METHODS FOR PROTECTING PRIVACY

A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing...

Full description

Saved in:
Bibliographic Details
Main Authors Kreuter, Benjamin R, Wang, Gang, Raghunathan, Ananth, Raykova, Mariana, Seth, Karn, Patel, Sarvar, Yung, Marcel M.M
Format Patent
LanguageEnglish
Published 20.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
Bibliography:Application Number: US202418590514