Providing Trustworthy Workflow Across Trust Boundaries

Abstract

Methods, systems and apparatuses for providing trustworthy workflow across trust boundaries are disclosed. One method includes a curator generating a first public key (PKC1) and a second public key (PKC2), publishing the first public key (PKC1) and the second public key (PKC2), and generating a first proxy re-encryption key (RKC1-C2) and a second proxy re-encryption key (RKC2-B). Further, a first party encrypts data having a key k, wherein k is encrypted according to the first public key (PKC1). A custodian proxy re-encrypts k from the first public key (PKC1) to the second public key (PKC2) using the first proxy re-encryption key (RK C1-C2), and the custodian proxy re-encrypts k from the second public key (PKC2) to a public key (PKB) of the second party B using the second proxy re-encryption key (RKC2-B). The second party B receiving the data and decrypting the data with the key k.


Claims
Download PDF
Document Preview
Document History
  • Publication: Aug 15, 2013
  • Application: Sep 13, 2012
    US US 201213613080 A
  • Priority: Sep 13, 2012
    US US 201213613080 A
  • Priority: Feb 13, 2012
    US US 201261598071 P

Download Citation


Sign in to the Lens

Feedback