-
公开(公告)号:US12120217B2
公开(公告)日:2024-10-15
申请号:US18213193
申请日:2023-06-22
发明人: Lex Aaron Anderson
CPC分类号: H04L9/008 , G06F21/60 , G06F21/602 , G06F21/606 , H04L9/0631 , H04L9/0861 , H04L9/302 , H04L2209/16
摘要: A fully homomorphic white-box implementation of one or more cryptographic operations is presented. This method allows construction of white-box implementations from general-purpose code without necessitating specialized knowledge in cryptography, and with minimal impact to the processing and memory requirements for non-white-box implementations. This method and the techniques that use it are ideally suited for securing “math heavy” implementations, such as codecs, that currently do not benefit from white-box security because of memory or processing concerns. Further, the fully homomorphic white-box construction can produce a white-box implementation from general purpose program code, such as C or C++.
-
公开(公告)号:US12120215B2
公开(公告)日:2024-10-15
申请号:US17498954
申请日:2021-10-12
发明人: Andrea Maria Milazzo , Haris Pasic
IPC分类号: H04L9/00 , G06F16/903 , G06F16/9035 , G06F21/62 , G06N20/00 , G06Q20/40 , H04L9/08
CPC分类号: H04L9/008 , G06F16/90335 , G06F21/6227 , G06N20/00 , G06Q20/401 , H04L9/0819 , H04L9/0869 , H04L9/50
摘要: This disclosure is directed to a computer system and method to assist in identifying data feature intersection or overlap between private datasets without revealing any specific data items or data features in the datasets. Various technical components including natural language processing, lexical optimization, and encryption and key management technologies such as homomorphic encryption and secret sharing and coding, are integrated into the disclosed system and method to achieve the data feature intersection identification. Such a system and method may be employed in circumstances where data feature intersection is important for collaborative efforts between entities.
-
公开(公告)号:US20240340159A1
公开(公告)日:2024-10-10
申请号:US18744901
申请日:2024-06-17
申请人: Verkada Inc.
CPC分类号: H04L9/008 , G06F21/602
摘要: A method includes obtaining a plurality of representative vectors associated with face-related data. The method includes determining an encryption key based on a parameter stored in a record, generating an encrypted vector set by, for each respective vector of the plurality of representative vectors, encrypting the respective vector with a homomorphic encryption operation based on the encryption key, where the encrypted vector set includes a first encrypted vector that is linked to a subset of the face-related data associated with the first plurality of face vectors. The method further includes obtaining an encrypted face search vector using the encryption key to perform homomorphic encryption. The method further includes selecting a first encrypted vector based on the encrypted face search vector and retrieving the subset of the face-related data based on the first encrypted vector.
-
公开(公告)号:US12113889B2
公开(公告)日:2024-10-08
申请号:US17717093
申请日:2022-04-10
发明人: Guy Moshkowich
摘要: A computer-implemented method including: receiving a list of ciphertexts, wherein a majority of ciphertexts in the list homomorphically-encrypt zero values and a minority of ciphertexts in the list homomorphically-encrypt non-zero values; and compressing the list of ciphertexts to remove the ciphertexts which homomorphically-encrypt zero values, wherein: the compression is performed without knowledge on what each of the ciphertexts in the list encrypts, and the compression is based on homomorphic comparison of each of the ciphertexts in the list with a homomorphically-encrypted zero value, to determine which of the ciphertexts in the list to remove.
-
公开(公告)号:US20240323002A1
公开(公告)日:2024-09-26
申请号:US18588413
申请日:2024-02-27
发明人: Wonhee Cho , Jung Hee Cheon
CPC分类号: H04L9/085 , H04L9/008 , H04L9/0819
摘要: Disclosed is an electronic device which distributes secret keys by using a t-out-of-N secret sharing scheme. The electronic device includes: a communication device; a memory storing the secret key; and a processor configured to generate a plurality of secret shares corresponding to a level of 1 by segmenting the secret key corresponding to a level of zero based on a predetermined secret sharing scheme, generate a plurality of secret shares corresponding to a level of L by repeatedly performing a process of generating a plurality of secret shares corresponding to a next level by segmenting the plurality of secret shares each corresponding to the respective levels ranging from the level of 1 based on the predetermined secret sharing scheme, and transmit the plurality of secret shares corresponding to the level of L to N electronic devices through the communication device.
-
6.
公开(公告)号:US20240313946A1
公开(公告)日:2024-09-19
申请号:US18605252
申请日:2024-03-14
申请人: CRYPTO LAB INC.
发明人: Jung Hee Cheon , Junyoung Jung , Taeseong Kim , Keewoo Lee , Jai Hyun Park
IPC分类号: H04L9/00 , G06F9/4401 , H04L9/30
CPC分类号: H04L9/008 , G06F9/4401 , H04L9/3033
摘要: Disclosed are an electronic apparatus and a control method thereof. According to the present disclosure, an electronic apparatus with N-bit hardware architecture includes a memory configured to store a scaling factor, and a processor configured to obtain a homomorphic encrypted message with an M*N-bit word size, and perform an operation on the homomorphic encrypted message using the scaling factor. In this case, the M is an integer of 2 or more, and the scaling factor is composed of M prime numbers.
-
公开(公告)号:US20240305464A1
公开(公告)日:2024-09-12
申请号:US18598233
申请日:2024-03-07
发明人: Sunpill Kim , Seunghun Paik , Chanwoo Hwang , Dongsu Kim , Jae Hong Seo , Junbum Shin , Jung Woo Kim
CPC分类号: H04L9/3231 , G06V40/168 , G06V40/172 , H04L9/008
摘要: Disclosed is a server. The server includes a camera, a memory configured to store an encrypted database generated based on a plurality of feature vectors corresponding to a plurality of users, and a processor configured to acquire an image obtained by capturing a target user's face using the camera and transform a feature vector acquired from the image based on transformation and identify the target user based on the transformed feature vector and the encrypted database. The encrypted database is generated by transforming the plurality of feature vectors based on the transformation and homomorphically encrypting the plurality of transformed feature vectors. The transformation transforms components of the feature vectors into 1, −1, or 0 depending on magnitudes and signs of the components of the feature vectors.
-
公开(公告)号:US12088565B2
公开(公告)日:2024-09-10
申请号:US17939585
申请日:2022-09-07
申请人: TripleBlind, Inc.
IPC分类号: G06F16/00 , G06F17/16 , G06F18/2113 , G06F18/24 , G06N3/04 , G06N3/082 , G06Q20/40 , G06Q30/0601 , H04L9/00 , H04L9/06 , H04L9/40
CPC分类号: H04L63/0428 , G06F17/16 , G06F18/2113 , G06F18/24 , G06N3/04 , G06N3/082 , G06Q20/401 , G06Q30/0623 , H04L9/008 , H04L9/0625 , G06Q2220/00 , H04L2209/46
摘要: A system and method are disclosed for training a recommendation system. The method includes initiating, at a server device, an item-vector matrix V, wherein the item-vector matrix V includes a value m related to a total number of items across one or more client devices and a value d representing a hidden dimension, transmitting the item-vector matrix V to each client device, wherein each client device trains a local matrix factorization model using a respective user vector U and the item-vector matrix V to generate a respective set of gradients on each respective client device, receiving, via a secure multi-party compute protocol, and from each client device, the respective set of gradients, updating the item-vector matrix V using the respective set of gradients from each client device to generate an updated item-vector matrix V and downloading the updated item-vector matrix V to at least one client device.
-
公开(公告)号:US20240283632A1
公开(公告)日:2024-08-22
申请号:US18421778
申请日:2024-01-24
申请人: Apple Inc.
发明人: Rehan Rishi , Fabian K. Boemer , Karl Tarbe , Brandon J. Van Ryswyk , Marco Zuliani , Abhishek (APS) Bhowmick , Tancrède Lepoint
摘要: A computing device sends a request for location-based information (LBI) to a server, where the request includes first address information indicative of a geographic area (e.g., where the computing device is located), and an encrypted version of second address information that specifies a sub-region of the geographic area. The second address information is encrypted by a first key not accessible to the server. The first address information is used to select a subset of the LBI stored on the server. The server then performs a privacy protocol such as Private Information Retrieval on the selected subset using the encrypted second address information. This produces an encrypted version of the requested LBI without the server having access to information indicating which item of LBI was requested. The encrypted version of the particular item of LBI is returned to the computing device, where it can be decrypted using a second key.
-
10.
公开(公告)号:US12069157B2
公开(公告)日:2024-08-20
申请号:US18361303
申请日:2023-07-28
申请人: GOOGLE LLC
发明人: Gang Wang , Marcel M. Moti Yung
CPC分类号: H04L9/008 , H04L9/085 , H04L9/3257 , H04L9/3297 , H04L2209/42 , H04L2209/46
摘要: Methods, systems, and apparatus, including a method for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server and from each of multiple client devices, encrypted impression data. A second aggregation server receives, from each of at least a portion of the multiple client devices, encrypted conversion data. The first aggregation server and the second aggregation server perform a multi-party computation process to generate chronological sequences of encrypted impression data and encrypted conversion data and to decrypt the encrypted impression data and the encrypted conversion data.
-
-
-
-
-
-
-
-
-