Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary 36 to re-encrypt a message received from an originator 30 for transmission to a message receiver 52, 56, 60. The invention uses a composition (combination) of two ciphers for re-encrypting the message at the intermediary without revealing the plain text message or either cipher to the intermediary. The originator encrypts the message with a substitution cipher process and the intermediary then re-encrypts it with a composition of an inverse of the substitution cipher process and a second cipher. The second cipher may also be a substitution cipher or it may be a keyed cipher. The receiver deciphers the second cipher to recover the original message. The message may be digital rights management (DRM) data such as a content key. There may be multiple intermediaries 64, 70 in a chained process.
Abstract:
In a Digital Rights Management (DRM) system, cryptographic keys for decrypting distributed assets (such as audio or video media) are distributed using an offline (e.g., non-Internet) method for distribution of the key generation process, with an implicit authorization to use the distributed key generation process. This is used to update an asset key for use by a client such as a media player when a key formula for generating the key for decrypting an asset has been compromised, such as by hackers.