AU2018222992B2 - System and method for secure two-party evaluation of utility of sharing data - Google Patents
System and method for secure two-party evaluation of utility of sharing data Download PDFInfo
- Publication number
- AU2018222992B2 AU2018222992B2 AU2018222992A AU2018222992A AU2018222992B2 AU 2018222992 B2 AU2018222992 B2 AU 2018222992B2 AU 2018222992 A AU2018222992 A AU 2018222992A AU 2018222992 A AU2018222992 A AU 2018222992A AU 2018222992 B2 AU2018222992 B2 AU 2018222992B2
- Authority
- AU
- Australia
- Prior art keywords
- encrypted
- computing device
- data
- utility
- statistic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/714,803 US10805281B2 (en) | 2017-09-25 | 2017-09-25 | System and method for secure two-party evaluation of utility of sharing data |
| US15/714,803 | 2017-09-25 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| AU2018222992A1 AU2018222992A1 (en) | 2019-04-11 |
| AU2018222992B2 true AU2018222992B2 (en) | 2024-01-04 |
Family
ID=63794289
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2018222992A Active AU2018222992B2 (en) | 2017-09-25 | 2018-08-30 | System and method for secure two-party evaluation of utility of sharing data |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US10805281B2 (enExample) |
| EP (1) | EP3461101B1 (enExample) |
| JP (1) | JP7152909B2 (enExample) |
| AU (1) | AU2018222992B2 (enExample) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110113203B (zh) * | 2019-04-30 | 2021-10-22 | 创新先进技术有限公司 | 一种用于加密模型的安全性评估的方法和设备 |
| CN110163008B (zh) * | 2019-04-30 | 2023-03-07 | 创新先进技术有限公司 | 一种部署的加密模型的安全性审计的方法和系统 |
| US11190336B2 (en) * | 2019-05-10 | 2021-11-30 | Sap Se | Privacy-preserving benchmarking with interval statistics reducing leakage |
| CN110222873B (zh) * | 2019-05-14 | 2023-10-31 | 北京城建智控科技股份有限公司 | 一种基于大数据的地铁站客流量预测方法 |
| KR20210016829A (ko) * | 2019-08-05 | 2021-02-17 | 엘지전자 주식회사 | 지능적 음성 인식 방법, 음성 인식 장치 및 지능형 컴퓨팅 디바이스 |
| US11228423B2 (en) | 2020-01-12 | 2022-01-18 | Advanced New Technologies Co., Ltd. | Method and device for security assessment of encryption models |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| CN111539009B (zh) * | 2020-06-05 | 2023-05-23 | 支付宝(杭州)信息技术有限公司 | 保护隐私数据的有监督特征分箱方法及装置 |
| CN114091043A (zh) * | 2020-08-04 | 2022-02-25 | 中移(成都)信息通信科技有限公司 | 一种相关性系数计算方法、装置、设备及计算机存储介质 |
| CN113591942B (zh) * | 2021-07-13 | 2023-05-09 | 中国电子科技集团公司第三十研究所 | 大规模数据的密文机器学习模型训练方法 |
| CN116506188B (zh) * | 2023-05-04 | 2024-03-29 | 北京众谊越泰科技有限公司 | 一种基于b/s架构的非对称加密算法的操作方法和系统 |
| CN116894272B (zh) * | 2023-09-08 | 2023-11-28 | 北京数盾信息科技有限公司 | 一种基于高速加密技术的云计算系统数据处理方法 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8418249B1 (en) * | 2011-11-10 | 2013-04-09 | Narus, Inc. | Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats |
| US20150033341A1 (en) * | 2013-07-24 | 2015-01-29 | Webroot Inc. | System and method to detect threats to computer based devices and systems |
| US20160371684A1 (en) * | 2015-06-22 | 2016-12-22 | Bank Of America Corporation | System of anonymous user creation based on oblivious transfer |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104869103B (zh) * | 2014-02-24 | 2018-05-18 | 华为终端(东莞)有限公司 | 查找多媒体文件的方法、终端设备和服务器 |
-
2017
- 2017-09-25 US US15/714,803 patent/US10805281B2/en active Active
-
2018
- 2018-08-30 AU AU2018222992A patent/AU2018222992B2/en active Active
- 2018-09-05 JP JP2018165692A patent/JP7152909B2/ja active Active
- 2018-09-21 EP EP18196122.8A patent/EP3461101B1/en active Active
-
2020
- 2020-09-09 US US17/016,073 patent/US11451527B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8418249B1 (en) * | 2011-11-10 | 2013-04-09 | Narus, Inc. | Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats |
| US20150033341A1 (en) * | 2013-07-24 | 2015-01-29 | Webroot Inc. | System and method to detect threats to computer based devices and systems |
| US20160371684A1 (en) * | 2015-06-22 | 2016-12-22 | Bank Of America Corporation | System of anonymous user creation based on oblivious transfer |
Non-Patent Citations (1)
| Title |
|---|
| PINGJIE TANG et al.: "Feature Selection and Design of Intrusion Detection System Based on k-Means and Triangle Area Support Vector Machine", ICFN '10. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, 22 January 2010, pages 144 - 148. * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20200412702A1 (en) | 2020-12-31 |
| EP3461101A1 (en) | 2019-03-27 |
| US11451527B2 (en) | 2022-09-20 |
| US20190097985A1 (en) | 2019-03-28 |
| JP2019061233A (ja) | 2019-04-18 |
| EP3461101B1 (en) | 2021-03-03 |
| AU2018222992A1 (en) | 2019-04-11 |
| US10805281B2 (en) | 2020-10-13 |
| JP7152909B2 (ja) | 2022-10-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2018222992B2 (en) | System and method for secure two-party evaluation of utility of sharing data | |
| US11601407B2 (en) | Fast oblivious transfers | |
| CN111162896B (zh) | 双方联合进行数据处理的方法及装置 | |
| US11374736B2 (en) | System and method for homomorphic encryption | |
| Bogetoft et al. | Secure multiparty computation goes live | |
| US10333696B2 (en) | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency | |
| US11356241B2 (en) | Verifiable secret shuffle protocol for encrypted data based on homomorphic encryption and secret sharing | |
| Wang et al. | Privacy-preserving public auditing for data storage security in cloud computing | |
| US20190386814A1 (en) | Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency | |
| US11368296B2 (en) | Communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption and oblivious transfer | |
| US20150381349A1 (en) | Privacy-preserving ridge regression using masks | |
| US11741247B2 (en) | Smart privacy and controlled exposure on blockchains | |
| US11368281B2 (en) | Efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers | |
| US20210328763A1 (en) | Computation-efficient secret shuffle protocol for encrypted data based on homomorphic encryption | |
| US20240396735A1 (en) | Round optimal oblivious transfers from isogenies | |
| CN116743376A (zh) | 基于高效密文混淆技术的多方秘密分享数据隐私比较方法 | |
| WO2019094303A1 (en) | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency | |
| US11411725B2 (en) | Efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers | |
| Bao et al. | Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain | |
| US20230014392A1 (en) | Method and system for privacy-preserving portfolio pricing | |
| US11907392B2 (en) | System and method utilizing function secret sharing with conditional disclosure of secrets | |
| Liu et al. | Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts | |
| Du et al. | Secure and efficient outsourcing of large-scale nonlinear programming | |
| WO2006103608A2 (en) | Private negotiation | |
| WO2025078473A1 (en) | Mediation of information perception |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FGA | Letters patent sealed or granted (standard patent) |