising a message secret to said plurality of proxy servers but decryptable by said at least one secondary recipient, and a means for forwarding said resultant encrypted message to said at least one secondary recipient, wherein a first one of said plurality of proxy servers modifies said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
-
22. A communication system for forwarding an encrypted message sent to a primary recipient having a secret key to at least one secondary recipient, said communication system comprising
a first memory for said primary recipient for receiving and sending said encrypted messages, a plurality of second memories, wherein each of said second memories is associated with one of said at least one secondary recipient for receiving and sending said encrypted messages, a plurality of proxy servers for administering said communication system, a quorum of proxy servers selected from said plurality of proxy servers for forwarding said encrypted message sent to said first memory of said primary recipient to each of said plurality of second memories of said at least one secondary recipient, and a means for sending and receiving said encrypted messages between said first memory of said primary recipient to each of said plurality of second memories of said at least one secondary recipient, wherein a first one of said quorum of proxy servers modifies said encrypted message followed by a second one of said quorum of proxy servers modifying said encrypted message and verifying said first one of said quorum of proxy servers'"'"' modification of said encrypted message.
-
25. A computer-readable medium having computer-executable instructions for performing the step comprising
forwarding an encrypted message sent to a primary recipient having a secret key in a form decryptable by at least one secondary recipient wherein said forwarding step comprises the substeps of (a) outputting portions of said secret key to a plurality of proxy servers, (b) receiving said encrypted message by said plurality of proxy servers, (c) applying each said key portion to modify said encrypted message, the result of said modifications comprising an encrypted message secret to said plurality of proxy servers but decryptable by said at least one secondary recipient, and (d) forwarding said resultant encrypted message to said at least one secondary recipient, wherein a first one of said plurality of proxy servers modifies said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
-
27. A computer-readable medium having computer-executable instructions for performing the step comprising
forwarding an encrypted message sent to a primary recipient having a secret key in a form decryptable by at least one secondary recipient wherein said forwarding step comprises the substeps of (a) outputting portions of said secret key from a communication system to a plurality of proxy servers, (b) sending said encrypted message from said communication system to said plurality of proxy servers, (c) receiving a resultant encrypted message in said communication system from said plurality of proxy servers, and (d) forwarding said resultant encrypted message from said communication system to said at least one secondary recipient, wherein a first one of said plurality of proxy servers modifies said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
-
29. A computer-readable medium having computer-executable instruction for performing the steps comprising
(a) receiving portions of a secret key form a communication system by a plurality of proxy servers, (b) receiving an encrypted message from said communication system by said plurality of proxy servers, (c) applying each said key portion to modify said encrypted message, the result of said modifications comprising an encrypted message secret to said plurality of proxy servers but decryptable by said at least one secondary recipient, and (d) sending said resultant encrypted message to said communication system from said plurality of proxy servers, wherein a first one of said plurality of proxy servers modifies said encrypted message followed by a second one of said plurality of proxy servers modifying said encrypted message and verifying said first one of said plurality of proxy servers'"'"' modification of said encrypted message.
Specification