-
公开(公告)号:US11775658B2
公开(公告)日:2023-10-03
申请号:US17860003
申请日:2022-07-07
CPC分类号: G06F21/602 , G06F21/6218 , G06F21/79 , H04L9/008 , H04L9/085 , G06F2221/0751
摘要: A device, system and method for linking encrypted data sets using common encrypted identifiers in encrypted space. A first and second parties' encrypted data sets may include first and second respective encrypted data and associated first and second respective encrypted identifiers. The first and second encrypted identifiers may be converted into a first and second respective sets of a plurality of elemental identifier components. Each of the plurality of elemental identifier components in each component set characterizes a distinct numeric property of the corresponding converted encrypted identifier. The first and second sets of the plurality of elemental identifier components may be composed, component-by-component, to generate a plurality of component-specific results. If the plurality of component-specific results are determined to satisfy a matching criterion indicating that the first and second encrypted identifiers match, the first and second encrypted data associated with the first and second matching encrypted identifiers may be linked.
-
公开(公告)号:US20220414235A1
公开(公告)日:2022-12-29
申请号:US17851475
申请日:2022-06-28
发明人: Kurt ROHLOFF , Yuriy POLYAKOV
摘要: Methods and system for risk determination and risk categorization using encrypted data are provided. The risk determination can involve determining an inner product operation between a generalized weight table and an encrypted incidence vector, summing the result of the inner product operation and/or decrypting the results. Method and systems for encrypting data for use in homomorphic risk determination are also provided.
-
公开(公告)号:US20210399983A1
公开(公告)日:2021-12-23
申请号:US17337977
申请日:2021-06-03
发明人: Marcelo BLATT
IPC分类号: H04L12/721 , H04L12/741 , H04L9/08 , H04L12/717 , H04L9/32 , H04L12/727 , H04L9/00
摘要: A system, method, and non-transitory computer readable storage medium for privacy preserving routing of a data packet. The data packet may comprise a packet header and a data payload; the packet header comprising at least a homomorphically encrypted final destination address of a final destination device. An intermediate routing device may receive the data packet. At the intermediate routing device, in a non-TEE, homomorphic computations may be performed to determine a homomorphically encrypted address of a next intermediate routing device. At the intermediate routing device, in a TEE, one or more secret homomorphic decryption keys may be stored and used to decrypt the homomorphically encrypted address of the next address of the next intermediate routing device. The data packet may be transmitted to the decrypted address of the next intermediate routing device according to an updated packet header with the unencrypted address of the next intermediate routing device in the sequence.
-
公开(公告)号:US10885158B2
公开(公告)日:2021-01-05
申请号:US15996862
申请日:2018-06-04
摘要: A multi-party system, devices, and method for token-based obfuscation of secret information. A first party device may store a secret original program T and original data D, retrieve a set of secret keys SK, obfuscate the original program T with the set of secret keys SK to generate an obfuscated program T′, obfuscate the original data D with the set of secret keys SK to generate a token of the data Token(D), and transfer the obfuscated program T′ and Token(D) to a second party device. The second party device may evaluate the obfuscated program T′ on the token of the data Token(D) to generate a result equivalent to evaluating the original program T on the original data D if the same set of secret keys SK is used to obfuscate the original program T and the original data D, without exposing the original program T to the second party.
-
5.
公开(公告)号:US20200228308A1
公开(公告)日:2020-07-16
申请号:US16739313
申请日:2020-01-10
发明人: Arina SHAINSKI , Marcelo BLATT
IPC分类号: H04L9/00 , H04L9/32 , G06F16/2455
摘要: A system and method for secure searching in a semi-trusted environment by comparing first and second data (query and target data). A first data provider may map first secret data to a first plurality of tokens using a token codebook, concatenate the first plurality of tokens to generate a first token signature, and homomorphically encrypt the first token signature. A second data provider may map second data to a second plurality of tokens using the token codebook, concatenate the second plurality of tokens to generate a second token signature, and compare the homomorphically encrypted first token signature and an unencrypted or homomorphically encrypted second token signature to generate a homomorphically encrypted comparison. A trusted party may decrypt the homomorphically encrypted comparison, using a secret homomorphic decryption key, to determine if the token signatures match or not respectively indicating the search query is found or not in the target data.
-
6.
公开(公告)号:US20230361986A1
公开(公告)日:2023-11-09
申请号:US18353430
申请日:2023-07-17
CPC分类号: H04L9/008 , H04L9/085 , H04L9/30 , G06F9/3887
摘要: A multi-party system comprising a garbler and an evaluator for interactively executing homomorphic SIMD operations using garbled circuits. The garbler and evaluator may each store a unique share of a shared secret key, a ciphertext, and a shared public key. The garbler and evaluator may each partially decrypt the ciphertext using its key share to generate a unique data share. The garbler may linearize and reduce the size of the unique garbler data share. The garbler may send to the evaluator a garbled circuit, a garbling of the linear unique garbled data share, and garbled potential wires for the evaluator to garble its linear unique evaluator data share by oblivious transfer. The evaluator may evaluate the garbled circuit to execute a SIMD program to combine, in parallel, multiple indices of the linear garbler and evaluator unique data shares to efficiently generate an encrypted result of the garbled circuit.
-
公开(公告)号:US11763021B2
公开(公告)日:2023-09-19
申请号:US17504877
申请日:2021-10-19
发明人: David Bruce Cousins
CPC分类号: G06F21/6227 , H04L9/008 , H04L9/0643
摘要: An efficient search of a target string by a query string in homomorphically encrypted space. The target string may be encoded by reordering its characters into a plurality of target substrings, each encoding non-sequential characters of the target string separated by a periodic stride K and different target substrings having stride sequences offset relative to each other. The query string may be encoded into a plurality of query substrings, each defining a repeating sequence of a different respective character value in the query string. Each of the substrings may be homomorphically encrypted and hashed. The plurality of hashed encrypted target substrings and plurality of hashed encrypted query substrings may be compared to determine if there is a search result match. A rolling hash may iteratively update the plurality of hashed encrypted target substrings by one target string slot and the comparison may be repeated for each iterative update.
-
公开(公告)号:US11658800B2
公开(公告)日:2023-05-23
申请号:US17337977
申请日:2021-06-03
发明人: Marcelo Blatt
IPC分类号: H04L9/08 , H04L9/00 , H04L9/32 , H04L9/40 , H04W12/102 , H04W12/106 , H04W12/10
CPC分类号: H04L9/008 , H04L9/0819 , H04L9/0894 , H04L9/3236 , H04L63/06 , H04W12/10 , H04W12/102 , H04W12/106 , H04L63/0407 , H04L63/0421
摘要: A system, method, and non-transitory computer readable storage medium for privacy preserving routing of a data packet. The data packet may comprise a packet header and a data payload; the packet header comprising at least a homomorphically encrypted final destination address of a final destination device. An intermediate routing device may receive the data packet. At the intermediate routing device, in a non-TEE, homomorphic computations may be performed to determine a homomorphically encrypted address of a next intermediate routing device. At the intermediate routing device, in a TEE, one or more secret homomorphic decryption keys may be stored and used to decrypt the homomorphically encrypted address of the next address of the next intermediate routing device. The data packet may be transmitted to the decrypted address of the next intermediate routing device according to an updated packet header with the unencrypted address of the next intermediate routing device in the sequence.
-
公开(公告)号:US20220360427A1
公开(公告)日:2022-11-10
申请号:US17737480
申请日:2022-05-05
发明人: David Bruce COUSINS
摘要: Systems and methods for digital circuit emulation with homomorphic encryption include: receiving, by a hardware design tool chain, a customization file containing a predetermined set of one or more cells; converting, by the hardware design tool chain, a first digital circuit representation in a set of hardware design language (HDL) files into a second digital circuit representation based on the predetermined set of cells in the customization file; receiving, by an encrypted circuit emulator, a set of encrypted inputs; and executing, by the encrypted circuit emulator, the second digital circuit representation using the set of encrypted inputs to generate a set of encrypted outputs.
-
公开(公告)号:US11323240B2
公开(公告)日:2022-05-03
申请号:US16287512
申请日:2019-02-27
发明人: Vinod Vaikuntanathan
摘要: An interactive multi-party system for collaboratively performing homomorphic operations, such that no party has access to unencrypted data or an unencrypted operator. A first party device may add noise to encrypted data and an encrypted linear operator to generate noisy encrypted data and a noisy encrypted operator, and transmit the noisy encrypted data and operator to a second party device possessing a secret decryption key for the encryption. The second party device may decrypt the noisy encrypted data and noisy encrypted operator to generate unencrypted noisy data and an unencrypted noisy operator, solve the linear operation using the unencrypted noisy data and an unencrypted noisy operator to generate a noisy solution, encrypt the noisy solution to the linear operation, and transmit it to the first party device. The first party device may then cancel the noise of the encrypted noisy solution to generate the encrypted solution to the linear operation.
-
-
-
-
-
-
-
-
-