METHOD AND SYSTEM FOR COMMUNICATING A SECRET
20230179408 · 2023-06-08
Inventors
Cpc classification
H04L9/085
ELECTRICITY
H04L9/3066
ELECTRICITY
H04L9/0825
ELECTRICITY
H04L9/3013
ELECTRICITY
H04L9/3218
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
H04L9/30
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
A method of communicating a secret (k.sub.0, k.sub.1) on the Bitcoin blockchain is disclosed. The method comprises sending information identifying secrets selectable by the recipient and receiving a first public key (U.sub.i) of an elliptic curve cryptography system, corresponding to a first secret (S.sub.i) selected for access by the recipient and for which a first private key (m) is accessible to the recipient. A second public key (U.sub.1-i) is received, corresponding to a second secret not selected for access by the recipient, wherein a corresponding second private key is not available to the recipient. First and second secrets encrypted by means of the respective first and second public keys (X.sub.0, X.sub.1) are sent to the recipient, wherein the first secret is accessible to the recipient by means of the first private key, the second secret is inaccessible to the recipient, and the sender is unable to distinguish between the first and second secrets.
Claims
1-34. (canceled)
35. A method of communicating at least one secret from a sender to a recipient, the method comprising: sending, from the sender to the recipient, information identifying a plurality of secrets selectable by the recipient; generating a third secret, to be shared between the sender and the recipient, from master keys held by the sender and recipient; receiving, at the sender, from the recipient, at least one first public key, corresponding to a respective first the secret selected for access by the recipient, wherein the first public key is part of a public key/private key pair of an elliptic curve cryptography system and a first private key corresponding to the first public key is accessible to the recipient; receiving, at the sender, from the recipient, at least one second public key, corresponding to a respective second the secret not selected for access by the recipient, wherein the at least one second public key is a public key of the elliptic curve cryptography system and a respective second private key, corresponding to the second public key, is not available to the recipient, wherein the at least one second public key is based on a corresponding first public key/private key pair and the third secret; sending, from the sender to the recipient, a first secret encrypted by means of the corresponding first public key; and sending, from the sender to the recipient, a second secret encrypted by means of the corresponding second public key, wherein the first secret is accessible to the recipient by means of the corresponding first private key, the second secret is inaccessible to the recipient, and the sender is unable to distinguish between the first secret and the second secret.
36. The method according to claim 35, further comprising encrypting the first secret by means of the corresponding first public key and encrypting the second secret by means of the corresponding second public key.
37. The method according to claim 35, wherein the first secret is encrypted by means of a respective third public key containing a respective first masking term comprising a result of scalar multiplication, by a respective first masking integer, known to the sender, of an elliptic curve generator point of the elliptic curve cryptography system, added to a respective first encryption term by means of elliptic curve point addition.
38. The method according to claim 37, wherein the respective first encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective third encryption integer dependent on the corresponding first public key.
39. The method according to claim 38, wherein the respective third encryption integer is a hash value of the corresponding first public key.
40. The method according to claim 37, wherein the second secret is encrypted by means of a respective fourth public key containing a respective second masking term comprising a result of scalar multiplication, by a respective second masking integer, known to the sender, of the elliptic curve generator point of the elliptic curve cryptography system, added to a respective second encryption term by means of elliptic curve point addition.
41. The method according to claim 40, wherein the respective second encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective fourth encryption integer dependent on the corresponding second public key.
42. The method according to claim 41, wherein the respective fourth encryption integer is a hash value of the corresponding second public key.
43. The method according to claim 35, wherein a result of scalar multiplication of the at least one first public key by the second private key is equal to a result of scalar multiplication of a respective second public key by a respective first private key.
44. The method according to claim 35, wherein the first private key is derived deterministically from a private key of the elliptic curve cryptography system known to the sender.
45. A method of receiving at least one secret sent from a sender to a recipient, the method comprising: receiving, at the recipient, information identifying a plurality of secrets selectable by the recipient; generating a third secret, to be shared between the sender and the recipient, from master keys held by the sender and recipient; sending, to the sender, from the recipient, at least one first public key, corresponding to a respective first the secret selected for access by the recipient, wherein the first public key is part of a public key/private key pair of an elliptic curve cryptography system and a first private key corresponding to the first public key is accessible to the recipient, wherein at least one second public key is based on a corresponding first public key/private key pair and the third secret; sending, to the sender, from the recipient, the at least one second public key, corresponding to a respective second the secret not selected for access by the recipient, wherein the at least one second public key is a public key of the elliptic curve cryptography system and a respective second private key, corresponding to the second public key, is not available to the recipient; receiving, at the recipient from the sender, a first secret encrypted by means of the corresponding first public key; and receiving, at the recipient from the sender, a second secret encrypted by means of the corresponding second public key, wherein the first secret is accessible to the recipient by means of the corresponding first private key, the second secret is inaccessible to the recipient, and the sender is unable to distinguish between the first secret and the second secret.
46. The method according to claim 45, wherein the first secret is encrypted by means of a respective third public key containing a respective first masking term comprising a result of scalar multiplication, by a respective first masking integer, known to the sender, of an elliptic curve generator point of the elliptic curve cryptography system, added to a respective first encryption term by means of elliptic curve point addition.
47. The method according to claim 46, wherein the respective first encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective third encryption integer dependent on the corresponding first public key.
48. The method according to claim 47, wherein the respective third encryption integer is a hash value of the corresponding first public key.
49. The method according to claim 46, wherein the second secret is encrypted by means of a respective fourth public key containing a respective second masking term comprising a result of scalar multiplication, by a respective second integer, known to the sender, of the elliptic curve generator point of the elliptic curve cryptography system, added to a respective second encryption term by means of elliptic curve point addition.
50. The method according to claim 49, wherein the respective second encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective fourth encryption integer dependent on the corresponding second public key.
51. The method according to claim 50, wherein the respective fourth encryption integer is a hash value of the corresponding second public key.
52. The method according to claim 45, wherein a result of scalar multiplication of the at least one first public key by the second private key is equal to a result of scalar multiplication of a respective second public key by a respective first private key.
53. The method according to claim 45, wherein the first private key is derived deterministically from a private key of the elliptic curve cryptography system known to the sender.
54. A computer-implemented system arranged to carry out the method according to claim 45.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0034] Various embodiments in accordance with the present disclosure will be described with reference to the drawings, in which:
[0035]
[0036]
[0037]
[0038]
[0039]
DESCRIPTION OF EMBODIMENTS
[0040] Referring to
[0041] The process starts by Alice and Bob setting up the curve parameters for an elliptic curve cryptography (ECC)/elliptic curve digital signature algorithm (ECDSA) system (such as with Bitcoin).
[0042] From the ECDSA mechanism
d.sub.AQ.sub.B=d.sub.Ad.sub.BG=d.sub.Bd.sub.AG=d.sub.BQ.sub.A
[0043] Where Alice computes a point.
(x.sub.k,y.sub.k)=d.sub.AQ.sub.B
[0044] And Bob computes a point.
(x.sub.k,y.sub.k)=d.sub.BQ.sub.A
[0045] x.sub.K is a shared secret.
[0046] d.sub.A and d.sub.B are Alice and Bob's private keys respectively.
[0047] Q.sub.A and Q.sub.B are the respective Public keys.
[0048] From this basic algorithm a method can be created to exchange a pair of numbers. This logic can be repeated log.sub.2 (n) times to select one of n values. This is done by ensuring that only one pair of keys exchanged is valid.
[0049] This first step allows Alice to select one and only one value from 2 possible choices k.sub.0 and k.sub.1. [0050] 1. Alice and Bob start by agreeing on a value C. They use an ECDSA exchange to select the hash of the current block height and a secret generated by their master keys. Such an exchange is described in more detail in International patent application WO2017/145016 and,
C=h(BH|S) or C=h(BH|S|BLOCkhash)
[0051] where h( ) is a hash function, and is the concatenate operator.
[0052] BH is block height.
[0053] S is shared secret generated, for example, by means of a method disclosed in International patent application WO2017/145016.
Blockhash=Blockhash
[0054] It should be noted that any random value can be used but block height is a good source of external agreed randomness. [0055] 2. Alice selects a value. She keeps this to herself. This value (i) represents a key that Bob created at k.sub.i. [0056] 3. Alice then creates a subkey from her master key pair d.sub.A/Q.sub.A by means of the method of International patent application WO2017/145016 and now has Q.sub.A0 where Q.sub.A is the master key for Q.sub.A0.
[0057] Alice will let Bob know Q.sub.A0 using the ECDSA exchange first. Bob will encrypt. Bob encrypts Alice's selection k.sub.i.
[0058] To ensure Bob does not know which i=0 or 1 that Alice selected, Alice also creates a decoy public key Q.sub.A1. [0059] 4. Bob will not know which is the real value.
[0060] In the case in which Alice wishes to use private key d.sub.A0 to decrypt the selected value [0061] Alice creates a subkey: d.sub.A0, corresponding to public key Q.sub.A0=(x.sub.A0,y.sub.A0) [0062] Alice knows d.sub.A0 and hence Q.sub.A0 [0063] Alice also knows that:
[0066] Alice knows d.sub.A0 and can calculate Q.sub.A1. Q.sub.A0 is a product of d.sub.A0 and is known to Alice. [0067] 5. Alice gives Bob both keys.
Q.sub.A0
Q.sub.A1
[0068] Even though Alice can only decode information encrypted for Q.sub.A0. That is Alice has the private key d.sub.A0 for Q.sub.A0 but not the private key d.sub.A1 for Q.sub.A1. [0069] 6. Bob encrypts k.sub.i to Alice. In this example k.sub.0 is the one Alice can decrypt. This is as Bob encrypts k.sub.0 to Q.sub.A0 and k.sub.i to Q.sub.A1 Bob does not know if Alice wants k.sub.0 or k.sub.i but he knows that she would only have one of the keys d.sub.A0 or d.sub.A1 that are needed to decrypt the packet. [0070] 7. Bob selects two random values r.sub.0 and r.sub.1. Bob computes two keys:
Q.sub.r0=r.sub.0G
Q.sub.r1=r.sub.1G
[0071] and sends these to Alice. [0072] 8. Bob calculates:
h(Q.sub.A0) and
h(Q.sub.A1) [0073] 9. Bob makes the Public keys.
Q.sub.AB0=(h(Q.sub.A0)+r.sub.0)G
Q.sub.AB1=(h(Q.sub.A1)+r.sub.1)G
[0074] Bob encrypts k.sub.0 and k.sub.1 with Q.sub.AB0 and Q.sub.AB1 respectively. Bob sends Q.sub.r0 and Q.sub.r1 to Alice:
Q.sub.r0=r.sub.0G
Q.sub.r1=r.sub.1G. [0075] 10. Alice cannot reverse to get r.sub.0 or r.sub.1. [0076] 11. Alice needs to decide but can only decrypt the one value. (The blank key is of no use). Both Alice and Bob are limited as follows: Alice can select to decrypt (receive) k.sub.0 or k.sub.1 but not both and Bob does not know which one so he can send both to her.
[0077] In the 1 of 2 system, Alice has two secrets but only seeks to disclose one of them. At the same time Bob does not want Alice to know which of the two secrets he wants. Bob is interested in only one of Alice's secrets but does not want Alice to know which one.
[0078] Bob receives one answer only while Alice does not know what Bob wants answered.
[0079]
[0080] An elliptic curve over finite field Z.sub.p with (p) as a prime is used. All values are between 0 and (p−1), and all calculations are completed modulo p.
[0081] The general form of the elliptic curve equation is:
y.sup.2 mod p=(x.sup.3+ax=b)mod p.
[0082] The set of (x,y) points that satisfy the elliptic curve equation is given by E.sub.p(a,b). The order r of a point T=(y.sub.1,y.sub.1) on an elliptic curve is defined as the smallest positive integer r such that:
rT=0, where 0 is a point at infinity.
[0083] A point G is the base point in E.sub.p(a,b). This value is selected such that the order r is very large. The security of the system is based on the elliptic curve discrete logarithm problem (ECDLP) being impracticably difficult to solve. Solving the ECDLP of a point Q is equivalent to solving for an integer k such that
Q=kP (or Q=kG)
[0084] Where Q and P are known.
[0085] Alice and Bob both use the same Elliptic Curve and base Point G. Alice selects two values, k.sub.0 and k.sub.1 and generates two points P.sub.0 and P.sub.1
P.sub.0=k.sub.0G
P.sub.1=k.sub.1G.
[0086] The values k.sub.0 and k.sub.1 are not to be known to Bob and act as the secret key held by Alice.
[0087] These values can be determined using an exchange process as described in International patent application WO2017/145016.
[0088] If Alice has a master key of k.sub.sa, then the values k.sub.0 and k.sub.1 can be linked to k.sub.sa
k.sub.sa+v.sub.0=k.sub.0
k.sub.sa+v.sub.1=k.sub.1
Where v.sub.0 and v.sub.1 are values known by Alice. This process can be completed before the Oblivious Transfer message exchange.
[0089] The protocol is defined as follows:
[0090] Referring to
Let: P=P.sub.0+P.sub.1
And i∈{0,1}. [0091] 1. Bob creates Public keys (U.sub.0, U.sub.1) by selecting a random integer in and setting:
U.sub.i=mG, where U.sub.i represents which of U.sub.0 or U.sub.1 corresponds to k.sub.0 or k.sub.1 Bob has selected. Bob sends public keys U.sub.0 and U.sub.1 to Alice.
[0092] Next let U.sub.b=mG−P.sub.i
U.sub.1-i=P.sub.1-i−U.sub.b
[0093] Bob's private key is m. m can be derived using a process as described in International patent application WO2017/145016. [0094] 2. Alice selects two random integers a.sub.0 and a.sub.1 and computes:
V.sub.0=a.sub.0G
And
V.sub.1=a.sub.1G.
[0095] Alice then computes:
W.sub.0=a.sub.0U.sub.0
And
W.sub.1=a.sub.1U.sub.1
[0096] Alice sends the values V.sub.0, V.sub.1, to Bob.
[0097] Alice then computes:
X.sub.0=S.sub.0⊕W.sub.0
And
X.sub.1=S.sub.1⊕W.sub.1
[0098] Where S.sub.i⊕W.sub.i represents encryption of the binary representation of secret value S.sub.i by means of an exclusive OR cipher which has the binary representation of W.sub.i as an encryption key.
[0099] Alice also sends X.sub.0 and X.sub.1 to Bob. [0100] 3. Bob computes the values:
mV.sub.i=ma.sub.iG=W.sub.i
[0101] This allows him to extract S.sub.i as
S.sub.i=W.sub.i⊕X.sub.i
[0102] S.sub.i is the i.sup.th secret.
[0103] It should be noted that Bob cannot extract S.sub.1-i as he cannot compute n where U.sub.1-i=nG. Alice does not know which value of U.sub.0 or U.sub.1 equals m G such that Bob is able to determine the value of Alice therefore does not know which of the two secrets Bob has received.
[0104] Alice can validate that Bob's public keys are correctly formed by
Checking that U.sub.i+U.sub.1-i=P 1.
Computing U.sub.b=U.sub.i−P.sub.i 2.
[0105] This is used to verify if it is the negative of U.sub.1-i−P.sub.1-i
[0106] Security aspects of the protocol are as follows: [0107] 1. Alice cannot deduce which of the two secrets Bob has received. [0108] 2. The security of the protocol holds if the discrete logarithm problem (DLP) holds for elliptic curves. [0109] 3. If Alice follows the protocol, Bob can only find one of her secrets.
[0110] This system allows for a fair control over an exchange. Bob and Alice can exchange information without knowing what was exchanged. This can be used to control all browsing of data or information, access to databases, and other records (for example, medical files), and this information can be segmented and divulged bit by bit with a record of which parties saw what information. It can eliminate the need for a trusted server or third party.
[0111] Turning now to
[0112] The main memory 2608 can include dynamic random-access memory (DRAM) 2618 and read-only memory (ROM) 2620 as shown. The storage subsystem 2606 and the cache memory 2602 and may be used for storage of information, such as details associated with transactions and blocks as described in the present disclosure. The processor(s) 2602 may be utilized to provide the steps or functionality of any embodiment as described in the present disclosure.
[0113] The processor(s) 2602 can also communicate with one or more user interface input devices 2612, one or more user interface output devices 2614, and a network interface subsystem 2616.
[0114] A bus subsystem 2604 may provide a mechanism for enabling the various components and subsystems of computing device 2600 to communicate with each other as intended. Although the bus subsystem 2604 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple busses.
[0115] The network interface subsystem 2616 may provide an interface to other computing devices and networks. The network interface subsystem 2616 may serve as an interface for receiving data from, and transmitting data to, other systems from the computing device 2600. For example, the network interface subsystem 2616 may enable a data technician to connect the device to a network such that the data technician may be able to transmit data to the device and receive data from the device while in a remote location, such as a data centre.
[0116] The user interface input devices 2612 may include one or more user input devices such as a keyboard; pointing devices such as an integrated mouse, trackball, touchpad, or graphics tablet; a scanner; a barcode scanner; a touch screen incorporated into the display; audio input devices such as voice recognition systems, microphones; and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information to the computing device 2600.
[0117] The one or more user interface output devices 2614 may include a display subsystem, a printer, or non-visual displays such as audio output devices, etc. The display subsystem may be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), light emitting diode (LED) display, or a projection or other display device. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from the computing device 2600. The one or more user interface output devices 2614 may be used, for example, to present user interfaces to facilitate user interaction with applications performing processes described and variations therein, when such interaction may be appropriate.
[0118] The storage subsystem 2606 may provide a computer-readable storage medium for storing the basic programming and data constructs that may provide the functionality of at least one embodiment of the present disclosure. The applications (programs, code modules, instructions), when executed by one or more processors, may provide the functionality of one or more embodiments of the present disclosure, and may be stored in the storage subsystem 2606. These application modules or instructions may be executed by the one or more processors 2602. The storage subsystem 2606 may additionally provide a repository for storing data used in accordance with the present disclosure. For example, the main memory 2608 and cache memory 2602 can provide volatile storage for program and data. The persistent storage 2610 can provide persistent (non-volatile) storage for program and data and may include flash memory, one or more solid state drives, one or more magnetic hard disk drives, one or more floppy disk drives with associated removable media, one or more optical drives (e.g., CD-ROM or DVD or Blue-Ray) drive with associated removable media, and other like storage media. Such program and data can include programs for carrying out the steps of one or more embodiments as described in the present disclosure as well as data associated with transactions and blocks as described in the present disclosure.
[0119] The computing device 2600 may be of various types, including a portable computer device, tablet computer, a workstation, or any other device described below. Additionally, the computing device 2600 may include another device that may be connected to the computing device 2600 through one or more ports (e.g., USB, a headphone jack, Lightning connector, etc.). The device that may be connected to the computing device 2600 may include a plurality of ports configured to accept fibre-optic connectors. Accordingly, this device may be configured to convert optical signals to electrical signals that may be transmitted through the port connecting the device to the computing device 2600 for processing. Due to the ever-changing nature of computers and networks, the description of the computing device 2600 depicted in
Enumerated Example Embodiments
[0120] Examples of the embodiments of the present disclosure can be described in view of the following clauses: [0121] 1. A method of communicating at least one secret from a sender to a recipient, the method comprising: [0122] sending, from the sender to the recipient, information identifying a plurality of secrets selectable by the recipient; [0123] receiving, at the sender, from the recipient, at least one first public key, corresponding to a respective first said secret selected for access by the recipient, wherein the or each said first public key is part of a public key/private key pair of an elliptic curve cryptography system and a first private key corresponding to said first public key is accessible to the recipient; [0124] receiving, at the sender, from the recipient, at least one second public key, corresponding to a respective second said secret not selected for access by the recipient, wherein the or each said second public key is a public key of said elliptic curve cryptography system and a respective second private key, corresponding to said second public key, is not available to the recipient; [0125] sending, from the sender to the recipient, at least one said first secret encrypted by means of the corresponding said first public key; and [0126] sending, from the sender to the recipient, at least one said second secret encrypted by means of the corresponding said second public key; [0127] wherein the or each said first secret is accessible to said recipient by means of the corresponding said first private key, the or each said second secret is inaccessible to said recipient, and said sender is unable to distinguish between a said first secret and a said second secret. [0128] This provides the advantage of improving security of data of the method by only allowing a recipient to have access to a limited number of messages, while preventing the sender from knowing which message or messages the recipient has accessed. [0129] 2. A method according to clause 1, further comprising encrypting at least one said first secret by means of the corresponding said first public key and encrypting at least one said second secret by means of the corresponding said second public key. [0130] 3. A method according to clause 2, wherein at least one said first secret and at least one said second secret are encrypted by means of a respective exclusive OR cipher. [0131] This provides the advantage of enabling rapid and efficient encryption and decryption. [0132] 4. A method according to clause 3, wherein at least one said exclusive OR cipher has a respective encryption key based on the corresponding said first or second public key. [0133] 5. A method according to clause 4, wherein at least one said encryption key comprises the corresponding said first or second public key, multiplied by a respective first or second encryption integer, known to the sender, by means of scalar elliptic curve point multiplication. [0134] 6. A method according to clause 5, further comprising sending, from said sender to said recipient, at least one said first and/or second encryption integer, encrypted by means of the corresponding said first or second public key. [0135] 7. A method according to any one of the preceding clauses, wherein at least one said first secret is encrypted by means of a respective third public key containing a respective first masking term comprising a result of scalar multiplication, by a respective first masking integer, known to the sender, of an elliptic curve generator point of the elliptic curve cryptography system, added to a respective first encryption term by means of elliptic curve point addition. [0136] 8. A method according to clause 7, wherein at least one said first encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective third encryption integer dependent on the corresponding said first public key. [0137] 9. A method according to clause 8, wherein at least one said third encryption integer is a hash value of the corresponding said first public key. [0138] 10. A method according to any one of clauses 7 to 9, wherein at least one said second secret is encrypted by means of a respective fourth public key containing a respective second masking term comprising a result of scalar multiplication, by a respective second masking integer, known to the sender, of the elliptic curve generator point of the elliptic curve cryptography system, added to a respective second encryption term by means of elliptic curve point addition. [0139] 11. A method according to clause 10, wherein at least one said second encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective fourth encryption integer dependent on the corresponding said second public key. [0140] 12. A method according to clause 11, wherein at least one said fourth encryption integer is a hash value of the corresponding said second public key. [0141] 13. A method according to any one of the preceding clauses, wherein at least one said first and/or second public key can be determined from the corresponding said second and/or first public key. [0142] 14. A method according to any one of the preceding clauses, further comprising generating at least one third secret, to be shared between the sender and the recipient. [0143] 15. A method according to clauses 13 and 14, wherein at least one said first and/or second public key is based on the corresponding said second and/or first public key and at least one said third secret. [0144] 16. A method according to any one of the preceding clauses, further comprising checking, at said sender, consistency of at least one said first and/or second public key, received from the recipient, with the corresponding said second and/or first public key received from the recipient. [0145] 17. A method according to any one of the preceding clauses, wherein a result of scalar multiplication of at least one said first public key by a said second private key is equal to a result of scalar multiplication of a respective said second public key by a respective said first private key. [0146] 18. A method according to any one of the preceding clauses, wherein at least one said first private key and at least one said second private key are derived deterministically from a private key of said elliptic curve cryptography system known to the sender. [0147] 19. A method of receiving at least one secret sent from a sender to a recipient, the method comprising: [0148] receiving, at the recipient, information identifying a plurality of secrets selectable by the recipient; [0149] sending, to the sender, from the recipient, at least one first public key, corresponding to a respective first said secret selected for access by the recipient, wherein the or each said first public key is part of a public key/private key pair of an elliptic curve cryptography system and a first private key corresponding to said first public key is accessible to the recipient; [0150] sending, to the sender, from the recipient, at least one second public key, corresponding to a respective second said secret not selected for access by the recipient, wherein the or each said second public key is a public key of said elliptic curve cryptography system and a respective second private key, corresponding to said second public key, is not available to the recipient; [0151] receiving, at the recipient from the sender, at least one said first secret encrypted by means of the corresponding said first public key; and [0152] receiving, at the recipient from the sender, at least one said second secret encrypted by means of the corresponding said second public key; [0153] wherein the or each said first secret is accessible to said recipient by means of the corresponding said first private key, the or each said second secret is inaccessible to said recipient, and said sender is unable to distinguish between a said first secret and a said second secret. [0154] 20. A method according to clause 19, wherein at least one said first secret and at least one said second secret are encrypted by means of a respective exclusive OR cipher. [0155] 21. A method according to clause 20, wherein at least one said exclusive OR cipher has a respective encryption key based on the corresponding said first or second public key. [0156] 22. A method according to clause 21, wherein at least one said encryption key comprises the corresponding said first or second public key, multiplied by a respective first or second encryption integer, known to the sender, by means of scalar elliptic curve point multiplication. [0157] 23. A method according to clause 22, further comprising receiving, at said recipient from said sender, at least one said first and/or second encryption integer, encrypted by means of the corresponding said first or second public key. [0158] 24. A method according to any one of clauses 19 to 23, wherein at least one said first secret is encrypted by means of a respective third public key containing a respective first masking term comprising a result of scalar multiplication, by a respective first masking integer, known to the sender, of an elliptic curve generator point of the elliptic curve cryptography system, added to a respective first encryption term by means of elliptic curve point addition. [0159] 25. A method according to clause 24, wherein at least one said first encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective third encryption integer dependent on the corresponding said first public key. [0160] 26. A method according to clause 25, wherein at least one said third encryption integer is a hash value of the corresponding said first public key. [0161] 27. A method according to any one of clauses 24 to 26, wherein at least one said second secret is encrypted by means of a respective fourth public key containing a respective second masking term comprising a result of scalar multiplication, by a respective second integer, known to the sender, of the elliptic curve generator point of the elliptic curve cryptography system, added to a respective second encryption term by means of elliptic curve point addition. [0162] 28. A method according to clause 27, wherein at least one said second encryption term comprises a result of scalar multiplication of the elliptic curve generator point by a respective fourth encryption integer dependent on the corresponding said second public key. [0163] 29. A method according to clause 28, wherein at least one said fourth encryption integer is a hash value of the corresponding said second public key. [0164] 30. A method according to any one of clauses 19 to 29, wherein at least one said first and/or second public key can be determined from the corresponding said second and/or first public key. [0165] 31. A method according to any one of clauses 19 to 30, further comprising generating at least one third secret, to be shared between the sender and the recipient. [0166] 32. A method according to clauses 30 and 31, wherein at least one said first and/or second public key is based on the corresponding said second and/or first public key and at least one said third secret. [0167] 33. A method according to any one of clauses 19 to 32, wherein a result of scalar multiplication of at least one said first public key by a said second private key is equal to a result of scalar multiplication of a respective said second public key by a respective said first private key.
[0168] A computer implemented system arranged to carry out a method according to any one of the preceding clauses.
[0169] It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the invention as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The word “comprising” and “comprises”, and the like, does not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. In the present specification, “comprises” means “includes or consists of” and “comprising” means “including or consisting of”. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a device claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
1 REFERENCES
[0170] [1] “Generalised Oblivious Transfer Protocol”, Partha Sarathi Roy, Department of Pure mathematics, University Cacutta India [0171] [2] “Generalised oblivious transfer by secret sharing” Tamir Tassa [0172] [3] “Computationally secure oblivious transfer” Moni Naor, Benny Pinkas [0173] [4] “The simplest protocol for oblivious transfer” Tung Chou and Claudio Orlandi [0174] [5] “Smooth projective hashing and two message oblivious transfer” Yuri Tauman KAlai MIT [0175] [6] “Oblivious Transfer with Access Control” Jan Camenisch, Maria Dubovitskaya, Gregory Neven [0176] [7] “Practical Fully Simulatable Oblivious Transfer with Sub-linear communication” BingSheng Zhang, Helger Lipmaa, Cong Wang, Kuri Ren [0177] [8] Rabin (1981) for papers on oblivious transfer [0178] [9] Bellare M.; Micalli, S. [1989] “Non-Interactive Oblivious Transfer and Applications.” Proc. On Adv in Cryptography CRYPTO 89. PP 547-557. [0179] [10] Diffie, W.; Hellman, M. (1976). “New directions in cryptography” (PDF). IEEE Transactions on Information Theory. 22 (6): 644-654. doi:10.1109/TIT.1976.1055638. [0180] [11] Prof Bill Buchanan, www.asecuritysite.com [0181] [12] Boneh, Franklin, “Identity-Based Encryption from the Weil Pairing”. Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229, Springer-Verlag, 2001. “Bilinear paring.”