System and method for merging encryption data using circular encryption key switching
First Claim
Patent Images
1. A computer implemented method for data privacy in a distributed communication system, in which a plurality of client terminals are arranged in a ring configuration, the method comprising:
- receiving by a first client terminal of the plurality of client terminals, a second public key from a second client terminal of the plurality of client terminals;
generating a second key switch hint for the second client terminal, by the first client terminal, using the second public key and a first private key of the first client terminal;
transmitting the second key switch hint and first encryption data from the first client terminal to a mixer;
receiving by the second client terminal, a third public key from a third client terminal of the plurality of client terminals;
generating a third key switch hint for the third client terminal, by the second client terminal, using the third public key and a second private key of the second client terminal;
transmitting the third key switch hint and second encryption data from the second client terminal to the mixer;
receiving by the third client terminal, a first public key from the first client terminal;
generating a first key switch hint for the first client terminal, by the third client terminal, using the first public key and a first private key of the first client terminal;
transmitting the first key switch hint and third encryption data from the third client terminal to the mixer;
using, by the mixer, the second key switch hint and the first encrypted data from the first client terminal to switch the first encrypted data to generate a first switched encrypted data;
adding the encrypted data representation for the second client terminal to the second encryption data from the second client terminal to output a first summed data encryption;
using, by the mixer, the third key switch hint and the first summed data encryption to switch the first summed data encryption to generate a second switched encrypted data;
adding the second switched encrypted data to the third encryption data from the third client terminal to output a third encryption data representation for the third client terminal; and
sending the third encryption data representation to the third client terminal to be decrypted by the third client terminal.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for data privacy in a distributed communication system, in which a plurality of client terminals are arranged in a ring configuration merges encrypted streaming data using circular encryption key switching and without sharing any private keys in a distributed communication system. The merged data is then sent to client terminals to be further process by respective client terminals.
19 Citations
20 Claims
-
1. A computer implemented method for data privacy in a distributed communication system, in which a plurality of client terminals are arranged in a ring configuration, the method comprising:
-
receiving by a first client terminal of the plurality of client terminals, a second public key from a second client terminal of the plurality of client terminals; generating a second key switch hint for the second client terminal, by the first client terminal, using the second public key and a first private key of the first client terminal; transmitting the second key switch hint and first encryption data from the first client terminal to a mixer; receiving by the second client terminal, a third public key from a third client terminal of the plurality of client terminals; generating a third key switch hint for the third client terminal, by the second client terminal, using the third public key and a second private key of the second client terminal; transmitting the third key switch hint and second encryption data from the second client terminal to the mixer; receiving by the third client terminal, a first public key from the first client terminal; generating a first key switch hint for the first client terminal, by the third client terminal, using the first public key and a first private key of the first client terminal; transmitting the first key switch hint and third encryption data from the third client terminal to the mixer; using, by the mixer, the second key switch hint and the first encrypted data from the first client terminal to switch the first encrypted data to generate a first switched encrypted data; adding the encrypted data representation for the second client terminal to the second encryption data from the second client terminal to output a first summed data encryption; using, by the mixer, the third key switch hint and the first summed data encryption to switch the first summed data encryption to generate a second switched encrypted data; adding the second switched encrypted data to the third encryption data from the third client terminal to output a third encryption data representation for the third client terminal; and sending the third encryption data representation to the third client terminal to be decrypted by the third client terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A distributed communication system, in which a plurality of client terminals are arranged in a ring configuration, comprising:
-
a mixer to performing operation on encrypted data streams; a first client terminal for receiving a second public key from a second client terminal;
generating a second key switch hint for the second client terminal, using the second public key and a first private key of the first client terminal; and
transmitting the second key switch hint and first encryption data from the first client terminal to the mixer,wherein the second client terminal receives a third public key from a third client terminal;
generates a third key switch hint for the third client terminal, using the third public key and a second private key of the second client terminal; and
transmits the third key switch hint and second encryption data to the mixer,wherein the third client terminal receives a first public key from the first client terminal;
generates a first key switch hint for the first client terminal, using the first public key and a first private key of the first client terminal; and
transmits the first key switch hint and third encryption data to the mixer,wherein the mixer uses the second key switch hint and the first encrypted data from the first client terminal to switch the first encrypted data to generate a first switched encrypted data; and
adds the encrypted data representation for the second client terminal to the second encryption data from the second client terminal to output a first summed data encryption, andwherein the mixer uses the third key switch hint and the first summed data encryption to switch the first summed data encryption to generate a second switched encrypted data;
adds the second switched encrypted data to the third encryption data from the third client terminal to output a third encryption data representation for the third client terminal; and
sends the third encryption data representation to the third client terminal to be decrypted by the third client terminal. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification