CPC H04L 9/085 (2013.01) [H04L 9/0825 (2013.01); H04L 9/0827 (2013.01); H04L 9/3066 (2013.01)] | 20 Claims |
1. A computer-implemented method for sharing keys for data security, the method comprising:
retrieving a first secret key and a second secret key, wherein the first secret key and the second secret key are distinct;
determining, based on a pairing computation, a first shared value using the first secret key as a first input;
transmitting an instruction causing a delegation server to generate, based on the pairing computation, a second shared value using the second secret key as a second input, wherein the second shared value is distinct from the first shared value;
receiving the second shared value during a first authenticated key sharing session;
generating, based on the first shared value and the second shared value, a shared key for an encrypted data communication during a second authenticated key sharing session according to an authentication key sharing protocol, wherein the second authenticated key sharing session is distinct from the first authenticated key sharing session; and
causing, using the shared key, the encrypted data communication over a network according to the second authenticated key sharing session.
|