SECURE COMPUTATION OF PRIVATE VALUES
First Claim
1. A system comprising:
- a hardware-based processing unit toencrypt a private value of a party with a public-key encryption system and a public key to generate an encrypted private value anddecrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and
a communication unit tosend the encrypted private value to a further party,receive the encrypted blinded result of a function, the function having, as input the private value, andsend the blinded result to the further party.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment may include a system having a communication unit and a processing unit. The communication unit may be configured to receive an encrypted private value of a party, the encrypted private value being generated from a private value with a public-key encryption system and a public key, to send an encrypted blinded result to the party, and to receive a blinded result generated from the encrypted blinded result. The processing unit may be configured to compute a result of a function, the function having as input the private value, to blind the result of the function to generate the encrypted blinded result, and to compute the result by unblinding the blinded result.
25 Citations
34 Claims
-
1. A system comprising:
-
a hardware-based processing unit to encrypt a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and decrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and a communication unit to send the encrypted private value to a further party, receive the encrypted blinded result of a function, the function having, as input the private value, and send the blinded result to the further party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a communication unit to receive an encrypted private value of a party, the encrypted private value being generated from a private value with a public-key encryption system and a public key, send an encrypted blinded result to the party, and receive a blinded result generated from the encrypted blinded result; and a hardware-based processing unit to compute a result of a function, the function having as input the private value, blind the result of the function to generate the encrypted blinded result, and compute the result by unblinding the blinded result. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
encrypting, using a hardware-based processing unit of a first device, a private value of a party with a public-key encryption system and a public key to generate an encrypted private value; sending the encrypted private value to a further party at a second device; receiving an encrypted blinded result of a function, the function having as input the private value; decrypting the encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and sending the blinded result to the further party. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
receiving an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key; computing a result of a function, the function having as input the private value; blinding the result of the function to generate an encrypted blinded result; sending the encrypted blinded result to the party; receiving a blinded result generated from the encrypted blinded result; and computing, using a hardware-based processing unit, the result of the function by blinding the blinded result. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory machine-readable medium storing instruction, which when executed by a processing unit, performs an operation comprising:
-
encrypting a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and to decrypt an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; sending the encrypted private value to a further party; receiving the encrypted blinded result of a function, the function having as input the private value; and sending the blinded result to the further party.
-
-
32. A non-transitory machine-readable medium storing instruction, which when executed by a processing unit, performs an operation comprising:
-
receiving an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key; sending an encrypted blinded result to the party, and to receive a blinded result generated from the encrypted blinded result; computing a result of a function, the function having as input the private value; blinding the result of the function to generate the encrypted blinded result; and computing the result by unblinding the blinded result.
-
-
33. A participant system comprising:
-
means for encrypting a private value of a party with a public-key encryption system and a public key to generate an encrypted private value and for decrypting an encrypted blinded result with the public-key encryption system and a private key to generate a blinded result; and means for sending the encrypted private value to a further party, for receiving the encrypted blinded result of a function, the function having as input the private value, and for sending the blinded result to the further party.
-
-
34. A platform provider system comprising:
-
means for receiving an encrypted private value of a party, the encrypted private value generated from a private value with a public-key encryption system and a public key, for sending an encrypted blinded result to the party, and for receiving a blinded result generated from the encrypted blinded result; and means for computing a result of a function, the function having as input the private value, for blinding the result of the function to generate the encrypted blinded result, and for computing the result by unblinding the blinded result.
-
Specification