System and method for operating on streaming encrypted data
First Claim
1. A computer implemented method for data privacy in a distributed communication system, the method comprising:
- receiving first encrypted data from a first client terminal, the first encrypted data having a first data representation, including a first cyphertext ring dimension;
receiving second encrypted data from a second client terminal, the second encrypted data having a second data representation, including a second cyphertext ring dimension, different than the first data representation;
analyzing the first and second data representations, respectively including the first and second cyphertext ring dimensions, to determine a first data rate for the first encrypted data and a second data rate for the second encrypted data and to determine a common data representation, including a common cyphertext ring dimension for both the first and second encrypted data;
translating the first and second encrypted data to a shared data representation having the same cyphertext ring dimension, using said common data representation including said common data rate;
performing data operations on the first encrypted data and second encrypted data having the common data representation to generate a first operated encrypted data and a second operated encrypted data having the shared data representation, respectively;
reverting the first operated encrypted data back to said first data representation including said first cyphertext ring dimension and sending a reverted first encrypted data to the first client terminal for decryption by the first client terminal; and
reverting the second operated encrypted data back to said second data representation including said second cyphertext ring dimension and sending a reverted second encrypted data to the second client terminal for decryption by the second client terminal, wherein the common data representation is a constant common ring dimension that does not vary with the first and second encrypted data.
2 Assignments
0 Petitions
Accused Products
Abstract
Method for data privacy in a distributed communication system includes: receiving first and second encrypted data from first and second client terminals, each having a different data representation; analyzing the first and second data representations to determine a common data representation; translating the first and second encrypted data to a shared data representation using the common data representation; performing operations on the first encrypted data and second encrypted data to generate a first and second operated encrypted data; reverting the first operated encrypted data back to said first data representation and sending the reverted first encrypted date to the first client terminal for decryption by the first client terminal; and reverting the second operated encrypted data back to said second data representation and sending the reverted second encrypted date to the second client terminal for decryption by the second client terminal.
25 Citations
15 Claims
-
1. A computer implemented method for data privacy in a distributed communication system, the method comprising:
-
receiving first encrypted data from a first client terminal, the first encrypted data having a first data representation, including a first cyphertext ring dimension; receiving second encrypted data from a second client terminal, the second encrypted data having a second data representation, including a second cyphertext ring dimension, different than the first data representation; analyzing the first and second data representations, respectively including the first and second cyphertext ring dimensions, to determine a first data rate for the first encrypted data and a second data rate for the second encrypted data and to determine a common data representation, including a common cyphertext ring dimension for both the first and second encrypted data; translating the first and second encrypted data to a shared data representation having the same cyphertext ring dimension, using said common data representation including said common data rate; performing data operations on the first encrypted data and second encrypted data having the common data representation to generate a first operated encrypted data and a second operated encrypted data having the shared data representation, respectively; reverting the first operated encrypted data back to said first data representation including said first cyphertext ring dimension and sending a reverted first encrypted data to the first client terminal for decryption by the first client terminal; and reverting the second operated encrypted data back to said second data representation including said second cyphertext ring dimension and sending a reverted second encrypted data to the second client terminal for decryption by the second client terminal, wherein the common data representation is a constant common ring dimension that does not vary with the first and second encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A data mixer system for data privacy in a distributed communication system comprising:
-
a first input port for receiving first encrypted data from a first client terminal, the first encrypted data having a first data representation, including a first cyphertext ring dimension; a second input port for receiving second encrypted data from a second client terminal, the second encrypted data having a second data representation, including a second cyphertext ring dimension, different than the first data representation; a selector circuit for analyzing the first and second data representations including the first and second cyphertext ring dimensions, to determine a first data rate for the first encrypted data and a second data rate for the second encrypted data and to determine a common data representation, including a common cyphertext ring dimension for both the first and second encrypted data; a first and a second homogenizers for translating the first and second encrypted data to a shared data representation having the same cyphertext ring dimension, using said common data representation including said common data rate; an operational circuit for performing data operations on the first encrypted data and second encrypted data having the common data representation to generate a first operated encrypted data and a second operated encrypted data having the shared data representation, respectively; a first reverter for reverting the first operated encrypted data back to said first data representation including said first cyphertext ring dimension and sending a reverted first encrypted data to the first client terminal for decryption by the first client terminal, respectively; and a second reverter for reverting the second operated encrypted data back to said second data representation including said second cyphertext ring dimension and sending a reverted second encrypted data to the second client terminal for decryption by the second client terminal, wherein the common data representation is a constant common ring dimension that does not vary with the first and second encrypted data. - View Dependent Claims (13, 14, 15)
-
Specification