ENHANCED ENCRYPTION FOR FACE-RELATED DATA
    3.
    发明公开

    公开(公告)号:US20240340159A1

    公开(公告)日:2024-10-10

    申请号:US18744901

    申请日:2024-06-17

    申请人: Verkada Inc.

    IPC分类号: H04L9/00 G06F21/60

    CPC分类号: H04L9/008 G06F21/602

    摘要: A method includes obtaining a plurality of representative vectors associated with face-related data. The method includes determining an encryption key based on a parameter stored in a record, generating an encrypted vector set by, for each respective vector of the plurality of representative vectors, encrypting the respective vector with a homomorphic encryption operation based on the encryption key, where the encrypted vector set includes a first encrypted vector that is linked to a subset of the face-related data associated with the first plurality of face vectors. The method further includes obtaining an encrypted face search vector using the encryption key to perform homomorphic encryption. The method further includes selecting a first encrypted vector based on the encrypted face search vector and retrieving the subset of the face-related data based on the first encrypted vector.

    Compression of homomorphic ciphertexts

    公开(公告)号:US12113889B2

    公开(公告)日:2024-10-08

    申请号:US17717093

    申请日:2022-04-10

    发明人: Guy Moshkowich

    IPC分类号: H04L9/00 G06F21/00

    CPC分类号: H04L9/008 G06F21/00 H04L9/00

    摘要: A computer-implemented method including: receiving a list of ciphertexts, wherein a majority of ciphertexts in the list homomorphically-encrypt zero values and a minority of ciphertexts in the list homomorphically-encrypt non-zero values; and compressing the list of ciphertexts to remove the ciphertexts which homomorphically-encrypt zero values, wherein: the compression is performed without knowledge on what each of the ciphertexts in the list encrypts, and the compression is based on homomorphic comparison of each of the ciphertexts in the list with a homomorphically-encrypted zero value, to determine which of the ciphertexts in the list to remove.

    ELECTRONIC DEVICE AND METHOD FOR DISTRIBUTING SECRET KEYS THEREOF

    公开(公告)号:US20240323002A1

    公开(公告)日:2024-09-26

    申请号:US18588413

    申请日:2024-02-27

    IPC分类号: H04L9/08 H04L9/00

    摘要: Disclosed is an electronic device which distributes secret keys by using a t-out-of-N secret sharing scheme. The electronic device includes: a communication device; a memory storing the secret key; and a processor configured to generate a plurality of secret shares corresponding to a level of 1 by segmenting the secret key corresponding to a level of zero based on a predetermined secret sharing scheme, generate a plurality of secret shares corresponding to a level of L by repeatedly performing a process of generating a plurality of secret shares corresponding to a next level by segmenting the plurality of secret shares each corresponding to the respective levels ranging from the level of 1 based on the predetermined secret sharing scheme, and transmit the plurality of secret shares corresponding to the level of L to N electronic devices through the communication device.

    Private Retrieval of Location-Based Information

    公开(公告)号:US20240283632A1

    公开(公告)日:2024-08-22

    申请号:US18421778

    申请日:2024-01-24

    申请人: Apple Inc.

    IPC分类号: H04L9/00 H04W8/26 H04W12/04

    CPC分类号: H04L9/008 H04W8/26 H04W12/04

    摘要: A computing device sends a request for location-based information (LBI) to a server, where the request includes first address information indicative of a geographic area (e.g., where the computing device is located), and an encrypted version of second address information that specifies a sub-region of the geographic area. The second address information is encrypted by a first key not accessible to the server. The first address information is used to select a subset of the LBI stored on the server. The server then performs a privacy protocol such as Private Information Retrieval on the selected subset using the encrypted second address information. This produces an encrypted version of the requested LBI without the server having access to information indicating which item of LBI was requested. The encrypted version of the particular item of LBI is returned to the computing device, where it can be decrypted using a second key.