Device specific multiparty computation

    公开(公告)号:US12289399B2

    公开(公告)日:2025-04-29

    申请号:US17514755

    申请日:2021-10-29

    Abstract: The disclosure provides systems and methods for a multi-party secret sharing protocol that includes determining device channel errors of a plurality of computing devices based on channel impulse response (CIR) of communication channels of the plurality of computing devices, training a linear regression model using the device channel errors to generate learning with error (LWE) secrets for each of the plurality of computing devices, generating a general access structure secret matrix using the LWE secrets from each of the plurality of computing devices, and distributing shares of the general access structure secret matrix to the plurality of computing devices based on a multi-party secret sharing protocol.

    UPDATEABLE ENCRYPTION IN SELF ENCRYPTING DRIVES

    公开(公告)号:US20250125955A1

    公开(公告)日:2025-04-17

    申请号:US18925554

    申请日:2024-10-24

    Abstract: A method of rotating a set of keys, having a media encryption key (MEK) and a current media encryption key encryption key (MEKEK) encrypted and stored in a self-encrypting drive (SED) having data encrypted with the MEK (MEK (data)), includes decrypting the stored MEK and the current MEKEK. A new MEK (MEK′) and a new MEKEK (MEKEK′) are generated. The MEKEK′ is encrypted to replace the current encrypted MEKEK. A concatenation of the MEK and the MEK′ is encrypted with MEKEK′. The encrypted data MEK (data) is re-encrypted with MEK′.

    DISTRIBUTED MESSAGE AUTHENTICATION CODES FOR MULTIPLE PARTIES

    公开(公告)号:US20250097028A1

    公开(公告)日:2025-03-20

    申请号:US18759321

    申请日:2024-06-28

    Abstract: A computing system cryptographically generates an intermediate message authentication code as a function of the message and a cryptographic key assigned to a first party. The computing system also generates a first instance of an aggregate message authentication code corresponding to the message by combining the intermediate message authentication code with one or more other intermediate message authentication codes of one or more second parties. Each code of the one or more other intermediate message authentication codes is cryptographically generated as a function of the message and individual cryptographic key assigned to each of the one or more second parties.

    VALUE-DEPENDENT QUANTIZATION FOR MACHINE LEARNING

    公开(公告)号:US20250094791A1

    公开(公告)日:2025-03-20

    申请号:US18759483

    申请日:2024-06-28

    Abstract: A computing system determines a maximum field size for a field containing values of quantized versions of a weight matrix, an input data matrix, and a bias matrix and determines a weight upper bound of scaling factors for the weight matrix based on values of the weight matrix, an input data upper bound of scaling factors for the input data matrix based on values of the input data matrix, and a bias upper bound of scaling factors for the bias matrix based on values of the bias matrix. The computing system also sets a weight scaling factor of the weight matrix, an input data scaling factor of the input data matrix, and a bias scaling factor for the bias matrix in two different cases: when the sum is less than or equal to the bias upper bound and when the sum is greater than the bias upper bound.

    Method for grain size analysis
    7.
    发明授权

    公开(公告)号:US12229933B2

    公开(公告)日:2025-02-18

    申请号:US17539964

    申请日:2021-12-01

    Abstract: Methods for analysis of the magnetic grain using a software program effectively and accurately by improving the magnetic grain boundary contrast from an image prior to analyzing the grain size with an imaging analysis program. A method for automated grain size analysis includes obtaining a SEM electronic image of a magnetic material composed of a plurality of grains and modifying the image by smoothing the image, removing high spatial and low spatial frequencies from the image, improving contrast of the image, pixelating the image, processing the image to a binary image, and clearing outer edges of the binary image to remove at least incomplete grains to generate grain size data from the image.

    Cartridge data storage with information-theoretic security

    公开(公告)号:US12189831B2

    公开(公告)日:2025-01-07

    申请号:US17077875

    申请日:2020-10-22

    Abstract: A secure cartridge-based storage system includes a set of read/write control electronics on a shared controller adapted to removably couple with each of a plurality of storage cartridges. Data blocks within primary non-volatile memory of the cartridge-based storage system collectively comprise a main store with information-theoretic security. The shared controller incorporates various controls for providing selective data access to individual data magazines and/or cartridges as well as for partitioning user data and writing the partitioned data according to an information-theoretic security scheme and reading the partitioned data and reconstructing the user data from the partitioned data.

    EVOLVING THRESHOLD FUNCTION SECRET SHARING

    公开(公告)号:US20240421983A1

    公开(公告)日:2024-12-19

    申请号:US18742990

    申请日:2024-06-13

    Abstract: Evolving function secret sharing is performed on a given function by multiple share parties, A dealer selects a random vector for each share party corresponding to an arrival order. The dealer generates an array of function shares for each share party of the set, each array including a function share based on the random vector corresponding to the share party and one or more function shares cryptographically generated based on the random vector corresponding to each previously-arrived share party. The dealer distributes an array of the function shares to each share party, wherein a first function share result resulting from a computation of a first function share on given input data and at least a second function share result resulting from a computation of a second function share on the given input data are combinable to yield a result of the given function executed on the given input data.

Patent Agency Ranking