Patent classifications
G06F7/4915
SIGN-EFFICIENT ADDITION AND SUBTRACTION FOR STREAMINGCOMPUTATIONS IN CRYPTOGRAPHIC ENGINES
Aspects of the present disclosure involve techniques and cryptographic processors configured to perform the techniques that include sign-efficient addition and subtraction operations that use Montgomery reduction and are capable of facilitating fast streaming operations. The techniques involve receiving a first number and a second number, where the first number and second number are within a target interval, and performing a modular operation to obtain a third number, the third number being within the same target interval and representing a sum or a difference of a rescaled first number and a rescaled second number, and wherein the modular operation includes a Montgomery reduction.
APPARATUS AND METHOD WITH MULTI-FORMAT DATA SUPPORT
An apparatus with multi-format data support includes: a receiver configured to receive a plurality of data corresponding to a plurality of data formats; one or more processors configured to: multiply the plurality of data using one or more multipliers; perform a first alignment on a result of the multiplication based on an exponent value of the plurality of data; add a result of the first alignment; and perform a second alignment on a result of the addition based on the exponent value and an operation result of a previous cycle.
Data computing system
The present disclosure provides a data computing system. The data computing system comprises: a memory, a processor and an accelerator, wherein the memory is communicatively coupled to the processor and configured to store data to be computed and a computed result, the data being written by the processor; the processor is communicatively coupled to the accelerator and configured to control the accelerator; and the accelerator is communicatively coupled to the memory and configured to access the memory according to pre-configured control information, implement a computing process to produce the computed result and write the computed result back to the memory. The present disclosure also provides an accelerator and a method performed by an accelerator of a data computing system. The present disclosure can improve the execution efficiency of the processor and reduce the computing overhead of the processor.
DATA COMPUTING SYSTEM
The present disclosure provides a data computing system. The data computing system comprises: a memory, a processor and an accelerator, wherein the memory is communicatively coupled to the processor and configured to store data to be computed and a computed result, the data being written by the processor; the processor is communicatively coupled to the accelerator and configured to control the accelerator; and the accelerator is communicatively coupled to the memory and configured to access the memory according to pre-configured control information, implement a computing process to produce the computed result and write the computed result back to the memory. The present disclosure also provides an accelerator and a method performed by an accelerator of a data computing system. The present disclosure can improve the execution efficiency of the processor and reduce the computing overhead of the processor.
MULTI-PARTY COMPUTATION (MPC) BASED KEY SEARCH IN PRIVATE DATA
Disclosed herein are methods and systems for efficiently retrieving data from an at least partially encrypted table based record using secure Multi-Party Computation (MPC). A query received to retrieve data from a table based record comprising data items arranged in rows and columns may include a queried data item (key) which potentially matches one or more encrypted data items contained in one or more of the columns. The computing nodes, each having a respective one of a plurality of shares of a one-hot representation of each of the encrypted data items engage in the MPC session to match between a one-hot representation of the queried data item and the one-hot representation of each encrypted data item and output each matching row. The match is based on multiplying, in each encrypted data item's one-hot representation, only bits identified as hot in the queried data item's one-hot representation.
DIFFERENTIAL PRIVACY SECURITY FOR BENCHMARKING
A system for determining a calculation utilizing differential privacy including an interface and a processor. The interface is configured to receive a request to determine result data of a calculation using multitenanted data. The multitenanted data comprises tenant data associated with a plurality of tenants. The processor is configured to: determine the result data by performing the calculation on the multitenanted data; determine whether a deterministic modification is needed to ensure privacy based at least in part on whether a number of participants in the result data is less than a threshold; and in response to determining that the deterministic modification is needed to ensure privacy: determine the deterministic modification; numerically modify the result data using the deterministic modification to determine modified result data; and provide the modified result data.
Decimal load immediate instruction
An instruction generates a value for use in processing within a computing environment. The instruction obtains a sign control associated with the instruction, and shifts an input value of the instruction in a specified direction by a selected amount to provide a result. The result is placed in a first designated location in a register, and the sign, which is based on the sign control, is placed in a second designated location of the register. The result and the sign provide a signed value to be used in processing within the computing environment.
Differential privacy security for benchmarking
A system for determining a calculation utilizing differential privacy including an interface and a processor. The interface is configured to receive a request to determine a result of a calculation using multitenanted data. The processor is configured to determine result data by performing the calculation on the multitenanted data; determine a deterministic modification in the event that the deterministic modification is needed to ensure privacy; modify the result data using the deterministic modification to determine modified result data; and provide the modified result data.
DATA COMPUTING SYSTEM
The present disclosure provides a data computing system. The data computing system comprises: a memory, a processor and an accelerator, wherein the memory is communicatively coupled to the processor and configured to store data to be computed and a computed result, the data being written by the processor; the processor is communicatively coupled to the accelerator and configured to control the accelerator; and the accelerator is communicatively coupled to the memory and configured to access the memory according to pre-configured control information, implement a computing process to produce the computed result and write the computed result back to the memory. The present disclosure also provides an accelerator and a method performed by an accelerator of a data computing system. The present disclosure can improve the execution efficiency of the processor and reduce the computing overhead of the processor.
Differential privacy security for benchmarking
A system for determining a calculation utilizing differential privacy including an interface and a processor. The interface is configured to receive a request to determine result data of a calculation using multitenanted data. The multitenanted data comprises tenant data associated with a plurality of tenants. The processor is configured to: determine the result data by performing the calculation on the multitenanted data; determine whether a deterministic modification is needed to ensure privacy based at least in part on whether a number of participants in the result data is less than a threshold; and in response to determining that the deterministic modification is needed to ensure privacy: determine the deterministic modification; numerically modify the result data using the deterministic modification to determine modified result data; and provide the modified result data.