Multiple evaluation threshold function secret sharing

    公开(公告)号:US11882211B2

    公开(公告)日:2024-01-23

    申请号:US17489592

    申请日:2021-09-29

    CPC classification number: H04L9/085 H04L9/008 H04L9/0662 H04L9/0825

    Abstract: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.

    PRIVACY PRESERVING FULLY HOMOMORPHIC ENCRYPTION WITH CIRCUIT VERIFICATION

    公开(公告)号:US20220060314A1

    公开(公告)日:2022-02-24

    申请号:US16996270

    申请日:2020-08-18

    Abstract: A method of improving data security or privacy in a computing environment includes providing a group identifier value to at least a first user of one or more users and associating a first pseudonym with the first user. The method further includes encrypting a first data set according to a private key and marking the encrypted first data set according to the group identifier and the first pseudonym. The method also includes performing a first operation on the encrypted first data set and transforming the encrypted first data set into an encrypted second data set according to the first operation performed and the first pseudonym, decrypting the encrypted second data set using the private key, and analyzing the decrypted second data set.

    Fully homomorphic encryption from error canceling set systems

    公开(公告)号:US11522672B2

    公开(公告)日:2022-12-06

    申请号:US17164509

    申请日:2021-02-01

    Abstract: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.

    Enforcing access structures in fully homomorphic encryption

    公开(公告)号:US11515996B2

    公开(公告)日:2022-11-29

    申请号:US17164609

    申请日:2021-02-01

    Abstract: A homomorphic encryption system receives a ciphertext output of an arithmetic evaluation function. The arithmetic evaluation function is performed on a ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. The ciphertext output is decrypted using a summation of two or more noise-canceling party identifiers of two or more authorized parties, wherein the intersection property of the sets cancels out errors generated during the decrypting operation for the two or more authorized parties.

    Privacy preserving fully homomorphic encryption with circuit verification

    公开(公告)号:US11496287B2

    公开(公告)日:2022-11-08

    申请号:US16996270

    申请日:2020-08-18

    Abstract: A method of improving data security or privacy in a computing environment includes providing a group identifier value to at least a first user of one or more users and associating a first pseudonym with the first user. The method further includes encrypting a first data set according to a private key and marking the encrypted first data set according to the group identifier and the first pseudonym. The method also includes performing a first operation on the encrypted first data set and transforming the encrypted first data set into an encrypted second data set according to the first operation performed and the first pseudonym, decrypting the encrypted second data set using the private key, and analyzing the decrypted second data set.

    Yes and no secret sharing with hidden access structures

    公开(公告)号:US11956350B2

    公开(公告)日:2024-04-09

    申请号:US17219496

    申请日:2021-03-31

    CPC classification number: H04L9/085 H04L9/0656

    Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.

    SEARCH AND ACCESS PATTERN HIDING VERIFIABLE SEARCHABLE ENCRYPTION FOR DISTRIBUTED SETTINGS WITH MALICIOUS SERVERS

    公开(公告)号:US20220198048A1

    公开(公告)日:2022-06-23

    申请号:US17127038

    申请日:2020-12-18

    Abstract: A method for distributed and private symmetric searchable encryption includes receiving encrypted data, creating a search index for one or more servers based on the encrypted data using a distributed point function (DPF), splitting the encrypted data into a number of portions based on the number of servers, and partitioning the servers into two or more groups. The method also includes updating the search index based on the splitting and the partitioning, transmitting the split encrypted data to the servers based on the updated search index, verifying the transmitted data using data not transmitted to the server, and determining, based on the verifying, whether any server deviated from an assigned protocol.

    Code-based signatures for secure programs

    公开(公告)号:US12008146B2

    公开(公告)日:2024-06-11

    申请号:US17219263

    申请日:2021-03-31

    CPC classification number: G06F21/64 G06F8/71

    Abstract: A computer-implemented method receives at least two unique versions of program code of a program, generates a code-based key for each unique version of the program code, generates a code-based signature for each unique version of the program using a bi-homomorphic pseudorandom function selected from a family of bi-homomorphic pseudorandom functions. Each code-based signature is generated by the selected bi-homomorphic pseudorandom function based on the corresponding code-based key. Each generated code-based signature for each unique version of the program code is incorporated into the program code of the corresponding unique version of the program.

Patent Agency Ranking