×

System and method for merging encryption data using circular encryption key switching

  • US 9,325,671 B2
  • Filed: 02/19/2014
  • Issued: 04/26/2016
  • Est. Priority Date: 02/19/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for data privacy in a distributed communication system, in which a plurality of client terminals are arranged in a ring configuration, the method comprising:

  • receiving by a first client terminal of the plurality of client terminals, a second public key from a second client terminal of the plurality of client terminals;

    generating a second key switch hint for the second client terminal, by the first client terminal, using the second public key and a first private key of the first client terminal;

    transmitting the second key switch hint and first encryption data from the first client terminal to a mixer;

    receiving by the second client terminal, a third public key from a third client terminal of the plurality of client terminals;

    generating a third key switch hint for the third client terminal, by the second client terminal, using the third public key and a second private key of the second client terminal;

    transmitting the third key switch hint and second encryption data from the second client terminal to the mixer;

    receiving by the third client terminal, a first public key from the first client terminal;

    generating a first key switch hint for the first client terminal, by the third client terminal, using the first public key and a first private key of the first client terminal;

    transmitting the first key switch hint and third encryption data from the third client terminal to the mixer;

    using, by the mixer, the second key switch hint and the first encrypted data from the first client terminal to switch the first encrypted data to generate a first switched encrypted data;

    adding the encrypted data representation for the second client terminal to the second encryption data from the second client terminal to output a first summed data encryption;

    using, by the mixer, the third key switch hint and the first summed data encryption to switch the first summed data encryption to generate a second switched encrypted data;

    adding the second switched encrypted data to the third encryption data from the third client terminal to output a third encryption data representation for the third client terminal; and

    sending the third encryption data representation to the third client terminal to be decrypted by the third client terminal.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×