Cryptographic protocols and methods of employing the same are described.
The described protocols advantageously enable two or more identical
encryptable Objects that are coded for encryption with different keys to
be identified as identical without access to either the unencrypted
objects or the keys that are used in the encryption process.
Additionally, the protocols enable two or more identical encryptable
objects to be processed with different encryption keys, yet be stored in
a manner so that the total required storage space is proportional to the
space that is required to store a single encryptable object, plus a
constant amount for each distinct encryption key. In various embodiments,
the encryptable objects comprise files and the cryptographic protocols
enable encrypted files to be used in connection with single instance
store (SIS) systems.