×

Iterative data secret-sharing transformation

  • US 9,124,423 B2
  • Filed: 05/14/2010
  • Issued: 09/01/2015
  • Est. Priority Date: 05/14/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of operations by a processor, the operations, comprising:

  • receiving an input stream of bits of data;

    secret-sharing transforming the received bits of the input stream of data into pairs of secret-sharing bits, said secret-sharing transforming including splitting each received bit of the bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits of said pairs of secret-sharing bits wherein said splitting includes computing each bit of the pair of secret-sharing bits split from the received bit using the exclusive-OR function wherein the received bit is the exclusive-OR function of the pair of secret sharing bits split from the received bit; and

    separating the secret-sharing bits of each pair of secret-sharing bits into separate streams of secret-sharing bits so that one secret-sharing bit of each pair of secret-sharing bits is in one stream of secret-sharing bits and the other secret-sharing bit of each pair is in another stream of secret-sharing bits different from the one stream of secret-sharing bits;

    wherein the splitting is a function of the exclusive-OR function such that a first received bit of the input stream of bits is equal to the exclusive-OR function of a first associated pair of secret-sharing bits, one secret-sharing bit being in the one stream of secret-sharing bits, and the other secret-sharing bit of the first associated pair being in the other stream of secret-sharing bits, and a second received bit of the input stream of bits is equal to the exclusive-OR function of a second associated pair of secret-sharing bits, one secret-sharing bit of the second associated pair being in the one stream of secret-sharing bits of data, and the other secret-sharing bit of the second associated pair being in the other stream of secret-sharing bits, and wherein one bit is a secret-sharing bit of both the first associated pair of secret-sharing bits and the second associated pair of secret-sharing bits so that the total number of secret-sharing bits of the first and second associated pairs of secret-sharing bits is three secret-sharing bits and wherein the separating of the three secret-sharing bits of the first and second associated pairs of secret-sharing bits, includes placing the shared secret-sharing bit in one stream of secret-sharing bits, and placing the other two secret-sharing bits of the three secret-sharing bits in one or more streams of secret-sharing bits different from the one stream of the shared secret-sharing bit; and

    wherein the input stream of bits has N bits, and wherein the splitting of each received bit of the N bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits, is performed iteratively, to generate a total of N+1 secret-sharing bits from the input stream of bits N bits.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×