DE602009000293D1 - Verfahren und System zur sicheren vermittelten Berechnung - Google Patents

Verfahren und System zur sicheren vermittelten Berechnung

Info

Publication number
DE602009000293D1
DE602009000293D1 DE602009000293T DE602009000293T DE602009000293D1 DE 602009000293 D1 DE602009000293 D1 DE 602009000293D1 DE 602009000293 T DE602009000293 T DE 602009000293T DE 602009000293 T DE602009000293 T DE 602009000293T DE 602009000293 D1 DE602009000293 D1 DE 602009000293D1
Authority
DE
Germany
Prior art keywords
logical circuit
logical
server
encrypted
mediated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602009000293T
Other languages
English (en)
Inventor
Florian Kerschbaum
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAP SE
Original Assignee
SAP SE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAP SE filed Critical SAP SE
Publication of DE602009000293D1 publication Critical patent/DE602009000293D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/466Electronic auction
DE602009000293T 2008-01-18 2009-01-16 Verfahren und System zur sicheren vermittelten Berechnung Active DE602009000293D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/016,686 US8010782B2 (en) 2008-01-18 2008-01-18 Method and system for mediated secure computation

Publications (1)

Publication Number Publication Date
DE602009000293D1 true DE602009000293D1 (de) 2010-12-09

Family

ID=40627364

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602009000293T Active DE602009000293D1 (de) 2008-01-18 2009-01-16 Verfahren und System zur sicheren vermittelten Berechnung

Country Status (4)

Country Link
US (1) US8010782B2 (de)
EP (1) EP2081143B1 (de)
AT (1) ATE486329T1 (de)
DE (1) DE602009000293D1 (de)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533474B2 (en) * 2008-02-27 2013-09-10 Red Hat, Inc. Generating session keys
US8515996B2 (en) 2008-05-19 2013-08-20 Emulex Design & Manufacturing Corporation Secure configuration of authentication servers
US8429444B2 (en) * 2008-12-18 2013-04-23 Scality, S.A. Multipurpose storage system based upon a distributed hashing mechanism with transactional support and failover capability
EP2348450B1 (de) * 2009-12-18 2013-11-06 CompuGroup Medical AG Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem
EP2348452B1 (de) 2009-12-18 2014-07-02 CompuGroup Medical AG Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem
EP2348447B1 (de) 2009-12-18 2014-07-16 CompuGroup Medical AG Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem
US8539220B2 (en) * 2010-02-26 2013-09-17 Microsoft Corporation Secure computation using a server module
EP2365456B1 (de) * 2010-03-11 2016-07-20 CompuGroup Medical SE Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem
CN103052934B (zh) * 2010-06-02 2016-05-18 艾伦智能科技公司 逻辑表
US8700906B2 (en) * 2011-01-14 2014-04-15 Microsoft Corporation Secure computing in multi-tenant data centers
US9077539B2 (en) * 2011-03-09 2015-07-07 Microsoft Technology Licensing, Llc Server-aided multi-party protocols
US20120331308A1 (en) * 2011-06-22 2012-12-27 Media Patents, S.L. Methods, apparatus and systems to improve security in computer systems
US9825952B2 (en) * 2011-12-30 2017-11-21 Intel Corporation Secure machine to machine communication
US9178704B2 (en) * 2012-09-28 2015-11-03 Alcatel Lucent Input consistency verification for server assisted secure function evaluation
GB201407862D0 (en) * 2013-10-30 2014-06-18 Barclays Bank Plc Transaction authentication
US9390292B2 (en) * 2013-12-30 2016-07-12 Wisconsin Alumni Research Foundation Encrypted digital circuit description allowing circuit simulation
US9584324B2 (en) 2014-01-13 2017-02-28 Sap Se Centralized datastore password management
EP3089091B1 (de) 2014-05-02 2020-03-11 Barclays Execution Services Limited Transaktionsauthentifizierung
WO2016014120A1 (en) * 2014-07-24 2016-01-28 Hewlett-Packard Development Company, L.P. Device authentication agent
US9740879B2 (en) 2014-10-29 2017-08-22 Sap Se Searchable encryption with secure and efficient updates
US9342707B1 (en) 2014-11-06 2016-05-17 Sap Se Searchable encryption for infrequent queries in adjustable encrypted databases
US11775656B2 (en) 2015-05-01 2023-10-03 Micro Focus Llc Secure multi-party information retrieval
US9729525B1 (en) 2015-06-29 2017-08-08 EMC IP Holding Company LLC Secure data analytics
US9906511B1 (en) 2015-06-29 2018-02-27 Bar-Ilan University Secure impersonation detection
US9917820B1 (en) 2015-06-29 2018-03-13 EMC IP Holding Company LLC Secure information sharing
US9830470B2 (en) 2015-10-09 2017-11-28 Sap Se Encrypting data for analytical web applications
US10783268B2 (en) 2015-11-10 2020-09-22 Hewlett Packard Enterprise Development Lp Data allocation based on secure information retrieval
US9960910B2 (en) 2016-02-25 2018-05-01 Wisconsin Alumni Research Foundation Encrypted digital circuit description allowing signal delay simulation
US10785022B2 (en) * 2016-09-13 2020-09-22 Hiroshi Watanabe Network without abuse of a private key
US11080301B2 (en) 2016-09-28 2021-08-03 Hewlett Packard Enterprise Development Lp Storage allocation based on secure data comparisons via multiple intermediaries
EP3319069B1 (de) * 2016-11-02 2019-05-01 Skeyecode Verfahren zur authentifizierung eines benutzers mithilfe eines nichtsicheren endgeräts
EP3319000A1 (de) * 2016-11-02 2018-05-09 Skeyecode Verfahren zur sicherung einer von einem unsicheren endgerät ausgeführten transaktion
CN106961323B (zh) * 2017-05-18 2022-12-09 桀安信息安全技术(上海)有限公司 一种密钥解密板卡、装置、系统及处理方法
US11818249B2 (en) * 2017-12-04 2023-11-14 Koninklijke Philips N.V. Nodes and methods of operating the same
CN109728910A (zh) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 一种高效的门限分布式椭圆曲线密钥生成及签名方法和系统
US11250140B2 (en) * 2019-02-28 2022-02-15 Sap Se Cloud-based secure computation of the median
US10746567B1 (en) 2019-03-22 2020-08-18 Sap Se Privacy preserving smart metering
US11120160B2 (en) 2019-05-31 2021-09-14 Advanced New Technologies Co., Ltd. Distributed personal data storage and encrypted personal data service based on secure computation
US20220284132A1 (en) * 2019-08-29 2022-09-08 Carnegie Mellon University Method for securing logic circuits
CN111008256B (zh) * 2019-10-29 2022-03-15 矩阵元技术(深圳)有限公司 一种基于安全多方计算的空间数据分布模式分析方法
CN111414646B (zh) * 2020-03-20 2024-03-29 矩阵元技术(深圳)有限公司 实现隐私保护的数据处理方法和装置
CN111444526B (zh) * 2020-03-27 2021-08-27 上海观源信息科技有限公司 基于计算机软件实现近似最大值计算的安全多方计算控制方法及相应的系统
CN112800479B (zh) * 2021-04-07 2021-07-06 支付宝(杭州)信息技术有限公司 利用可信第三方的多方联合数据处理方法及装置
CN113706332B (zh) * 2021-07-30 2024-03-29 西安交通大学 基于个体差分隐私的电力交易报价隐私保护方法及系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US5799090A (en) * 1995-09-25 1998-08-25 Angert; Joseph C. pad encryption method and software
US6115471A (en) * 1996-11-28 2000-09-05 Fujitsu Limited Member-exclusive service system and method through internet
US6957341B2 (en) * 1998-05-14 2005-10-18 Purdue Research Foundation Method and system for secure computational outsourcing and disguise
US7240198B1 (en) * 2000-08-08 2007-07-03 Yeda Research & Development Co., Ltd. Honesty preserving negotiation and computation
US20030046210A1 (en) * 2001-08-31 2003-03-06 Vora Poorvi L. Anonymous acquisition of digital products based on secret splitting
US20030074330A1 (en) 2001-10-11 2003-04-17 Nokia Corporation Efficient electronic auction schemes with privacy protection
US20030233328A1 (en) * 2002-04-23 2003-12-18 Scott David A. Method and system for securely communicating data in a communications network
US7386878B2 (en) * 2002-08-14 2008-06-10 Microsoft Corporation Authenticating peer-to-peer connections
US7346160B2 (en) * 2003-04-23 2008-03-18 Michaelsen David L Randomization-based encryption apparatus and method
US20050201555A1 (en) * 2004-02-09 2005-09-15 I-Ling Yen System, method and apparatus for secure computation on encrypted data
US7697693B1 (en) * 2004-03-09 2010-04-13 Bbn Technologies Corp. Quantum cryptography with multi-party randomness
JP4256897B2 (ja) 2006-06-16 2009-04-22 インターナショナル・ビジネス・マシーンズ・コーポレーション マッチング・サービスを提供するための装置、方法及びプログラム
US8175854B2 (en) * 2007-11-29 2012-05-08 Alcatel Lucent Universal circuit for secure function evaluation
US20090187978A1 (en) * 2008-01-18 2009-07-23 Yahoo! Inc. Security and authentications in peer-to-peer networks

Also Published As

Publication number Publication date
US8010782B2 (en) 2011-08-30
ATE486329T1 (de) 2010-11-15
EP2081143B1 (de) 2010-10-27
US20090187757A1 (en) 2009-07-23
EP2081143A1 (de) 2009-07-22

Similar Documents

Publication Publication Date Title
ATE486329T1 (de) Verfahren und system zur sicheren vermittelten berechnung
PH12018500934A1 (en) Service call information processing method and device
ATE479244T1 (de) Verfahren und vorrichtung zur implementierung von multicast-routing
CL2021002200A1 (es) Ejecución dinámica de aplicaciones parametrizadas para el procesamiento de flujos de datos de red codificados (divisional de la solicitud no. 201902361)
CR20180514A (es) Sistemas y métodos para proporcionar una verificación de identidad personal multifactorial basada en una cadena de bloques
ATE357024T1 (de) Netzwerkeinrichtung zur dokumentengültigkeitserklärung
WO2018043865A3 (ko) 블록체인을 기반으로 한 파일 관리/검색 시스템 및 파일 관리/검색 방법
GB201113886D0 (en) Network capacity management system and method
FI20115168L (fi) Menetelmä ja laitejärjestely kiinteistöjen etähallinnan toteuttamiseksi
JP2015531934A5 (de)
ATE337671T1 (de) Serverarchitektur für sichere plug-ins in digitalen rechteverwaltungsssystemen
MX2015015260A (es) Uso de operadores inversos para consultas en redes sociales en linea.
ATE496461T1 (de) Verfahren zur ermittlung des wurzelpfads in einer shortest-path-netzwerkbrücke
SG10201802527RA (en) System and method of monitoring data traffic on a mil-std-1553 data bus
DE602006005958D1 (de) Beweise der physischen nähe unter verwendung von cpufs
BR112014010348A2 (pt) aparelho, método e programa de computador para migração de um processo de detector de evento
NO341596B1 (no) Analyse av multiple verdier under hensyn til usikkerheter
DE602007009000D1 (de) Erzeugung sicherer Berechnungsprogramme
BR112015014469A2 (pt) método de configuração de um dispositivo de rede para compartilhamento de chave, método para um primeiro dispositivo de rede para determinar uma chave compartilhada, dispositivo de rede configurado para determinar uma chave compartilhada, sistema para configurar um dispositivo de rede para compartilhamento de chave e programa de computador
DK3704829T3 (da) Kryptografisk nøglegenereringssystem og -fremgangsmåde
WO2012095860A8 (en) Method and system for trust management in distributed computing systems
JP2019537435A5 (de)
WO2013013335A8 (en) Automated document composition using clusters
CO2021011932A2 (es) Método para validar un nodo
BR112018069942A2 (pt) método para a inicialização de um sistema de barramento e sistema de barramento