Analysis and debugging of fully-homomorphic encryption

    公开(公告)号:US11856083B2

    公开(公告)日:2023-12-26

    申请号:US17569672

    申请日:2022-01-06

    CPC classification number: H04L9/008 G06F9/3887

    Abstract: In response to identifying that a Single Instruction, Multiple Data (SIMD) operation has been instructed to be performed or has been performed by a Fully-Homomorphic Encryption (FHE) software on one or more original ciphertexts, performing the following steps: Performing the same operation on one or more original plaintexts, respectively, that are each a decrypted version of one of the one or more original ciphertexts. Decrypting a ciphertext resulting from the operation performed on the one or more original ciphertexts. Comparing the decrypted ciphertext with a plaintext resulting from the same operation performed on the one or more original plaintexts. Based on said comparison, performing at least one of: (a) determining an amount of noise caused by the operation, (b) determining whether unencrypted data underlying the one or more original ciphertexts has become corrupt by the operation, and (c) determining correctness of an algorithm which includes the operation.

    Tournament type selection operations on encrypted data

    公开(公告)号:US12289393B2

    公开(公告)日:2025-04-29

    申请号:US17992597

    申请日:2022-11-22

    Abstract: Mechanisms are provided for performing a tournament selection process of a computer function. A request is received to execute the computer function on an input vector data structure, where a result of the computer function is provided by executing the tournament selection process. The input vector data structure is received, comprising a plurality of values where each value corresponds to a vector slot. An index vector data structure is received that comprises indices of the vector slots of the input vector. Iteration(s) of the tournament selection process are executed to identify a value in the input vector satisfying a criterion of the computer function. An operation is performed on the index vector data structure to generate an indicator vector data structure that uniquely identifies a slot in the input vector data structure that is a result of the computer function being executed on the input vector data structure.

    Private vertical federated learning

    公开(公告)号:US12192321B2

    公开(公告)日:2025-01-07

    申请号:US17875987

    申请日:2022-07-28

    Abstract: A second set of data identifiers, comprising identifiers of data usable in federated model training by a second data owner, is received at a first data owner from the second data owner. An intersection set of data identifiers is determined at the first data owner. At the first data owner according to the intersection set of data identifiers, the data usable in federated model training is rearranged by the first data owner to result in a first training dataset. At the first data owner using the intersection set of data identifiers, the first training dataset, and a previous iteration of an aggregated set of model weights, a first partial set of model weights is computed. An updated aggregated set of model weights, comprising the first partial set of model weights and a second partial set of model weights from the second data owner, is received from an aggregator.

    FULLY HOMOMORPHIC ENCRYPTION FOR FIXED-POINT ELEMENTS

    公开(公告)号:US20240275577A1

    公开(公告)日:2024-08-15

    申请号:US18102735

    申请日:2023-01-29

    CPC classification number: H04L9/008 H04L9/0618

    Abstract: A computer-implemented method comprising: receiving, as input, a ciphertext x representing a computational result of an approximated fully-homomorphic encryption (FHE) scheme, wherein ciphertext x comprises an underlying number m and an accumulated computational error e; iteratively, (i) performing a bit extraction operation to extract a current most significant bit (MSB) x′ of ciphertext x, (ii) calculating accuracy parameters α,β associated with x′; (iii) applying a step function to the extracted MSB x′, based, at least in part, on the calculated accuracy parameters α,β, to reduce or remove the accumulated computational error e and to return a clean MSB b, and (iv) repeating steps (i)-(iii) for all bits included in the underlying number m; and reconstructing and outputting, from all of the returned clean MSBs b, the number m.

    NEURAL NETWORK TRAINING WITH HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20230297649A1

    公开(公告)日:2023-09-21

    申请号:US17655566

    申请日:2022-03-21

    CPC classification number: G06K9/6257 G06N3/08 G06N3/04 H04L9/008

    Abstract: A method, a neural network, and a computer program product are provided that optimize training of neural networks using homomorphic encrypted elements and dropout algorithms for regularization. The method includes receiving, via an input to the neural network, a training dataset containing samples that are encrypted using homomorphic encryption. The method also includes determining a packing formation and selecting a dropout technique during training of the neural network based on the packing technique. The method further includes starting with a first packing formation from the training dataset, inputting the first packing formation in an iterative or recursive manner into the neural network using the selected dropout technique, with a next packing formation from the training dataset acting as an initial input that is applied to the neural network for a next iteration, until a stopping metric is produced by the neural network.

    POLYNOMIAL EVALUATION UNDER FULLY HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20250080317A1

    公开(公告)日:2025-03-06

    申请号:US18242067

    申请日:2023-09-05

    Abstract: An embodiment expands a polynomial into a plurality of products, each product in the plurality of products comprising a scaling coefficient multiplied by a sub-polynomial, each sub-polynomial comprising a sum of a plurality of addends, wherein a degree of each sub-polynomial is equal to a grouping parameter. An embodiment computes a plurality of ciphertext products, each ciphertext product equal to a ciphertext multiplied by itself a number of times, the number of times ranging from two to the grouping parameter. An embodiment computes, using the ciphertext and the plurality of ciphertext products in place of a variable of the polynomial, each of the plurality of products. An embodiment multiplies the plurality of products together.

    Neural network training with homomorphic encryption

    公开(公告)号:US12130889B2

    公开(公告)日:2024-10-29

    申请号:US17655566

    申请日:2022-03-21

    CPC classification number: G06F18/2148 G06N3/04 G06N3/08 H04L9/008

    Abstract: A method, a neural network, and a computer program product are provided that optimize training of neural networks using homomorphic encrypted elements and dropout algorithms for regularization. The method includes receiving, via an input to the neural network, a training dataset containing samples that are encrypted using homomorphic encryption. The method also includes determining a packing formation and selecting a dropout technique during training of the neural network based on the packing technique. The method further includes starting with a first packing formation from the training dataset, inputting the first packing formation in an iterative or recursive manner into the neural network using the selected dropout technique, with a next packing formation from the training dataset acting as an initial input that is applied to the neural network for a next iteration, until a stopping metric is produced by the neural network.

    Copy-and-Recurse Operations for Fully Homomorphic Encrypted Database Query Processing

    公开(公告)号:US20240297777A1

    公开(公告)日:2024-09-05

    申请号:US18114682

    申请日:2023-02-27

    CPC classification number: H04L9/008 G06F16/24564

    Abstract: Mechanisms are provided for performing a fully homomorphic encryption operation. The mechanisms generate, for a data set in a backend data store, a tree data structure comprising a hierarchy of nodes and edges connecting the nodes in a parent-child relationship. In response to receiving an encrypted query from a client computing device, a search operation is executed using the tree data structure at least by executing a copy-and-recurse computing tool to identify a portion of the tree data structure to which to apply a fully homomorphic encryption (FHE) operation. The copy-and-recurse computing tool copies a subset of nodes of the tree data structure and recurses the search operation into the copied subset of nodes. The FHE operation is executed on a portion of the data set, corresponding to the identified portion of the tree data structure, to generate results of the FHE operation which are then output.

Patent Agency Ranking