Linking encrypted datasets using common identifiers

    公开(公告)号:US11775658B2

    公开(公告)日:2023-10-03

    申请号:US17860003

    申请日:2022-07-07

    摘要: A device, system and method for linking encrypted data sets using common encrypted identifiers in encrypted space. A first and second parties' encrypted data sets may include first and second respective encrypted data and associated first and second respective encrypted identifiers. The first and second encrypted identifiers may be converted into a first and second respective sets of a plurality of elemental identifier components. Each of the plurality of elemental identifier components in each component set characterizes a distinct numeric property of the corresponding converted encrypted identifier. The first and second sets of the plurality of elemental identifier components may be composed, component-by-component, to generate a plurality of component-specific results. If the plurality of component-specific results are determined to satisfy a matching criterion indicating that the first and second encrypted identifiers match, the first and second encrypted data associated with the first and second matching encrypted identifiers may be linked.

    SYSTEM AND METHOD FOR SECURELY EVALUATING RISK OVER ENCRYPTED DATA

    公开(公告)号:US20220414235A1

    公开(公告)日:2022-12-29

    申请号:US17851475

    申请日:2022-06-28

    IPC分类号: G06F21/60 H04L9/00

    摘要: Methods and system for risk determination and risk categorization using encrypted data are provided. The risk determination can involve determining an inner product operation between a generalized weight table and an encrypted incidence vector, summing the result of the inner product operation and/or decrypting the results. Method and systems for encrypting data for use in homomorphic risk determination are also provided.

    PRIVACY PRESERVING ROUTING
    3.
    发明申请

    公开(公告)号:US20210399983A1

    公开(公告)日:2021-12-23

    申请号:US17337977

    申请日:2021-06-03

    发明人: Marcelo BLATT

    摘要: A system, method, and non-transitory computer readable storage medium for privacy preserving routing of a data packet. The data packet may comprise a packet header and a data payload; the packet header comprising at least a homomorphically encrypted final destination address of a final destination device. An intermediate routing device may receive the data packet. At the intermediate routing device, in a non-TEE, homomorphic computations may be performed to determine a homomorphically encrypted address of a next intermediate routing device. At the intermediate routing device, in a TEE, one or more secret homomorphic decryption keys may be stored and used to decrypt the homomorphically encrypted address of the next address of the next intermediate routing device. The data packet may be transmitted to the decrypted address of the next intermediate routing device according to an updated packet header with the unencrypted address of the next intermediate routing device in the sequence.

    Device, system and method for token based outsourcing of computer programs

    公开(公告)号:US10885158B2

    公开(公告)日:2021-01-05

    申请号:US15996862

    申请日:2018-06-04

    摘要: A multi-party system, devices, and method for token-based obfuscation of secret information. A first party device may store a secret original program T and original data D, retrieve a set of secret keys SK, obfuscate the original program T with the set of secret keys SK to generate an obfuscated program T′, obfuscate the original data D with the set of secret keys SK to generate a token of the data Token(D), and transfer the obfuscated program T′ and Token(D) to a second party device. The second party device may evaluate the obfuscated program T′ on the token of the data Token(D) to generate a result equivalent to evaluating the original program T on the original data D if the same set of secret keys SK is used to obfuscate the original program T and the original data D, without exposing the original program T to the second party.

    SECURE SEARCH OF SECRET DATA IN A SEMI-TRUSTED ENVIRONMENT USING HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20200228308A1

    公开(公告)日:2020-07-16

    申请号:US16739313

    申请日:2020-01-10

    IPC分类号: H04L9/00 H04L9/32 G06F16/2455

    摘要: A system and method for secure searching in a semi-trusted environment by comparing first and second data (query and target data). A first data provider may map first secret data to a first plurality of tokens using a token codebook, concatenate the first plurality of tokens to generate a first token signature, and homomorphically encrypt the first token signature. A second data provider may map second data to a second plurality of tokens using the token codebook, concatenate the second plurality of tokens to generate a second token signature, and compare the homomorphically encrypted first token signature and an unencrypted or homomorphically encrypted second token signature to generate a homomorphically encrypted comparison. A trusted party may decrypt the homomorphically encrypted comparison, using a secret homomorphic decryption key, to determine if the token signatures match or not respectively indicating the search query is found or not in the target data.

    Efficient secure string search using homomorphic encryption

    公开(公告)号:US11763021B2

    公开(公告)日:2023-09-19

    申请号:US17504877

    申请日:2021-10-19

    摘要: An efficient search of a target string by a query string in homomorphically encrypted space. The target string may be encoded by reordering its characters into a plurality of target substrings, each encoding non-sequential characters of the target string separated by a periodic stride K and different target substrings having stride sequences offset relative to each other. The query string may be encoded into a plurality of query substrings, each defining a repeating sequence of a different respective character value in the query string. Each of the substrings may be homomorphically encrypted and hashed. The plurality of hashed encrypted target substrings and plurality of hashed encrypted query substrings may be compared to determine if there is a search result match. A rolling hash may iteratively update the plurality of hashed encrypted target substrings by one target string slot and the comparison may be repeated for each iterative update.

    Privacy preserving routing
    8.
    发明授权

    公开(公告)号:US11658800B2

    公开(公告)日:2023-05-23

    申请号:US17337977

    申请日:2021-06-03

    发明人: Marcelo Blatt

    摘要: A system, method, and non-transitory computer readable storage medium for privacy preserving routing of a data packet. The data packet may comprise a packet header and a data payload; the packet header comprising at least a homomorphically encrypted final destination address of a final destination device. An intermediate routing device may receive the data packet. At the intermediate routing device, in a non-TEE, homomorphic computations may be performed to determine a homomorphically encrypted address of a next intermediate routing device. At the intermediate routing device, in a TEE, one or more secret homomorphic decryption keys may be stored and used to decrypt the homomorphically encrypted address of the next address of the next intermediate routing device. The data packet may be transmitted to the decrypted address of the next intermediate routing device according to an updated packet header with the unencrypted address of the next intermediate routing device in the sequence.

    SYSTEM AND METHOD FOR DIGITAL CIRCUIT EMULATION WITH HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20220360427A1

    公开(公告)日:2022-11-10

    申请号:US17737480

    申请日:2022-05-05

    IPC分类号: H04L9/00 G06F30/32

    摘要: Systems and methods for digital circuit emulation with homomorphic encryption include: receiving, by a hardware design tool chain, a customization file containing a predetermined set of one or more cells; converting, by the hardware design tool chain, a first digital circuit representation in a set of hardware design language (HDL) files into a second digital circuit representation based on the predetermined set of cells in the customization file; receiving, by an encrypted circuit emulator, a set of encrypted inputs; and executing, by the encrypted circuit emulator, the second digital circuit representation using the set of encrypted inputs to generate a set of encrypted outputs.

    Interactive techniques for accelerating homomorphic linear operations on encrypted data

    公开(公告)号:US11323240B2

    公开(公告)日:2022-05-03

    申请号:US16287512

    申请日:2019-02-27

    IPC分类号: H04L9/32 H04L9/00 H04L9/14

    摘要: An interactive multi-party system for collaboratively performing homomorphic operations, such that no party has access to unencrypted data or an unencrypted operator. A first party device may add noise to encrypted data and an encrypted linear operator to generate noisy encrypted data and a noisy encrypted operator, and transmit the noisy encrypted data and operator to a second party device possessing a secret decryption key for the encryption. The second party device may decrypt the noisy encrypted data and noisy encrypted operator to generate unencrypted noisy data and an unencrypted noisy operator, solve the linear operation using the unencrypted noisy data and an unencrypted noisy operator to generate a noisy solution, encrypt the noisy solution to the linear operation, and transmit it to the first party device. The first party device may then cancel the noise of the encrypted noisy solution to generate the encrypted solution to the linear operation.