Patent attributes
A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of:applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages;sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages;receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption;in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create double blinded second plurality messages which have been encrypted with at least the second encryption and the third encryption;sending the double blinded second plurality messages from the first node to the second node;subsequent to sending double blinded second plurality messages from the first node to the second node, receiving double blinded first plurality messages at the first node, wherein the double blinded first plurality of messages have been encrypted with at least the second encryption and a fourth encryption;in response to receiving double blinded first plurality messages at the first node, removing the first encryption of the second plurality of double blinded messages to provide partially decrypted blinded first plurality of messages which remain encrypted with the third encryption;after removing the first encryption, sending at least one message of the partially decrypted blinded first plurality of messages to the second node;subsequent to sending at least one message of partially decrypted blinded first plurality of messages to the second node, receiving at least one partially decrypted message which is one of the second plurality of messages with the second encryption removed; andin response to receiving at least one partially decrypted message, exchanging with the second node further partially decrypted messages of the first and second plurality of messages.