×

Key generation using multiple sets of secret shares

  • US 9,106,407 B2
  • Filed: 04/23/2012
  • Issued: 08/11/2015
  • Est. Priority Date: 06/20/2011
  • Status: Active Grant
First Claim
Patent Images

1. A cryptographic method, comprising:

  • providing, by a processor, a meta-secret used both to generate a first plurality of cryptographic keys and a second plurality of different sets of secret-shares, each of the cryptographic keys being associated with a respective key identifier, the meta-secret being a secret data structure including an ordered sequence of data values;

    generating, by the processor, each one of the cryptographic keys as a function of the meta-secret and the respective key identifier of the one cryptographic key;

    creating, using the meta-secret, by the processor, the second plurality of different sets of secret-shares, which are capable;

    by combining all the secret-shares in any one of the sets together with the respective key identifier without knowledge of the meta-secret, of generating the associated cryptographic key;

    by combining all the secret-shares in any one of the sets together with a first key identifier without knowledge of the meta-secret, of generating a first cryptographic key; and

    by combining all the secret-shares in any one of the sets together with a second key identifier without knowledge of the meta-secret, of generating a second cryptographic key;

    wherein combining all the secret-shares in any one of the sets together with a different key identifier without knowledge of the meta-secret generates a different cryptographic key;

    performing, by the processor, cryptographic operations using the cryptographic keys, wherein performing the cryptographic operations comprises encrypting an item of data using the first cryptographic key; and

    distributing the sets of secret-shares over a network to different respective subscribers, using a network interface, wherein the different respective subscribers are operative to;

    combine the received secret-shares together with the respective key identifier without knowledge of the meta-secret to generate the first cryptographic key; and

    decrypt the item of data using the first cryptographic key, wherein the secret-shares in one of the sets are decrypted following a process of authentication so that the secret-shares can be used to generate the first cryptographic key so as to decrypt the item of data only after the authentication.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×