Methods and apparatuses for secure information sharing in social networks using randomly-generated keys
First Claim
1. A method for secure information sharing in a social network, comprising:
- receiving authorization to obtain at least one message including data D1, wherein the authorization is provided by a resource owner of the at least one message for a given user of the social network;
receiving the at least one message;
extracting a first ciphertext Ci and a second ciphertext CD1 from the at least one message;
decrypting the first ciphertext Ci with a first key to obtain a random key KR; and
decrypting the second ciphertext CD1 using the random key KR to obtain the data D1;
wherein the first key is associated with an identity of the given user; and
wherein the receiving authorization, receiving the at least one message, extracting, decrypting the first ciphertext and decrypting the second ciphertext are performed by at least one processing device comprising a processor coupled to a memory.
4 Assignments
0 Petitions
Accused Products
Abstract
There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.
-
Citations
20 Claims
-
1. A method for secure information sharing in a social network, comprising:
-
receiving authorization to obtain at least one message including data D1, wherein the authorization is provided by a resource owner of the at least one message for a given user of the social network; receiving the at least one message; extracting a first ciphertext Ci and a second ciphertext CD1 from the at least one message; decrypting the first ciphertext Ci with a first key to obtain a random key KR; and decrypting the second ciphertext CD1 using the random key KR to obtain the data D1; wherein the first key is associated with an identity of the given user; and wherein the receiving authorization, receiving the at least one message, extracting, decrypting the first ciphertext and decrypting the second ciphertext are performed by at least one processing device comprising a processor coupled to a memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a memory; and at least one processor coupled to the memory and configured to; receive authorization to obtain at least one message including data D1, wherein the authorization is provided by a resource owner of the at least one message for a given user of the social network; receive the at least one message; extract a first ciphertext Ci and a second ciphertext CD1 from the at least one message; decrypt the first ciphertext Ci with a first key to obtain a random key KR; and decrypt the second ciphertext CD1 using the random key KR to obtain the data D1; wherein the first key is associated with an identity of the given user.
-
-
15. A, method for secure information sharing in a social network, comprising:
-
selecting a random key KR; encrypting data D1 intended to be shared with a set of users of the social network with the random key KR to create a first ciphertext CD1; encrypting the random key KR with a second key to create a second ciphertext Ci; creating a message including both the first and second ciphertexts; and sending the created message to a storage location of the social network; wherein the second key is associated with an identity of at least one of the users in the set of users; wherein the selecting, encrypting data, encrypting the random key, creating and sending are performed by at least one processing device comprising a processor coupled to a memory. - View Dependent Claims (16, 17, 18)
-
-
19. An apparatus comprising:
-
a memory; and at least one processor coupled to the memory and configured to; select a random key KR; encrypt data D1 intended to be shared with a set of users of the social network with the random key KR to create a first ciphertext CD1; encrypt the random key KR with a second key to create a second ciphertext Ci; create a message including both the first and second ciphertexts; and send the created message to a storage location of the social network; wherein the second key is associated with an identity of at least one of the users in the set of users.
-
-
20. A system for secure information sharing in social networks, comprising:
-
a plurality of social network users; and a social network host; a given one of the plurality of social network users being configured to; encrypt data to be shared between a set of one or more other social network users using a random key; generate a set of ciphertexts, each of the ciphertexts being generated by encrypting the random key with a second key corresponding to at least one of the set of other social network users; form a message including the encrypted data and the generated set of ciphertexts; and send the formed message to the social network host; the social network host being configured to; receive and store the formed message; and send the formed message to at least one of the set of other social network users; and each of the set of other social network users being configured to; receive the formed message; extract at least one ciphertext from the formed message; decrypt the at least one ciphertext using a first key corresponding to the second key to obtain the random key; and decrypt data from the formed message using the decrypted random key; wherein the first key and the second key are associated with an identity of at least one of the set of other social network users.
-
Specification