. 1; FIG. 3 is a flow diagram depicting a method for performing blinded decryption in the system depicted in FIG. 1; FIGS. 4 a and 4 b are a flow diagram depicting a method for performing blinded encryption and decryption in the system depicted in FIG. 1; and FIGS. 5 a and 5 b are a flow diagram depicting a method for performing blinded decryption in the system depicted in FIG. 1.