-
公开(公告)号:US11750362B2
公开(公告)日:2023-09-05
申请号:US16573827
申请日:2019-09-17
Applicant: SAP SE
Inventor: Anselme Kemgne Tueno , Yordan Boev , Florian Kerschbaum
IPC: H04L9/06 , H04L9/00 , G06N20/00 , G06N20/10 , G06F40/126 , G06F40/205 , G06N5/01
CPC classification number: H04L9/008 , G06F40/126 , G06F40/205 , G06N5/01 , G06N20/10 , H04L9/0618 , H04L2209/08
Abstract: A non-interactive protocol is provided for evaluating machine learning models such as decision trees. A client can delegate the evaluation of a machine learning model such as a decision tree to a server by sending an encrypted input and receiving only the encryption of the result. The inputs can be encoded as vector of integers using their binary representation. The server can then evaluate the machine learning model using a homomorphic arithmetic circuit. The homomorphic arithmetic circuit provides an implementation that requires fewer multiplications than a Boolean comparison circuit. Efficient data representations are then combined with different algorithmic optimizations to keep the computational overhead and the communication cost low. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US11238167B2
公开(公告)日:2022-02-01
申请号:US16442212
申请日:2019-06-14
Applicant: SAP SE
Inventor: Jonas Boehler , Florian Kerschbaum
Abstract: Techniques for efficient, accurate, and secure computation of a differentially private median of the union of two large confidential datasets are disclosed. In some example embodiments, a computer-implemented method comprises obtaining secret shares of a first dataset of a first entity, secret shares of a second dataset of a second entity, secret shares of gap values for the first dataset, secret shares of gap values for the second dataset, secret shares of probability mass values for the first dataset, and secret shares of probability mass values for the second dataset. The probability mass values may be computed via an exponential mechanism. In some example embodiments, the computer-implemented method further comprises determining a median of a union of the first dataset and the second dataset using an inverse transform sampling algorithm based on the obtained secret shares, and then performing a function of a networked computer system using the determined median.
-
公开(公告)号:US20210081807A1
公开(公告)日:2021-03-18
申请号:US16573813
申请日:2019-09-17
Applicant: SAP SE
Inventor: Anselme Kemgne Tueno , Yordan Boev , Florian Kerschbaum
Abstract: A non-interactive protocol is provided for evaluating machine learning models such as decision trees. A client can delegate the evaluation of a machine learning model such as a decision tree to a server by sending an encrypted input and receiving only the encryption of the result. The inputs can be encoded using their binary representation. Efficient data representations are then combined with different algorithmic optimizations to keep the computational overhead and the communication cost low. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US10824739B2
公开(公告)日:2020-11-03
申请号:US16048735
申请日:2018-07-30
Applicant: SAP SE
Inventor: Timon Hackenjos , Florian Hahn , Florian Kerschbaum
Abstract: Disclosed herein are system, method, and computer program product embodiments for secure data aggregation in databases. An embodiment operates by identifying a value column and a group column of a plurality of columns of a dataset. Two distinct group values of the group column are identified. An offset value corresponding to the first group value is determined. One or more of the plurality of records including the first group value are identified. A value of the value column of each of the identified one or more plurality of records is encoded with the offset value. Values of the encoded value column are encrypted. The encrypted values are uploaded to a server.
-
公开(公告)号:US11341128B2
公开(公告)日:2022-05-24
申请号:US14939138
申请日:2015-11-12
Applicant: SAP SE
Inventor: Florian Hahn , Florian Kerschbaum
IPC: G06F16/245 , G06F16/22 , G06F16/9535 , G06F21/62 , G06F16/95
Abstract: Methods, systems, and computer-readable storage media for range queries over encrypted data include actions of receiving a range query token, determining one or more of whether a tree list of an encrypted search index is empty and a range of the token intersects with a range accounted of a tree in the tree list, the encrypted search index including the tree list and a point list, receiving encrypted query results based on one of a search tree, if the tree list is not empty and a range of the token is at least a sub-range of a range accounted for in the tree list, and the point list, if the tree list is empty or the range of the token is not at least a sub-range of a range accounted for in the tree list, and updating the encrypted search index based on the token.
-
公开(公告)号:US11250140B2
公开(公告)日:2022-02-15
申请号:US16289415
申请日:2019-02-28
Applicant: SAP SE
Inventor: Anselme Kemgne Tueno , Mubashir Mehmood Qureshi , Florian Kerschbaum
Abstract: A garbled circuit and two garbled inputs are received by a server from each pair of a plurality of clients. The garbled circuit encodes a comparison function and the garbled inputs encode a respective data value from each of the clients in each pair. Thereafter, the server evaluates the garbled circuits using the corresponding garbled inputs to result in a plurality of comparison bits. The server can then sort the datasets in an ascending or descending order by using the comparison bits to compute the rank of each data value. Using the sorted datasets, the server determines a median value for the datasets and transmits data characterizing the median value to each of the clients.
-
公开(公告)号:US20210266329A1
公开(公告)日:2021-08-26
申请号:US16791761
申请日:2020-02-14
Applicant: SAP SE
Inventor: Benny Fuhry , Lina Hirschoff , Florian Kerschbaum
Abstract: Aspects of the current subject matter are directed to secure group file sharing. An architecture for end-to-end encrypted, group-based file sharing using a trusted execution environment (TEE) is provided to protect confidentiality and integrity of data and management of files, enforce immediate permission and membership revocations, support deduplication, and mitigate rollback attacks.
-
公开(公告)号:US20210165906A1
公开(公告)日:2021-06-03
申请号:US16699997
申请日:2019-12-02
Applicant: SAP SE
Inventor: Jonas Boehler , Florian Kerschbaum
Abstract: In an example embodiment, a differentially private function is computed via secure computation. Secure computation allows multiple parties to compute a function without learning details about the data. The differentially private function is performed via probability distribution, which then permits computation of a result that is likely to be very close to the actual value without being so exact that it can be used to deduce the underlying data itself.
-
公开(公告)号:US20210083841A1
公开(公告)日:2021-03-18
申请号:US16573827
申请日:2019-09-17
Applicant: SAP SE
Inventor: Anselme Kemgne Tueno , Yordan Boev , Florian Kerschbaum
Abstract: A non-interactive protocol is provided for evaluating machine learning models such as decision trees. A client can delegate the evaluation of a machine learning model such as a decision tree to a server by sending an encrypted input and receiving only the encryption of the result. The inputs can be encoded as vector of integers using their binary representation. The server can then evaluate the machine learning model using a homomorphic arithmetic circuit. The homomorphic arithmetic circuit provides an implementation that requires fewer multiplications than a Boolean comparison circuit. Efficient data representations are then combined with different algorithmic optimizations to keep the computational overhead and the communication cost low. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US10885216B2
公开(公告)日:2021-01-05
申请号:US15874754
申请日:2018-01-18
Applicant: SAP SE
Inventor: Florian Hahn , Nicolas Loza , Florian Kerschbaum
Abstract: Secure substring searching on encrypted data may involve a first preprocessing comprising fragmenting a plaintext string slated for remote secure storage, in a plurality of overlapping plaintext substrings. A second preprocessing encrypts these substrings into ciphertexts (e.g., utilizing Frequency-Hiding Order Preserving Encryption) further including position information of the substring. A search index and a secret state result from the first and second preprocessing. The ciphertexts and search index are outsourced to a database within an unsecure server. An engine within the server determines candidate ciphertexts matching a query request received from a secure client. The engine returns ciphertexts to the client for decryption according to the secret state. Preprocessing may be delegated to a third party for outsourcing search index/ciphertexts to the server, and the secret state to the client. Filtering of candidate ciphertexts on the server-side, can eliminate false positives and reduce the volume of communication with remote clients.
-
-
-
-
-
-
-
-
-