Resharing of a split secret
First Claim
Patent Images
1. A processor-based method for secret sharing in a computing system, comprising:
- encrypting, by an encryption/decryption unit, shares of a new secret, using a previous secret;
distributing unencrypted shares of the new secret and the encrypted shares of the new secret, to members of the computing system;
decrypting, by the encryption/decryption unit, at least a subset of the encrypted shares of the new secret, using the previous secret; and
regenerating the new secret from at least a subset of a combination of the unencrypted shares of the new secret and the decrypted shares of the new secret, wherein each member of the computing system receives an unencrypted share of the new secret and an encrypted, differing share of the new secret.
1 Assignment
0 Petitions
Accused Products
Abstract
A processor-based method for secret sharing in a computing system is provided. The method includes encrypting shares of a new secret, using a previous secret and distributing unencrypted shares of the new secret and the encrypted shares of the new secret, to members of the computing system. The method includes decrypting at least a subset of the encrypted shares of the new secret, using the previous secret and regenerating the new secret from at least a subset of a combination of the unencrypted shares of the new secret and the decrypted shares of the new secret.
276 Citations
19 Claims
-
1. A processor-based method for secret sharing in a computing system, comprising:
-
encrypting, by an encryption/decryption unit, shares of a new secret, using a previous secret; distributing unencrypted shares of the new secret and the encrypted shares of the new secret, to members of the computing system; decrypting, by the encryption/decryption unit, at least a subset of the encrypted shares of the new secret, using the previous secret; and regenerating the new secret from at least a subset of a combination of the unencrypted shares of the new secret and the decrypted shares of the new secret, wherein each member of the computing system receives an unencrypted share of the new secret and an encrypted, differing share of the new secret. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible, non-transitory, computer-readable media having instructions thereupon which, when executed by a processor, cause the processor to perform a method comprising:
-
encrypting, with a previous secret, shares of a new secret; distributing encrypted shares and unencrypted shares of the new secret; decrypting, with the previous secret, available encrypted shares of the new secret; and reproducing the new secret from at least a subset of available unencrypted shares of the new secret and the decrypted shares of the new secret, wherein each member of the computing system receives an unencrypted share of the new secret and an encrypted, differing share of the new secret. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing system with a shared secret, comprising:
-
a secret generator, configured to generate and regenerate secrets; a share splitter, configured to split a secret into a plurality of shares; an encryption/decryption unit, configured to encrypt and decrypt; and one or more processors, configured to perform actions comprising; encrypting shares of a second secret, using a first secret and the encryption/decryption unit; sending encrypted shares and unencrypted shares of the second secret to members of the computing system; decrypting at least a subset of the encrypted shares of the second secret, using the encryption/decryption unit and the first secret; and regenerating the second secret, using the secret generator and unencrypted shares and decrypted shares of the second secret, wherein each member of the computing system receives an unencrypted share of the second secret and an encrypted, differing share of the second secret. - View Dependent Claims (17, 18, 19)
-
Specification