SECURE COMPUTATION OF SHARED DATA INTERSECTIONS

    公开(公告)号:US20240205015A1

    公开(公告)日:2024-06-20

    申请号:US18069017

    申请日:2022-12-20

    Applicant: SAP SE

    CPC classification number: H04L9/3239 G06F16/2255 H04L9/008

    Abstract: Mechanisms are disclosed for providing an extended private set intersection nested cuckoo hashing scheme for secure computation of private set intersections. A set of outer hash functions and a set of inner hash functions are exchanged between a server and a client. A server outer hash table is populated using an outer hash function in the set of outer hash functions and the set of server items to create a set of server bins. For each server bin in the server outer hash table, server items to be inserted are iteratively placed into a server inner cuckoo hash table using a plurality of inner hash functions corresponding to each server bin, based on determining that a first corresponding hash table position is free.

    GENERATION OF OPTIMAL PROGRAM VARIATION

    公开(公告)号:US20210349807A1

    公开(公告)日:2021-11-11

    申请号:US16867632

    申请日:2020-05-06

    Applicant: SAP SE

    Abstract: Provided is a system and method for generating a subset of optimal variations of a software program which allow some statements of the control flow to be exposed to side channels. Furthermore, the subset of optimal variations may be selected based on a security and a performance trade-off analysis. In one example, the method may include identifying a set of statements within a control flow of a software program, generating a plurality of variations of the software program which comprise different subsets of statements which are exposed to side channels, respectively, determining one or more pareto-optimal variations of the software program based on side channel leakage values and performance values of the plurality of variations of the software program, and outputting information about the one or more pareto-optimal variations of the software program to a user device.

    Executing encrypted data using secure enclave

    公开(公告)号:US11429750B2

    公开(公告)日:2022-08-30

    申请号:US16988815

    申请日:2020-08-10

    Applicant: SAP SE

    Abstract: Provided is a system and method for executing an encrypted software program within a host platform. The execution may be bifurcated among a trusted module and an untrusted area of the host platform. In one example, the method may include receiving bytecode and encrypted data of a software program, decrypting, via a secure memory area, the encrypted data into decrypted data, executing, via the secure memory area, instructions from the bytecode on the decrypted data to generate execution results, encrypting the generated execution results, and transmitting the encrypted execution results to a remote computing device.

    Generation of optimal program variation

    公开(公告)号:US11354218B2

    公开(公告)日:2022-06-07

    申请号:US16867632

    申请日:2020-05-06

    Applicant: SAP SE

    Abstract: Provided is a system and method for generating a subset of optimal variations of a software program which allow some statements of the control flow to be exposed to side channels. Furthermore, the subset of optimal variations may be selected based on a security and a performance trade-off analysis. In one example, the method may include identifying a set of statements within a control flow of a software program, generating a plurality of variations of the software program which comprise different subsets of statements which are exposed to side channels, respectively, determining one or more pareto-optimal variations of the software program based on side channel leakage values and performance values of the plurality of variations of the software program, and outputting information about the one or more pareto-optimal variations of the software program to a user device.

Patent Agency Ranking