CPC H04L 9/0637 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0872 (2013.01); H04L 9/3066 (2013.01)] | 28 Claims |
1. An encryption method comprising:
creating an asymmetric profile key using a set of user devices, the asymmetric profile key comprising a multipart threshold key;
signing a declaration using the profile key and each device of the set of user devices, the declaration identifying the set of user devices;
creating an asymmetric location key comprising two multipart threshold keys;
sharding and storing the asymmetric location key;
creating a symmetric key;
encrypting a file with the symmetric key;
encrypting the symmetric key with the location key; and
storing the encrypted file and encrypted key such that the encrypted file cannot be decrypted without decrypting the encrypted key by a threshold of the set of user devices;
wherein the two multipart threshold keys of the location key are generated with different elliptic curves;
wherein one of the two multipart threshold keys of the location key is used for signing and a second of the two multipart threshold keys of the location key is used for the encrypting of the symmetric key.
|