System and method to merge encrypted signals in distributed communication system
First Claim
1. A computer implemented method for data privacy in a distributed communication system, the method comprising:
- storing a plurality of secret keys, each secret key for a respective one of a plurality of client terminals;
identifying a mixer key;
generating a plurality of key switch hints for the client terminals, each of the key switch hints generated for a respective client terminal of the client terminals, using the mixer key and a respective secret key for each respective client terminal;
sending the key switch hints to a mixer;
switching a first encrypted data stream received from a first client terminal of the client terminals to an encrypted output data stream using the key switch hints; and
sending the encrypted output data stream to a receiving client terminal of the client terminals to be decrypted by the receiving client terminal.
2 Assignments
0 Petitions
Accused Products
Abstract
In a computer implemented method for data privacy in a distributed communication system, the method includes: storing a plurality of secret keys, each secret key for a respective one of a plurality of client terminals; identifying a mixer key; generating a plurality of key switch hints for the client terminals, each of the key switch hints generated for a respective client terminal of the client terminals, using the mixer key and a respective secret key for each respective client terminal; sending the key switch hints to a mixer; switching a first encrypted data stream received from a first client terminal of the client terminals to an encrypted output data stream using the key switch hints; and sending the encrypted output data stream to a receiving client terminal of the client terminals to be decrypted by the receiving client terminal.
-
Citations
20 Claims
-
1. A computer implemented method for data privacy in a distributed communication system, the method comprising:
-
storing a plurality of secret keys, each secret key for a respective one of a plurality of client terminals; identifying a mixer key; generating a plurality of key switch hints for the client terminals, each of the key switch hints generated for a respective client terminal of the client terminals, using the mixer key and a respective secret key for each respective client terminal; sending the key switch hints to a mixer; switching a first encrypted data stream received from a first client terminal of the client terminals to an encrypted output data stream using the key switch hints; and sending the encrypted output data stream to a receiving client terminal of the client terminals to be decrypted by the receiving client terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method for data privacy in a distributed communication system, the method comprising:
-
receiving a plurality of key switch hints, each of the plurality of key switch hints corresponding to a respective one of a plurality of client terminals; receiving a first encrypted data stream from a first client terminal of the client terminals; switching the first encrypted data stream using a first key switch hint of the plurality of key switch hints to generate a first encrypted data representation of the first encrypted data stream; and generating an encrypted output data stream based on the first encrypted data representation. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A distributed communication system comprising a plurality of client terminals communicating through a communication hub, the communication hub comprising:
-
an input port for receiving a plurality of key switch hints and a plurality of encrypted data streams, wherein each of the key switch hints and each of the encrypted data streams correspond to a respective one of the client terminals; a first switching circuit coupled to the input port for generating an encrypted data representation of each of the encrypted data streams using a corresponding one of the key switch hints; and an output terminal coupled to the switching circuit for generating output encrypted data streams based on the encrypted data representation of each of the encrypted data streams. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification