发明名称 Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
摘要 An embodiment of the present invention provides a computer implemented method for the transfer of private information of one user to another user—a primitive known as Oblivious Transfer. An output from a strong pseudorandom function generation (SPRFG) is calculated by a first user's computing module based on first and second parameters: the first parameter specifying one of two secret keys; the second parameter being a value selected within the domain of the SPRFG by the first user. The first user is prevented from reading or learning the stored two secret keys. The output is transmitted to a computer of a second user which generates first and second encrypted values that are each based on an inverse SPRFG calculation using the first and second secret keys, respectively, and corresponding private values of the second user. The encrypted values are sent to a first computer of the first user that calculates one of the private values using a mathematical computation based on the second parameter and the one of the first and second encrypted values that corresponds to the one of the first and second key used.
申请公布号 US8923519(B2) 申请公布日期 2014.12.30
申请号 US200912455193 申请日期 2009.05.29
申请人 Alcatel Lucent 发明人 Kolesnikov Vladimir
分类号 H04L9/08;H04L9/32;H04L9/00;G06F21/60;H04L9/06 主分类号 H04L9/08
代理机构 Carmen Patti Law Group, LLC 代理人 Carmen Patti Law Group, LLC
主权项 1. A computer implemented method for the transfer of private information comprising the steps of: receiving at a first computing module of a first computer of a first user a request to compute a function based on strong pseudorandom function generation (SPRFG) with first and second parameters being associated with the request, where the second parameter is a value selected within the domain of the SPRFG by the first user; calculating an output by the first computing module of the SPRFG function based on the first and second parameters, where the first parameter specifies one of two secret keys stored in the computing module that is used in the calculation of the SPRFG function, the first computing module preventing the first user from reading or learning the stored two secret keys; transmitting the output to a second computer of a second user; receiving, from the second computer, first and second encrypted values that are each based on an inverse SPRFG calculation using the first and second secret keys, respectively, and respective first and second private values of the second user, the secret keys being known to the second user; calculating, by a first computer coupled to the computing module, one of the first and second private values using a mathematical computation based on the second parameter and one of the first and second encrypted values.
地址 Boulogne-Billancourt FR