METHODS FOR PROTECTING PRIVACY

user-5f8cf7e04c775ec6fa691c92(2020)

引用 0|浏览132
暂无评分
摘要
A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
更多
查看译文
关键词
Secret sharing,Encryption,Public-key cryptography,Pseudorandom function family,Computer security,Computer science,Computing systems,Secret share,Threshold number
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要