H04L9/008

MULTIPLE DATA SOURCE SECURE DATA PROCESSING
20230121425 · 2023-04-20 ·

Multiple systems may determine neural-network output data and neural-network parameter data and may transmit the data therebetween to train and run the neural-network model to predict an event given input data. A data-provider system may perform a dot-product operation using encrypted data, and a secure-processing component may decrypt and process that data using an activation function to predict an event. Multiple secure-processing components may be used to perform a multiplication operation using homomorphic encrypted data.

DETERMINING A COMMON SECRET FOR THE SECURE EXCHANGE OF INFORMATION AND HIERARCHICAL, DETERMINISTIC CRYPTOGRAPHIC KEYS
20230068423 · 2023-03-02 ·

A method (300) and system (1) of determining a common secret for two nodes (3, 7). Each node (3, 7) has a respective asymmetric cryptography pair, each pair including a master private key and a master public key. Respective second private and public keys may be determined based on the master private key, master public key and a deterministic key. A common secret may be determined at each of the nodes based on the second private and public keys. In one example, a node (3, 7) may determine the common secret based on (i) a second private key based on the node's own master private key and the deterministic key; and (ii) a second public key based on the other node's master public key and the deterministic key. The invention may be suited for use with, but not limited to, digital wallets, blockchain (e.g. Bitcoin) technologies and personal device security.

METHOD FOR TESTING IF A DATA ELEMENT BELONGS TO A LIST OF REFERENCE DATA ELEMENTS
20230068650 · 2023-03-02 · ·

Provided is a method for testing if a candidate data element, belongs to a list of reference data elements, performed by a client device (102) and comprising the steps of generating an encrypted candidate data element (y′) by encrypting said candidate data element (x′) with a leveled fully homomorphic encryption scheme, transmitting said encrypted candidate data element (y′) to a server device (103), storing said reference data elements (x.sub.i) receiving, from said server device, a delta value depending on a product of differences, decrypting said delta value with said leveled fully homomorphic encryption scheme, based on said decrypted delta value, determining whether said candidate data element (x′) belongs to said list of reference data elements (x.sub.i). Other embodiments disclosed.

SECRET CALCULATION SYSTEM, SECRET CALCULATION METHOD, AND PROGRAM
20230120548 · 2023-04-20 ·

A secret calculation system is a secret calculation system that executes secret calculation for calculating data in an encrypted state, and includes a first acquisition unit that acquires first data encrypted, a second acquisition unit that acquires second data unencrypted according to the first data, a secret calculation unit that executes the secret calculation on the basis of the first data and the second data, and an output unit that outputs a result of the secret calculation in an encrypted state. As a result, it is possible to improve data security and reduce a processing load on the secret calculation.

IDENTITY CHECKING METHOD USING USER TERMINALS
20230123760 · 2023-04-20 ·

A method for checking the identity of a reference individual, the method comprising the following steps, implemented by a checking device: selecting terminals respectively associated with individuals forming part of a set of individuals whose identities are intended to be checked by the checking device, the individual forming part of the set of individuals; sending, to each of the selected terminals, an input datum associated with the reference individual and a request asking the terminal to implement a first cryptographic processing operation producing an output datum from the input datum and from a private key specific to the individual associated with the terminal; receiving each output datum; and implementing a second cryptographic processing operation producing a check result relating to the reference individual from each output datum.

A METHOD FOR STATISTICAL ANALYSIS OF AGGREGATE ENCRYPTED DATA WITH KEY-LEAKAGE RESILIENCE FOR SMART GRIDS

This invention publishes a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids. In this invention, every user area is managed by a fog node which plays the role of data aggregation gateway and data relay. All the users' electricity consumption data sent by smart meters in the same user area are firstly aggregated by the fog node to generate a fog-level aggregate ciphertext. Then the fog node further generates a digital signature for the fog-level aggregate ciphertext and sends these data to a cloud server for long-time storage. The cloud server stores all the aggregate ciphertexts and digital signatures received from different user areas in its database, and provides data query and statistical analysis services for the control center of smart grids. On the premise of without violating users' privacy, the cloud server could provide enough information for the control center, enabling it to compute the sum, arithmetic mean and variance of all users' data in specified areas in a privacy-preserving way.

TRANSPARENT NETWORK ACCESS CONTROL FOR SPATIAL ACCELERATOR DEVICE MULTI-TENANCY
20230068607 · 2023-03-02 · ·

An apparatus to facilitate transparent network access controls for spatial accelerator device multi-tenancy is disclosed. The apparatus includes a secure device manager (SDM) to: establish a network-on-chip (NoC) communication path in the apparatus, the NoC communication path comprising a plurality of NoC nodes for ingress and egress of communications on the NoC communication path; for each NoC node of the NoC communication path, configure a programmable register of the NoC node to indicate a node group that the NoC node is assigned, the node group corresponding to a persona configured on the apparatus; determine whether a prefix of received data at the NoC node matches the node group indicated by the programmable register of the NoC; and responsive to determining that the prefix does not match the node group, discard the data from the NoC node.

Encoding / Decoding System and Method
20230124896 · 2023-04-20 ·

A computer-implemented method, computer program product and computing system for: processing an unencoded data file to identify a plurality of file segments wherein the unencoded data file is a dataset for use with a long-range wireless communication platform; mapping each of the plurality of file segments to a portion of a dictionary file to generate a plurality of mappings, wherein each of the plurality of mappings includes a starting location and a length, thus generating a related encoded data file based, at least in part, upon the plurality of mappings; and transmitting the related encoded data file from a first location to a second location using the long-range wireless communication platform.

ACCESS AUTHORIZATION UTILIZING HOMOMORPHICALLY ENCRYPTED ACCESS AUTHORIZATION OBJECTS
20230123579 · 2023-04-20 ·

An apparatus comprises a processing device configured to determine an asset identifier for an information technology asset, to encrypt the asset identifier utilizing a public key of a first homomorphic encryption key pair, and to evaluate a first homomorphic encryption function for a first homomorphically encrypted access authorization object that takes as input the encrypted asset identifier and provides as output an encrypted access authorization identifier. The processing device is also configured to decrypt the access authorization identifier utilizing a secret key of the first homomorphic encryption key pair and, responsive to validating the access authorization identifier, to evaluate additional homomorphic encryption functions for additional homomorphically encrypted access authorization objects that return encrypted access authorization information. The processing device is further configured to decrypt the access authorization information utilizing secret keys of additional homomorphic encryption key pairs to authorize access to given functionality of the information technology asset.

PARTITIONING CIRCUITS FOR EXECUTION OF SEQUENTIAL SECURE COMPUTATION CODE ON MULTIPLE PROCESSORS

An example system includes a processor that can obtain a circuit describing operations of sequential secure computation code. The processor can modify the circuit based on a cost function. The processor can partition the circuit into a number of sub-circuits. The processor can assign the number of the sub-circuits to different processors for execution.