-
公开(公告)号:US20240204991A1
公开(公告)日:2024-06-20
申请号:US18590514
申请日:2024-02-28
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M.M. Yung , Gang Wang , Karn Seth , Mariana Raykova , Benjamin R. Kreuter , Ananth Raghunathan
CPC classification number: H04L9/085 , H04L9/0869 , H04L9/32 , H04L2209/50
Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
-
公开(公告)号:US11962687B2
公开(公告)日:2024-04-16
申请号:US17298893
申请日:2019-12-04
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M. M. Yung , Gang Wang , Karn Seth , Mariana Raykova , Benjamin R. Kreuter , Ananth Raghunathan
CPC classification number: H04L9/085 , H04L9/0869 , H04L9/32 , H04L2209/50
Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
-