H04L9/008

CONVERSION DEVICE FOR SECURE COMPUTATION, SECURE COMPUTATION SYSTEM, CONVERSION METHOD FOR SECURE COMPUTATION AND CONVERSION PROGRAM FOR SECURE COMPUTATION
20230041118 · 2023-02-09 ·

A conversion device for secure computation for converting an input data which is an object data of secure computation into an input format applicable to the secure computation is provided. A conversion device for secure computation of the present invention includes an acquisition unit configured to acquire an object data of the secure computation; a storage unit configured to store a correspondence table specifying an input format required for executing the secure computation; a conversion processing unit configured to perform a conversion from the acquired object data into a secure computation data in accordance with the correspondence table; and an output unit configured to output the secure computation data.

PRIVACY PRESERVING ARTIFICIAL INTELLIGENCE BASED CLINICAL DECISION SUPPORT

Data privacy is a major concern when accessing and processing sensitive medical data. Homomorphic Encryption (HE) is one technique that preserves privacy while allowing computations to be performed on encrypted data. An encoding method enables typical HE schemes to operate on real-valued numbers of arbitrary precision and size by representing the numbers as a series of polynomial terms.

STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOF

A method of transmitting data in a storage device includes encrypting original data based on a homomorphic encryption algorithm to generate encrypted data, generating a parameter for regeneration of a ciphertext higher than an operation level of the encrypted data by using the encrypted data and a key value, and transmitting the encrypted data and the parameter to an external host device.

Scalable runtime validation for on-device design rule checks

An apparatus to facilitate scalable runtime validation for on-device design rule checks is disclosed. The apparatus includes a memory to store a contention set, one or more multiplexors, and a validator communicably coupled to the memory. In one implementation, the validator is to: receive design rule information for the one or more multiplexers, the design rule information referencing the contention set; analyze, using the design rule information, a user bitstream against the contention set at a programming time of the apparatus, the user bitstream for programming the one or more multiplexors; and provide an error indication responsive to identifying a match between the user bitstream and the contention set.

Secure eco-routing with databases under homomorphic encryption

A method for generating energy-optimized travel routes for a motor vehicle includes one or more of the following: receiving an origin destination (OD) of the motor vehicle and an encrypted energy consumption database of the motor vehicle; generating N candidate routes for the OD; evaluating encrypted energy consumption over a route using an encrypted energy consumption database; applying at least one of homomorphic addition function or homomorphic multiplication function to the encrypted energy consumption data; and returning N candidate routes and their encrypted energy consumption to a client.

Secure analytics using homomorphic and injective format-preserving encryption
11558358 · 2023-01-17 · ·

Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource.

Apparatus and method for encryption, apparatus and method for converting ciphertext

A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext.

Encryption method and apparatus based on homomorphic encryption using composition of functions

An encryption method and apparatus based on homomorphic encryption using a composition of functions. The encryption method includes generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on a composition of a function for a modulus corresponding to the ciphertext.

Methods and systems for a synchronized distributed data structure for federated machine learning

A system for an artificial intelligence synchronized distributed ledger. The system includes a computing device containing a receiving module, the receiving module designed and configured to receive an input from a remote device, parse the input to identify protected and non-protected data contained within the input, transform the protected data into a digitally signed assertion and convert the non-protected into an encrypted datastore. The computing device containing a processing module, the processing module designed and configured to receive the digitally signed assertion from the receiving module, insert the digitally signed assertion into an immutable sequential data structure, receive the encrypted datastore, retrieve at least an input, generate a record utilizing the at least a retrieved input, and perform a first machine-learning process utilizing the at least a retrieved input.

Integrity protection for homomorphic computations
11550961 · 2023-01-10 · ·

Systems and methods for securely verifying integrity of application responses are disclosed. One example method includes receiving, from a client, an application encrypted in accordance with a fully homomorphic encryption (FHE) algorithm, generating, with a trained machine learning model associated with the FHE algorithm, a plurality of first application labels, each first application label indicating a true or false response associated with the application, inverting a randomly selected portion of the plurality of first application labels, generating a first randomly sorted list including the plurality of first application labels, transmitting the first randomly sorted list to the client, receiving a first decrypted list from the client, performing a validation of at least the first decrypted list, the validation based at least in part on the plurality of first application labels, and in response to the validation being successful, providing the client with a response to the application.