AU2018222992B2 - System and method for secure two-party evaluation of utility of sharing data - Google Patents

System and method for secure two-party evaluation of utility of sharing data Download PDF

Info

Publication number
AU2018222992B2
AU2018222992B2 AU2018222992A AU2018222992A AU2018222992B2 AU 2018222992 B2 AU2018222992 B2 AU 2018222992B2 AU 2018222992 A AU2018222992 A AU 2018222992A AU 2018222992 A AU2018222992 A AU 2018222992A AU 2018222992 B2 AU2018222992 B2 AU 2018222992B2
Authority
AU
Australia
Prior art keywords
encrypted
computing device
data
utility
statistic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2018222992A
Other languages
English (en)
Other versions
AU2018222992A1 (en
Inventor
Vanishree Hanumantha Rao
Yunhui LONG
Shantanu Rane
Francisco E. Torres
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Palo Alto Research Center Inc
Original Assignee
Palo Alto Research Center Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Palo Alto Research Center Inc filed Critical Palo Alto Research Center Inc
Publication of AU2018222992A1 publication Critical patent/AU2018222992A1/en
Application granted granted Critical
Publication of AU2018222992B2 publication Critical patent/AU2018222992B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
AU2018222992A 2017-09-25 2018-08-30 System and method for secure two-party evaluation of utility of sharing data Active AU2018222992B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/714,803 US10805281B2 (en) 2017-09-25 2017-09-25 System and method for secure two-party evaluation of utility of sharing data
US15/714,803 2017-09-25

Publications (2)

Publication Number Publication Date
AU2018222992A1 AU2018222992A1 (en) 2019-04-11
AU2018222992B2 true AU2018222992B2 (en) 2024-01-04

Family

ID=63794289

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2018222992A Active AU2018222992B2 (en) 2017-09-25 2018-08-30 System and method for secure two-party evaluation of utility of sharing data

Country Status (4)

Country Link
US (2) US10805281B2 (enExample)
EP (1) EP3461101B1 (enExample)
JP (1) JP7152909B2 (enExample)
AU (1) AU2018222992B2 (enExample)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113203B (zh) * 2019-04-30 2021-10-22 创新先进技术有限公司 一种用于加密模型的安全性评估的方法和设备
CN110163008B (zh) * 2019-04-30 2023-03-07 创新先进技术有限公司 一种部署的加密模型的安全性审计的方法和系统
US11190336B2 (en) * 2019-05-10 2021-11-30 Sap Se Privacy-preserving benchmarking with interval statistics reducing leakage
CN110222873B (zh) * 2019-05-14 2023-10-31 北京城建智控科技股份有限公司 一种基于大数据的地铁站客流量预测方法
KR20210016829A (ko) * 2019-08-05 2021-02-17 엘지전자 주식회사 지능적 음성 인식 방법, 음성 인식 장치 및 지능형 컴퓨팅 디바이스
US11228423B2 (en) 2020-01-12 2022-01-18 Advanced New Technologies Co., Ltd. Method and device for security assessment of encryption models
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
CN111539009B (zh) * 2020-06-05 2023-05-23 支付宝(杭州)信息技术有限公司 保护隐私数据的有监督特征分箱方法及装置
CN114091043A (zh) * 2020-08-04 2022-02-25 中移(成都)信息通信科技有限公司 一种相关性系数计算方法、装置、设备及计算机存储介质
CN113591942B (zh) * 2021-07-13 2023-05-09 中国电子科技集团公司第三十研究所 大规模数据的密文机器学习模型训练方法
CN116506188B (zh) * 2023-05-04 2024-03-29 北京众谊越泰科技有限公司 一种基于b/s架构的非对称加密算法的操作方法和系统
CN116894272B (zh) * 2023-09-08 2023-11-28 北京数盾信息科技有限公司 一种基于高速加密技术的云计算系统数据处理方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8418249B1 (en) * 2011-11-10 2013-04-09 Narus, Inc. Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
US20150033341A1 (en) * 2013-07-24 2015-01-29 Webroot Inc. System and method to detect threats to computer based devices and systems
US20160371684A1 (en) * 2015-06-22 2016-12-22 Bank Of America Corporation System of anonymous user creation based on oblivious transfer

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869103B (zh) * 2014-02-24 2018-05-18 华为终端(东莞)有限公司 查找多媒体文件的方法、终端设备和服务器

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8418249B1 (en) * 2011-11-10 2013-04-09 Narus, Inc. Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
US20150033341A1 (en) * 2013-07-24 2015-01-29 Webroot Inc. System and method to detect threats to computer based devices and systems
US20160371684A1 (en) * 2015-06-22 2016-12-22 Bank Of America Corporation System of anonymous user creation based on oblivious transfer

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PINGJIE TANG et al.: "Feature Selection and Design of Intrusion Detection System Based on k-Means and Triangle Area Support Vector Machine", ICFN '10. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, 22 January 2010, pages 144 - 148. *

Also Published As

Publication number Publication date
US20200412702A1 (en) 2020-12-31
EP3461101A1 (en) 2019-03-27
US11451527B2 (en) 2022-09-20
US20190097985A1 (en) 2019-03-28
JP2019061233A (ja) 2019-04-18
EP3461101B1 (en) 2021-03-03
AU2018222992A1 (en) 2019-04-11
US10805281B2 (en) 2020-10-13
JP7152909B2 (ja) 2022-10-13

Similar Documents

Publication Publication Date Title
AU2018222992B2 (en) System and method for secure two-party evaluation of utility of sharing data
US11601407B2 (en) Fast oblivious transfers
CN111162896B (zh) 双方联合进行数据处理的方法及装置
US11374736B2 (en) System and method for homomorphic encryption
Bogetoft et al. Secure multiparty computation goes live
US10333696B2 (en) Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US11356241B2 (en) Verifiable secret shuffle protocol for encrypted data based on homomorphic encryption and secret sharing
Wang et al. Privacy-preserving public auditing for data storage security in cloud computing
US20190386814A1 (en) Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency
US11368296B2 (en) Communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption and oblivious transfer
US20150381349A1 (en) Privacy-preserving ridge regression using masks
US11741247B2 (en) Smart privacy and controlled exposure on blockchains
US11368281B2 (en) Efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers
US20210328763A1 (en) Computation-efficient secret shuffle protocol for encrypted data based on homomorphic encryption
US20240396735A1 (en) Round optimal oblivious transfers from isogenies
CN116743376A (zh) 基于高效密文混淆技术的多方秘密分享数据隐私比较方法
WO2019094303A1 (en) Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US11411725B2 (en) Efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers
Bao et al. Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain
US20230014392A1 (en) Method and system for privacy-preserving portfolio pricing
US11907392B2 (en) System and method utilizing function secret sharing with conditional disclosure of secrets
Liu et al. Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts
Du et al. Secure and efficient outsourcing of large-scale nonlinear programming
WO2006103608A2 (en) Private negotiation
WO2025078473A1 (en) Mediation of information perception

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)