H04L9/008

QUERYING FULLY HOMOMORPHIC ENCRYPTION ENCRYPTED DATABASES USING CLIENT-SIDE PREPROCESSING OR POST-PROCESSING

An example system includes a processor to receive a preprocessed query from a client device for a fully homomorphic encryption (FHE) encrypted database. The processor can execute the preprocessed query on the FHE encrypted database to generate a response. The processor can transmit a partially-processed response to the client device, which can post-process the query computation.

METHOD AND APPARATUS FOR PRIVACY PRESERVING USING HOMOMORPHIC ENCRYPTION WITH PRIVATE VARIABLES
20230081162 · 2023-03-16 ·

Provided is homomorphic encryption data processing method and apparatus and relates to homomorphic encryption data processing method and apparatus that set weighted values to a segment classification value (a logit value) and a distribution value of a dataset including a homomorphic encryption and uses weighted values to perform computation and learning of data in a state in which the homomorphic encryption is maintained.

Method for faster secure multiparty inner product with SPDZ

A method for implementing a secure multiparty inner product computation between two parties using an SPDZ protocol involves having a first party and a second party compute, for i=1, . . . , k, a vector (I)=(II) based on a vector (x={x.sub.1, . . . , x.sub.N}), and a vector (w={W.sub.1, W.sub.N}), respectively, where (I)=(X.sub.2i-1X.sub.2i) (III)=W.sub.2i-1W.sub.2i, N is the total number of elements in the vectors k=N/2. The vectors (I), and (III) are securely shared between the parties. The parties then jointly compute SPDZ protocol Add([w.sub.2i], [x.sub.2i-1]) and Add([w.sub.2i], [x.sub.2i-1]) to determine shares [w.sub.2i-1+x.sub.2i] and [w.sub.2i+x.sub.2i-1] respectively, and then compute, for i=1, . . . , k, inner product shares [d.sub.i] by performing SPDZ protocol Mult([w.sub.2i-1+x.sub.2i], [w.sub.2i+x.sub.2i-1]). SPDZ protocol ([Add d.sub.1], . . . , [d.sub.k], -(IV), . . . , -(V), -(VI), -, (VII)) is then performed to determine the inner product.

Cryptographic methods and systems for managing digital certificates with linkage values

Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), pre-linkage values can be employed. The pre-linkage values can be encrypted using homomorphic encryption. Other embodiments are also provided.

METHOD OF CONSTRUCTING A SEMI-PUBLIC KEY SYSTEM IN QAP-BASED HOMOMORPHIC ENCRYPTION
20230128727 · 2023-04-27 ·

The method of constructing QAP-based Homomorphic Encryption (HE) in the semi-public setting is introduced, which comprises: encryption, computation, and decryption. The data receiver produces a semi-public key Key.sub.s-pub.The data provider can encode his k-qubit plaintext |xcustom-character to a k-qubit ciphertext |ψ.sub.encustom-character=Q.sub.P|xcustom-character via a k-qubit invertible operator Q.sub.P randomly generated by Key.sub.s-pub. From the provider, the message En(ζ.sub.p) of Q.sub.P encoded by a cryptosystem G.sub.crypt in Key.sub.s-pub is transmitted to the receiver through a small-resource communication channel and the ciphertext |ψ.sub.encustom-character is conveyed to the cloud. The receiver creates the instruction of encoded computation U.sub.en=Pcustom-characterMQ.sub.P and transports to the cloud, where M is the required k-qubit arithmetic operation, P a k-qubit permutation, and custom-character a k-qubit operator to mingle with M. According the instruction, the cloud performs the encrypted evaluation U.sub.en|ψ.sub.encustom-character and transfer to the receiver. The decryption Key.sub.privU.sub.en|ψ.sub.encustom-character is conducted by the receiver via the private key Key.sub.priv=<

METHOD OF CONSTRUCTING A PUBLIC-KEY SYSTEM IN QAP-BASED HOMOMORPHIC ENCRYPTION
20230131601 · 2023-04-27 ·

A public-key scheme of Homomorphic Encryption (HE) in the framework Quotient Algebra Partition (QAP) comprises: encryption, computation and decryption. With the data receiver choosing a partition or a QAP, [n, k, C], a public key Key.sub.pub=(VQ.sub.en, custom-character) and a private key Key.sub.priv=custom-character.sup.†P.sup.\ are produced, where VQ.sub.en is the product of an n-qubit permutation V and an n-qubit encoding operator Q.sub.en, custom-character an error generator randomly provides a dressed operator Ē=V.sup.†EV of spinor error E of [n, k, C]. Then, by Key.sub.pub, the sender can encode his k-qubit plaintext |xcustom-character into an n-qubit ciphertext |ψ.sub.encustom-character, which is transmitted to the cloud. The receiver prepares the instruction of encoded computation U.sub.en=Pcustom-characterV.sup.†Q.sub.en.sup.† for a given k-qubit action M and sends to cloud, where custom-character is the error-correction operator of [n, k, C], custom-character=I.sub.2.sub.n−k.Math.M the tensor product of the (n−k)-qubit identity I.sub.2.sub.n−k and M, and V.sup.†Q.sub.en.sup.† and Pcustom-characterSYSTEMS AND METHODS FOR MIXED PRECISION MACHINE LEARNING WITH FULLY HOMOMORPHIC ENCRYPTION

20230126672 · 2023-04-27 ·

Systems and methods for mixed precision machine learning with fully homomorphic encryption are disclosed. A method may include receiving data in a mixed precision format from a program or an application executed by the client electronic device; converting the data from the mixed precision format to an integer format; encrypting the data in the integer format using a fully homomorphic data encryption scheme; communicating the encrypted data in the integer format to a host electronic device, wherein the host electronic device is configured to process the encrypted data in the integer format and provide an encrypted result in the integer format to the client electronic device; decrypting the encrypted result in the integer format using the fully homomorphic data encryption scheme; converting the decrypted result in the integer format to the mixed precision format; and outputting the result in the mixed precision format to the program or the application.

Secure update propagation with digital signatures
11635952 · 2023-04-25 · ·

Certain examples described herein relate to secure update propagation. The examples present systems and methods to transmit data in the form of updates over a network and to ensure the authenticity of the updates. The examples use a set-homomorphic digital signature scheme to sign updates such that a combined digital signature may be used to verify a batch of updates in place of a set of individual digital signatures. The combined digital signature may be generated by aggregating individual digital signatures.

Methods and apparatus to determine provenance for data supply chains

Methods, apparatus, systems and articles of manufacture to determine provenance for data supply chains are disclosed. Example instructions cause a machine to at least, in response to data being generated, generate a local data object and object metadata corresponding to the data; hash the local data object; generate a hash of a label of the local data object; generate a hierarchical data structure for the data including the hash of the local data object and the hash of the label of the local data object; generate a data supply chain object including the hierarchical data structure; and transmit the data and the data supply chain object to a device that requested access to the data.

Methods and system for serving targeted advertisements to a consumer device

A method for auditing an advertisement impression in which a first advertisement was presented in conjunction with first media content is disclosed. The method generally comprises transmitting to a plurality of second computing devices a plurality of randomly generated first cryptographic proofs; receiving, a first message from a second computing device indicating that the first advertisement was presented in conjunction with the first media content; and evaluating the first targeting model for the first advertisement based on the at least one media content classifier.