首页>
外国专利>
CONCLUSION GUIDELINES AND PROCEDURES FOR THE IDENTIFICATION AND SUMMARY OF IDENTICAL OBJECTS CLOSED WITH DIFFERENT CLOSES
CONCLUSION GUIDELINES AND PROCEDURES FOR THE IDENTIFICATION AND SUMMARY OF IDENTICAL OBJECTS CLOSED WITH DIFFERENT CLOSES
展开▼
机译:结论指南和过程的标识和不同闭合对象的汇总摘要
展开▼
页面导航
摘要
著录项
相似文献
摘要
Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
展开▼