DE602004016678D1 - Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung - Google Patents
Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachungInfo
- Publication number
- DE602004016678D1 DE602004016678D1 DE602004016678T DE602004016678T DE602004016678D1 DE 602004016678 D1 DE602004016678 D1 DE 602004016678D1 DE 602004016678 T DE602004016678 T DE 602004016678T DE 602004016678 T DE602004016678 T DE 602004016678T DE 602004016678 D1 DE602004016678 D1 DE 602004016678D1
- Authority
- DE
- Germany
- Prior art keywords
- efficient
- multiple performance
- gate
- homomorphic threshold
- efficient multiplier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/40—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using contact-making devices, e.g. electromagnetic relay
- G06F7/44—Multiplying; Dividing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
- Electrotherapy Devices (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
- Selective Calling Equipment (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03078437 | 2003-11-03 | ||
PCT/IB2004/052259 WO2005043808A1 (en) | 2003-11-03 | 2004-11-02 | Method and device for efficient multiparty multiplication |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602004016678D1 true DE602004016678D1 (de) | 2008-10-30 |
Family
ID=34530747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004016678T Expired - Fee Related DE602004016678D1 (de) | 2003-11-03 | 2004-11-02 | Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung |
Country Status (8)
Country | Link |
---|---|
US (1) | US20070116283A1 (de) |
EP (1) | EP1683298B1 (de) |
JP (1) | JP2007510947A (de) |
KR (1) | KR20070046778A (de) |
CN (1) | CN1875569A (de) |
AT (1) | ATE408940T1 (de) |
DE (1) | DE602004016678D1 (de) |
WO (1) | WO2005043808A1 (de) |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7392295B2 (en) | 2004-02-19 | 2008-06-24 | Microsoft Corporation | Method and system for collecting information from computer systems based on a trusted relationship |
EP1815637B1 (de) * | 2004-11-16 | 2016-04-20 | Koninklijke Philips N.V. | Sichere berechnung einer ähnlichkeitsmessung |
JP4565628B2 (ja) * | 2004-11-26 | 2010-10-20 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
JP4650933B2 (ja) * | 2005-01-24 | 2011-03-16 | 日本電信電話株式会社 | 秘密計算方法及びシステム |
JP4565632B2 (ja) * | 2005-01-24 | 2010-10-20 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
JP4748663B2 (ja) * | 2005-01-24 | 2011-08-17 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
DE102005030031B4 (de) * | 2005-06-27 | 2007-08-02 | Nec Europe Ltd. | Verfahren zum Datenmanagement in einem Sensornetzwerk |
JP5537032B2 (ja) | 2005-12-13 | 2014-07-02 | コーニンクレッカ フィリップス エヌ ヴェ | 安全な閾値復号プロトコル計算 |
US7856100B2 (en) * | 2005-12-19 | 2010-12-21 | Microsoft Corporation | Privacy-preserving data aggregation using homomorphic encryption |
DE602006013399D1 (de) | 2006-01-02 | 2010-05-20 | Sap Ag | System und Verfahren für den Vergleich von Privatwerten |
JP4863807B2 (ja) * | 2006-01-11 | 2012-01-25 | 日本放送協会 | 匿名課金システム、並びに、コンテンツ視聴装置、視聴料金集計装置、視聴料金復号装置及びコンテンツ配信装置 |
US7900817B2 (en) | 2006-01-26 | 2011-03-08 | Ricoh Company, Ltd. | Techniques for introducing devices to device families with paper receipt |
FR2906058B1 (fr) * | 2006-09-14 | 2008-11-21 | Eads Defence And Security Syst | Procede et serveur de verification du contenu d'une urne virtuelle d'un systeme de vote electronique chiffre par un algorithme homomorphique |
US7668852B2 (en) * | 2006-10-31 | 2010-02-23 | Hewlett-Packard Development Company, L.P. | Method for creating sketches of sets to permit comparison |
US7937270B2 (en) * | 2007-01-16 | 2011-05-03 | Mitsubishi Electric Research Laboratories, Inc. | System and method for recognizing speech securely using a secure multi-party computation protocol |
US8498415B2 (en) * | 2007-11-27 | 2013-07-30 | Bon K. Sy | Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment |
US8130947B2 (en) * | 2008-07-16 | 2012-03-06 | Sap Ag | Privacy preserving social network analysis |
US20100185861A1 (en) * | 2009-01-19 | 2010-07-22 | Microsoft Corporation | Anonymous key issuing for attribute-based encryption |
US8249250B2 (en) * | 2009-03-30 | 2012-08-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure similarity verification between homomorphically encrypted signals |
US20100329448A1 (en) * | 2009-06-30 | 2010-12-30 | Rane Shantanu D | Method for Secure Evaluation of a Function Applied to Encrypted Signals |
US8843762B2 (en) * | 2009-09-04 | 2014-09-23 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia | Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments |
US8972742B2 (en) | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
US8433925B2 (en) * | 2009-09-04 | 2013-04-30 | Gradiant | Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments |
US8903083B2 (en) * | 2010-08-16 | 2014-12-02 | International Business Machines Corporation | Fast evaluation of many polynomials with small coefficients on the same point |
US8681973B2 (en) * | 2010-09-15 | 2014-03-25 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations |
US8837715B2 (en) | 2011-02-17 | 2014-09-16 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica | Method and apparatus for secure iterative processing and adaptive filtering |
US9281941B2 (en) | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
WO2014069998A1 (en) * | 2012-10-30 | 2014-05-08 | Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek Tno | Method and system for protected exchange of data |
EP2992638A1 (de) | 2013-04-30 | 2016-03-09 | Thomson Licensing | Schwellenverschlüsselung mit homomorphen signaturen |
CN105103487A (zh) * | 2013-08-09 | 2015-11-25 | 汤姆逊许可公司 | 用于基于矩阵分解的到评级贡献用户的隐私保护推荐的方法和系统 |
US9390292B2 (en) * | 2013-12-30 | 2016-07-12 | Wisconsin Alumni Research Foundation | Encrypted digital circuit description allowing circuit simulation |
US9264407B2 (en) * | 2014-04-03 | 2016-02-16 | Palo Alto Research Center Incorporated | Computer-implemented system and method for establishing distributed secret shares in a private data aggregation scheme |
EP2930877A1 (de) * | 2014-04-11 | 2015-10-14 | Thomson Licensing | Blinde Paillier-basierte Entschlüsselungsverfahren und Vorrichtungen |
WO2015163822A1 (en) * | 2014-04-23 | 2015-10-29 | Agency For Science, Technology And Research | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database |
EP3089091B1 (de) | 2014-05-02 | 2020-03-11 | Barclays Execution Services Limited | Transaktionsauthentifizierung |
US9825758B2 (en) * | 2014-12-02 | 2017-11-21 | Microsoft Technology Licensing, Llc | Secure computer evaluation of k-nearest neighbor models |
US9787647B2 (en) * | 2014-12-02 | 2017-10-10 | Microsoft Technology Licensing, Llc | Secure computer evaluation of decision trees |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
CN106160995B (zh) * | 2015-04-21 | 2019-04-16 | 郑珂威 | 基于系数映射变换的多项式完全同态加密方法及系统 |
FR3047373B1 (fr) * | 2016-01-28 | 2018-01-05 | Morpho | Procede de calcul securise multipartite protege contre une partie malveillante |
US9960910B2 (en) | 2016-02-25 | 2018-05-01 | Wisconsin Alumni Research Foundation | Encrypted digital circuit description allowing signal delay simulation |
US10812252B2 (en) | 2017-01-09 | 2020-10-20 | Microsoft Technology Licensing, Llc | String matching in encrypted data |
WO2018135511A1 (ja) * | 2017-01-18 | 2018-07-26 | 日本電信電話株式会社 | 秘密計算方法、秘密計算システム、秘密計算装置、およびプログラム |
US11196539B2 (en) | 2017-06-22 | 2021-12-07 | Microsoft Technology Licensing, Llc | Multiplication operations on homomorphic encrypted data |
US10541805B2 (en) * | 2017-06-26 | 2020-01-21 | Microsoft Technology Licensing, Llc | Variable relinearization in homomorphic encryption |
US10749665B2 (en) | 2017-06-29 | 2020-08-18 | Microsoft Technology Licensing, Llc | High-precision rational number arithmetic in homomorphic encryption |
WO2019025415A1 (en) * | 2017-07-31 | 2019-02-07 | Koninklijke Philips N.V. | DISTRIBUTION OF A CALCULATION OUTPUT |
US11606203B2 (en) * | 2017-12-14 | 2023-03-14 | Robert Bosch Gmbh | Method for faster secure multiparty inner product with SPDZ |
FR3076152B1 (fr) * | 2017-12-21 | 2020-01-10 | Orange | Validation de donnees personnelles d'un utilisateur |
EP3503458A1 (de) | 2017-12-22 | 2019-06-26 | Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO | Verteiltes rechenverfahren und system |
CN108933650B (zh) | 2018-06-28 | 2020-02-14 | 阿里巴巴集团控股有限公司 | 数据加解密的方法及装置 |
CN108809623B (zh) * | 2018-07-10 | 2020-09-25 | 矩阵元技术(深圳)有限公司 | 安全多方计算方法、装置及系统 |
CN111768304A (zh) | 2018-08-06 | 2020-10-13 | 阿里巴巴集团控股有限公司 | 区块链交易方法及装置、电子设备 |
WO2020077573A1 (en) * | 2018-10-17 | 2020-04-23 | Alibaba Group Holding Limited | Secret sharing with no trusted initializer |
US10885205B2 (en) * | 2018-10-31 | 2021-01-05 | Nec Corporation Of America | Secure multiparty computation |
CN109446828B (zh) * | 2018-11-07 | 2020-10-13 | 北京邮电大学 | 一种安全多方计算方法及装置 |
EP3523919B1 (de) | 2018-11-27 | 2020-08-26 | Alibaba Group Holding Limited | System und verfahren zum informationsschutz |
PL3745637T3 (pl) | 2018-11-27 | 2021-11-02 | Advanced New Technologies Co., Ltd. | System i sposób ochrony informacji |
MX2019004201A (es) | 2018-11-27 | 2019-08-05 | Alibaba Group Holding Ltd | Sistema y metodo para proteccion de informacion. |
MY188126A (en) | 2018-11-27 | 2021-11-23 | Advanced New Technologies Co Ltd | System and method for information protection |
US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
CN109937557B (zh) | 2018-11-27 | 2022-02-22 | 创新先进技术有限公司 | 用于信息保护的系统和方法 |
CN109934691B (zh) * | 2019-02-28 | 2023-08-25 | 矩阵元技术(深圳)有限公司 | 一种竞拍的数据处理方法、竞拍客户端及系统 |
US11218290B2 (en) * | 2019-02-28 | 2022-01-04 | Sap Se | Efficient cloud-based secure computation of the median using homomorphic encryption |
CN111046409B (zh) * | 2019-12-16 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | 一种私有数据多方安全计算方法和系统 |
CN111143894B (zh) * | 2019-12-24 | 2022-01-28 | 支付宝(杭州)信息技术有限公司 | 一种提升安全多方计算效率的方法及系统 |
WO2021150938A1 (en) | 2020-01-24 | 2021-07-29 | Via Science, Inc. | Secure data processing |
CN111461858B (zh) * | 2020-03-10 | 2023-02-17 | 支付宝(杭州)信息技术有限公司 | 基于隐私保护的连乘计算方法、装置、系统和电子设备 |
WO2022162726A1 (ja) * | 2021-01-26 | 2022-08-04 | 日本電気株式会社 | 秘密計算システム、秘密計算サーバ装置、秘密計算方法および秘密計算プログラム |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001022200A2 (en) * | 1999-03-25 | 2001-03-29 | Votehere, Inc. | Electronic voting scheme employing permanent ballot storage |
US6772339B1 (en) * | 2000-03-13 | 2004-08-03 | Lucent Technologies Inc. | Mix and match: a new approach to secure multiparty computation |
EP1486027B1 (de) * | 2002-03-13 | 2005-12-28 | Koninklijke Philips Electronics N.V. | Mehrbenutzerschlüsselerzeugung auf polynombasis und Authentisierungsverfahren uns System |
-
2004
- 2004-11-02 KR KR1020067008604A patent/KR20070046778A/ko not_active Application Discontinuation
- 2004-11-02 US US10/577,757 patent/US20070116283A1/en not_active Abandoned
- 2004-11-02 CN CNA2004800325436A patent/CN1875569A/zh active Pending
- 2004-11-02 DE DE602004016678T patent/DE602004016678D1/de not_active Expired - Fee Related
- 2004-11-02 WO PCT/IB2004/052259 patent/WO2005043808A1/en active IP Right Grant
- 2004-11-02 JP JP2006537540A patent/JP2007510947A/ja not_active Withdrawn
- 2004-11-02 EP EP04770350A patent/EP1683298B1/de not_active Not-in-force
- 2004-11-02 AT AT04770350T patent/ATE408940T1/de not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
WO2005043808A1 (en) | 2005-05-12 |
US20070116283A1 (en) | 2007-05-24 |
EP1683298A1 (de) | 2006-07-26 |
KR20070046778A (ko) | 2007-05-03 |
EP1683298B1 (de) | 2008-09-17 |
ATE408940T1 (de) | 2008-10-15 |
CN1875569A (zh) | 2006-12-06 |
JP2007510947A (ja) | 2007-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602004016678D1 (de) | Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung | |
DE602007007568D1 (de) | Sichere Berechnung von Privatwerten | |
DE602004029714D1 (de) | Graben-gate-feldeffekt-bauelemente | |
DE602004027404D1 (de) | Graben-gate-feldeffekt-bauelemente | |
ATE549834T1 (de) | Kanalschätzungsrückmeldung in einem orthogonal- frequenzmultiplex-system oder dergleichen | |
ATE512313T1 (de) | Verbindungsglieder und verfahren zur verbindung von vorrichtungen an verlängerungsstangen | |
DE602004009489D1 (de) | Anwendungs-Authentisierungssystem, sichere Vorrichtung und Terminal | |
PT1386630E (pt) | Inalador em po | |
DE60233104D1 (de) | Auf elliptischen Kurven basierte Kryptosystemvorrichtung, sowie entsprechendes Verfahren und Programm | |
DE60333356D1 (de) | Schlitzrinne | |
ATE346340T1 (de) | Allgemeine eingabe-/ausgabearchitektur und entsprechende verfahren zur bereitstellung virtueller kanäle | |
BRPI0501453A (pt) | Autenticação de dispositivo | |
BR0308909B1 (pt) | lingueta de fecho laminada elÁstica de nço-tecido. | |
DE60316522D1 (de) | Ortsabhängige Weiterleitung von Verbindungen in Mobilfunknetzen | |
DE502004008742D1 (de) | Abbau von verbindungen in kommunikationsnetzen | |
ATE428248T1 (de) | Dispersitatskodierung fur inverse multiplexierung | |
ATE382778T1 (de) | Pumpenkombination | |
GB0307190D0 (en) | Security attributes of nodes in trusted computing systems | |
DK1635933T3 (da) | Materialer og fremgangsmåder til forarbejdning af ikke-vandige blandinger | |
TW200802870A (en) | Efficient transistor structure | |
DE502004003588D1 (de) | Kabeldurchführungsplatte | |
DE60313658D1 (de) | Verbindungen mit selektiver inhibierender wirkung an gsk3 | |
DE602004024667D1 (de) | Verstärkervorrichtung, verfahren und system | |
ATE360879T1 (de) | Leitungsschutzschalter mit verschiebbarem steckkontakt | |
NO20012030L (no) | Kryptografisk signering i små enheter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8339 | Ceased/non-payment of the annual fee |