Secure Key Transmission Protocol without Certificates or Pre-shared Symmetrical Keys

    公开(公告)号:US20190089530A1

    公开(公告)日:2019-03-21

    申请号:US15711797

    申请日:2017-09-21

    Abstract: A method for securely receiving a cipher key from a key provider to a key requester is provided. The method includes generating a session key shared between the key requester and the key provider, determining at least one key in accordance with the session key. The method also includes transmitting a request from the key requester to the key provider, and receiving a response from the key provider, where the response comprises an encrypted payload and an authentication tag. The method also includes authenticating the response and decrypting the encrypted payload using the at least one key to obtain the cipher key.

    Systems, devices, and methods for hybrid secret sharing

    公开(公告)号:US11063754B2

    公开(公告)日:2021-07-13

    申请号:US15968430

    申请日:2018-05-01

    Abstract: Systems, devices, and methods for hybrid secret sharing are disclosed. In accordance with embodiments, a computing device may encrypt the secret message using a first encryption key to generate an encrypted secret message. The computing device may also split a second encryption key into a plurality of key shares in accordance with a threshold number. The threshold number is less than or equal to the number of the plurality of key shares. Then, the computing device may transmit a plurality of messages. Each message of the plurality of messages comprises the encrypted secret message and one of the plurality of key shares.

    Verifiable Encryption Based on Trusted Execution Environment

    公开(公告)号:US20200028693A1

    公开(公告)日:2020-01-23

    申请号:US16037789

    申请日:2018-07-17

    Inventor: Teng Wu Yin Tan

    Abstract: A method for verifying a property of plaintext using ciphertext is disclosed. In an embodiment, a computing device may receive the ciphertext at a trusted execution environment (TEE) of the computing device. The TEE may decrypt the ciphertext to generate the plaintext using a private encryption key of an encryption key pair. The encryption key pair comprises a public encryption key and the private encryption key. The TEE may generate a digitally signed validation result by encrypting the validation result using a private signing key of a signing key pair. The signed key pair comprises a public signing key and the private signing key. The private key is retrieved from secure memory of the computing device, and the secure memory may only be accessible by the TEE. The computing device may then transmit the digitally signed validation result.

    Systems, Devices, and Methods for Hybrid Secret Sharing

    公开(公告)号:US20190342080A1

    公开(公告)日:2019-11-07

    申请号:US15968430

    申请日:2018-05-01

    Abstract: Systems, devices, and methods for hybrid secret sharing are disclosed. In accordance with embodiments, a computing device may encrypt the secret message using a first encryption key to generate an encrypted secret message. The computing device may also split a second encryption key into a plurality of key shares in accordance with a threshold number. The threshold number is less than or equal to the number of the plurality of key shares. Then, the computing device may transmit a plurality of messages. Each message of the plurality of messages comprises the encrypted secret message and one of the plurality of key shares.

    Secure key transmission protocol without certificates or pre-shared symmetrical keys

    公开(公告)号:US10567165B2

    公开(公告)日:2020-02-18

    申请号:US15711797

    申请日:2017-09-21

    Abstract: A method for securely receiving a cipher key from a key provider to a key requester is provided. The method includes generating a session key shared between the key requester and the key provider, determining at least one key in accordance with the session key. The method also includes transmitting a request from the key requester to the key provider, and receiving a response from the key provider, where the response comprises an encrypted payload and an authentication tag. The method also includes authenticating the response and decrypting the encrypted payload using the at least one key to obtain the cipher key.

Patent Agency Ranking