-
11.
公开(公告)号:US20150215123A1
公开(公告)日:2015-07-30
申请号:US14417184
申请日:2013-07-25
Applicant: Cisco Technology, Inc.
Inventor: Aviad Kipnis , Eliphaz Hibshoosh
CPC classification number: H04L9/008 , G06F7/58 , G06F7/582 , H04L9/00 , H04L9/002 , H04L9/0631 , H04L9/0643 , H04L9/065 , H04L9/08 , H04L9/0869 , H04L9/302 , H04L9/3093 , H04L2209/08 , H04L2209/24
Abstract: A fully homomorphic method and system for randomizing an input, wherein all computations are over a commutative ring is described. Equivalent methods for performing the randomization using matrices and polynomials are detailed, as well as ways to mix the matrix and polynomial functions. Addition, multiplication, and division of the matrix and polynomial functions is further described. By performing computations of the functions modulo N over a ring ZN, the functions are usable as encryption functions. The method and system can also be used for verifying that a returned result of a calculation performed by a third party is valid for any of the calculations described herein. Related methods, systems, and apparatus are also described.
Abstract translation: 描述了用于随机化输入的完全同态方法和系统,其中所有计算都在交换环上。 详细说明了使用矩阵和多项式执行随机化的等效方法,以及混合矩阵和多项式函数的方法。 进一步描述矩阵和多项式函数的加法,乘法和除法。 通过在环ZN上执行模N的函数的计算,这些函数可用作加密函数。 方法和系统还可以用于验证由第三方执行的计算的返回结果对于本文所描述的任何计算是有效的。 还描述了相关方法,系统和装置。
-
公开(公告)号:US20180288023A1
公开(公告)日:2018-10-04
申请号:US16004860
申请日:2018-06-11
Applicant: Cisco Technology, Inc.
Inventor: Eliphaz Hibshoosh , Aviad Kipnis
CPC classification number: H04L63/061 , H04L9/008 , H04L9/0841
Abstract: In one embodiment, a method for secure computation, includes receiving in a server, over a communication channel from a device external to the server a request to perform a modular exponentiation operation in which an exponent of the operation comprises a secret value, wherein the secret value is not provided to the server, and at least two parameters that encode the secret value in accordance with a polynomial or matrix homomorphic encryption of the secret value computed by the device, and performing in the server, in response to the request, a homomorphic exponentiation using the at least two parameters received from the device without decrypting the secret value in the server, so as to generate an output that is indicative of a result of the modular exponentiation operation.
-
公开(公告)号:US09973334B2
公开(公告)日:2018-05-15
申请号:US15068591
申请日:2016-03-13
Applicant: Cisco Technology, Inc.
Inventor: Eliphaz Hibshoosh , Aviad Kipnis , Andrew Sinton
CPC classification number: H04L9/008 , H04L9/0838 , H04L9/3026
Abstract: One embodiment of the invention includes a method, including performing, a symmetric homomorphic encryption of a secret SA with a cryptographic key H as input yielding a homomorphic encryption result SA*, sending SA* for mathematical combination by at least one device with at least one secret SB yielding G*, the device A not having access to SB, the at least one device not having access to SA and not having access to H, receiving G*, performing a symmetric homomorphic decryption of data based on G* with H as input yielding a first decrypted output, determining a symmetric cryptographic key KA based on the first decrypted output for secure communication with a first device which is operationally connected to, or includes, a tamper resistant security system including SA and SB therein, securing data using KA yielding secured data, and sending the secured data to the first device.
-
公开(公告)号:US20140355759A1
公开(公告)日:2014-12-04
申请号:US14324751
申请日:2014-07-07
Applicant: Cisco Technology Inc.
Inventor: Itsik Mantin , Aviad Kipnis
IPC: H04N21/647 , G06T1/00
CPC classification number: H04N21/64715 , G06T1/0021 , G06T1/005 , G06T2201/0061 , H04N7/1675 , H04N21/23892 , H04N21/8355 , H04N21/8358
Abstract: A method and system for embedding a watermark in block encrypted content, including encoding a bit string, the bit string including n bits, denoted b0-bn−1, the encoding including translating each bit, b0-bn−1, into a block of data, according to the following rule if bi=1, then translate bi into a block of data of a first type, and if bi=0, then translate bi into a block of data of a second type, thereby translating the n bits into n blocks of data corresponding to each bit b0-bn−1, arranging a composite block of data including the n blocks of data, and at least one additional block indicating the presence of the n blocks of data, and inserting the composite block of data into a content item as a watermark, wherein the watermarked content item is encrypted using an ECB mode of encryption. Related methods and apparatus are also described.
Abstract translation: 一种用于在块加密内容中嵌入水印的方法和系统,包括编码比特串,包括表示为b0-bn-1的n比特的比特串,包括将每个比特b0-bn-1转换成块 数据,如果bi = 1,则将bi转换成第一类型的数据块,并且如果bi = 0,则将bi转换成第二类型的数据块,从而将n位转换成 对应于每个位b0-bn-1的n个数据块,排列包括n个数据块的数据的合成块,以及指示存在n个数据块的至少一个附加块,以及插入复合数据块 作为水印进入内容项目,其中使用ECB加密模式来加密加水印的内容项目。 还描述了相关方法和装置。
-
-
-