Iterative data secret-sharing transformation
First Claim
1. A method, comprising:
- receiving an input stream of bits of data;
secret-sharing transforming the received bits of the input stream of data, said secret-sharing transforming including splitting each received bit of the bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits; and
separating the secret-sharing bits of each pair of secret-sharing bits into separate streams of secret-sharing bits so that one secret-sharing bit of each pair of secret-sharing bits is in one stream of secret-sharing bits and the other secret-sharing bit of each pair is in another stream of secret-sharing bits different from the one stream of secret-sharing bits and wherein a secret sharing bit is shared by adjacent pairs of secret sharing bits, wherein the separating the streams of secret-sharing bits includes storing the plurality of streams of secret-sharing bits of data on separate storage media at separate locations so that the secret sharing bits of each of said pairs of secret sharing bits are stored on different storage media at different locations.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel. In another aspect, for an input stream of N bits, each received bit of the N bits of the input stream of data, may be interatively split, on a bit by bit basis, into a pair of secret-sharing bits, to generate as few as N+1 secret-sharing bits from the input stream of bits N bits. Other features and aspects may be realized, depending upon the particular application.
25 Citations
17 Claims
-
1. A method, comprising:
-
receiving an input stream of bits of data; secret-sharing transforming the received bits of the input stream of data, said secret-sharing transforming including splitting each received bit of the bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits; and separating the secret-sharing bits of each pair of secret-sharing bits into separate streams of secret-sharing bits so that one secret-sharing bit of each pair of secret-sharing bits is in one stream of secret-sharing bits and the other secret-sharing bit of each pair is in another stream of secret-sharing bits different from the one stream of secret-sharing bits and wherein a secret sharing bit is shared by adjacent pairs of secret sharing bits, wherein the separating the streams of secret-sharing bits includes storing the plurality of streams of secret-sharing bits of data on separate storage media at separate locations so that the secret sharing bits of each of said pairs of secret sharing bits are stored on different storage media at different locations. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a non-transitory computer readable storage medium storing computer readable program code that, when executed on a processor of a computer, causes the computer to perform operations, comprising:
-
receiving an input stream of bits of data; secret-sharing transforming the received bits of the input stream of data, said secret-sharing transforming including splitting each received bit of the bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits; and separating the secret-sharing bits of each pair of secret-sharing bits into a plurality of separate streams of secret-sharing bits so that one secret-sharing bit of each pair of secret-sharing bits is in one stream of secret-sharing bits and the other secret-sharing bit of each pair is in another stream of secret-sharing bits different from the one stream of secret-sharing bits and wherein a secret sharing bit is shared by adjacent pairs of secret sharing bits, wherein the separating the streams of secret-sharing bits includes storing the plurality of streams of secret-sharing bits of data on separate storage media at separate locations so that the secret sharing bits of each of said pairs of secret sharing bits are stored on different storage media at different location. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a plurality of separate storage media at separate locations; a data input; and a processing unit adapted to transform for secret-sharing bits of an input stream of data received at the data input, said processing unit including a data splitter adapted to split each received bit of the bits of the input stream of data, on a bit by bit basis, into a pair of secret-sharing bits, and a data separator adapted to separate the secret-sharing bits of each pair of secret-sharing bits into separate streams of secret-sharing bits so that one secret-sharing bit of each pair of secret-sharing bits is in one stream of secret-sharing bits and the other secret-sharing bit of each pair is in another stream of secret-sharing bits different from the one stream of secret-sharing bits and wherein a secret sharing bit is shared by adjacent pairs of secret sharing bits, and wherein the processing unit data separator is further adapted to store the plurality of streams of secret-sharing bits of data on said separate storage media at separate locations so that the secret sharing bits of each of said pairs of secret sharing bits are stored on different storage media at different locations. - View Dependent Claims (16, 17)
-
Specification