Indirect public-key encryption
First Claim
Patent Images
1. A method of transmitting information from a first device to a second device, said method comprising the steps of:
- generating, by said first device, a random value (X);
computing, by said first device, a second value (Y) based on the random value and a public key associated with said second device;
masking, by said first device, the information (M) using the random value (X);
transmitting the masked information (Z) and the second value (Y) from said first device to an untrusted proxy;
generating, by said untrusted proxy, an encrypted form (M′
) of the information (M) based on the masked information (Z), and the second value (Y), received from said first device; and
transmitting said encypted information (M′
) from said untrusted proxy to said second device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for encrypting data communications between a client and server utilizes an untrusted proxy server to perform computationally expensive encryption calculations which would otherwise be performed by the client. Prior to transmitting the data message to the proxy server, the client masks the data message such that the data message is indecipherable to the untrusted proxy. The untrusted proxy performs the computationally expensive encryption calculations prior to transmitting the data message to the intended receiver.
45 Citations
6 Claims
-
1. A method of transmitting information from a first device to a second device, said method comprising the steps of:
-
generating, by said first device, a random value (X);
computing, by said first device, a second value (Y) based on the random value and a public key associated with said second device;
masking, by said first device, the information (M) using the random value (X);
transmitting the masked information (Z) and the second value (Y) from said first device to an untrusted proxy;
generating, by said untrusted proxy, an encrypted form (M′
) of the information (M) based on the masked information (Z), and the second value (Y), received from said first device; and
transmitting said encypted information (M′
) from said untrusted proxy to said second device.- View Dependent Claims (2, 3, 4, 5, 6)
-
Specification