-
公开(公告)号:US11882211B2
公开(公告)日:2024-01-23
申请号:US17489592
申请日:2021-09-29
发明人: Foo Yee Yeo , Nolan Miranda , Vipin Singh Sehrawat
CPC分类号: H04L9/085 , H04L9/008 , H04L9/0662 , H04L9/0825
摘要: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.
-
公开(公告)号:US11956350B2
公开(公告)日:2024-04-09
申请号:US17219496
申请日:2021-03-31
发明人: Foo Yee Yeo , Vipin Singh Sehrawat
CPC分类号: H04L9/085 , H04L9/0656
摘要: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
-
3.
公开(公告)号:US11907392B2
公开(公告)日:2024-02-20
申请号:US17318045
申请日:2021-05-12
发明人: Nolan Miranda , Vipin Singh Sehrawat , Foo Yee Yeo
IPC分类号: G06F21/62 , G06F21/55 , G06F16/248 , G06F16/28 , G06F16/242
CPC分类号: G06F21/6227 , G06F16/248 , G06F16/2448 , G06F16/284 , G06F21/556
摘要: A function is decomposed into a plurality of function shares. The function returns a Boolean result based on whether an input y satisfies a query on a data set. The function shares hide the function from non-collaborating entities that separately execute the function shares. Each of the functions shares are sent to one of a plurality of servers having a same data set. The function shares are executed on the data set at the servers to obtain a respective plurality of shares. A conditional disclosure of secrets operation is simulated on the shares and the input y. The conditional disclosure of secrets operation uses a secret known to at least one of the servers, and further uses a source of randomness shared between the servers. A Boolean value corresponding to the Boolean result is returned based on the conditional disclosure of secrets operation returning the secret.
-
公开(公告)号:US20220263654A1
公开(公告)日:2022-08-18
申请号:US17177780
申请日:2021-02-17
摘要: A method includes receiving, in a data storage device, a request from a client computer for a portion of ciphertext stored in the data storage device, and providing, by a controller of the data storage device, the portion of the ciphertext to the client computer. The method also includes receiving, in the data storage device, an update token generated by the client computer from the portion of the ciphertext. The method further includes performing, by the controller of the data storage device, re-encryption of the ciphertext using the update token.
-
公开(公告)号:US11362816B2
公开(公告)日:2022-06-14
申请号:US17018991
申请日:2020-09-11
发明人: Vipin Singh Sehrawat , Foo Yee Yeo
摘要: A layered secret sharing scheme in which a trust set of each of the parties receiving a share of the secret is received and used to generate an authorized set and an adversary set for reconstruction of a secret. In this regard, an access structure defining an authorized subset of participants may be based, at least in part, on the encoded trust subsets of the shares. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized subset of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized subset of participants or if participants define an adversary subset, the secret reconstruction fails. In this regard, even if an authorized subset is present, if an adversary subset is present, the reconstruction may be “killed.”
-
公开(公告)号:US11522672B2
公开(公告)日:2022-12-06
申请号:US17164509
申请日:2021-02-01
发明人: Vipin Singh Sehrawat , Foo Yee Yeo
摘要: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.
-
公开(公告)号:US11515996B2
公开(公告)日:2022-11-29
申请号:US17164609
申请日:2021-02-01
发明人: Vipin Singh Sehrawat , Foo Yee Yeo
摘要: A homomorphic encryption system receives a ciphertext output of an arithmetic evaluation function. The arithmetic evaluation function is performed on a ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. The ciphertext output is decrypted using a summation of two or more noise-canceling party identifiers of two or more authorized parties, wherein the intersection property of the sets cancels out errors generated during the decrypting operation for the two or more authorized parties.
-
公开(公告)号:US11711212B2
公开(公告)日:2023-07-25
申请号:US17177780
申请日:2021-02-17
CPC分类号: H04L9/0891 , H04L9/0618 , H04L9/0894 , H04L9/3213
摘要: A method includes receiving, in a data storage device, a request from a client computer for a portion of ciphertext stored in the data storage device, and providing, by a controller of the data storage device, the portion of the ciphertext to the client computer. The method also includes receiving, in the data storage device, an update token generated by the client computer from the portion of the ciphertext. The method further includes performing, by the controller of the data storage device, re-encryption of the ciphertext using the update token.
-
9.
公开(公告)号:US20220374539A1
公开(公告)日:2022-11-24
申请号:US17318045
申请日:2021-05-12
发明人: Nolan Miranda , Vipin Singh Sehrawat , Foo Yee Yeo
IPC分类号: G06F21/62 , G06F21/55 , G06F16/242 , G06F16/28 , G06F16/248
摘要: A function is decomposed into a plurality of function shares. The function returns a Boolean result based on whether an input y satisfies a query on a data set. The function shares hide the function from non-collaborating entities that separately execute the function shares. Each of the functions shares are sent to one of a plurality of servers having a same data set. The function shares are executed on the data set at the servers to obtain a respective plurality of shares. A conditional disclosure of secrets operation is simulated on the shares and the input y. The conditional disclosure of secrets operation uses a secret known to at least one of the servers, and further uses a source of randomness shared between the servers. A Boolean value corresponding to the Boolean result is returned based on the conditional disclosure of secrets operation returning the secret.
-
公开(公告)号:US11316673B2
公开(公告)日:2022-04-26
申请号:US17018899
申请日:2020-09-11
发明人: Vipin Singh Sehrawat , Foo Yee Yeo
摘要: A secret sharing scheme in which a trust structure of the parties receiving a share of the secret is encoded in the shares. In this regard, an access structure defining an authorized set of participants may be based, at least in part, on the encoded trust structures. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized set of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized set of participants, the secret reconstruction fails. In this regard, secret sharing with asymmetrical trust structures may be provided in which the trust structures are not known by other parties in the scheme.
-
-
-
-
-
-
-
-
-