JPWO2020254248A5 - - Google Patents
Download PDFInfo
- Publication number
- JPWO2020254248A5 JPWO2020254248A5 JP2021574206A JP2021574206A JPWO2020254248A5 JP WO2020254248 A5 JPWO2020254248 A5 JP WO2020254248A5 JP 2021574206 A JP2021574206 A JP 2021574206A JP 2021574206 A JP2021574206 A JP 2021574206A JP WO2020254248 A5 JPWO2020254248 A5 JP WO2020254248A5
- Authority
- JP
- Japan
- Prior art keywords
- matrix
- computer system
- ciphertext
- plaintext
- compressed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000011159 matrix material Substances 0.000 claims 56
- 238000000034 method Methods 0.000 claims 29
- 230000004044 response Effects 0.000 claims 10
- 239000013598 vector Substances 0.000 claims 5
- 241000545442 Radix Species 0.000 claims 3
- 230000005540 biological transmission Effects 0.000 claims 2
- 230000006835 compression Effects 0.000 claims 2
- 238000007906 compression Methods 0.000 claims 2
- 239000000654 additive Substances 0.000 claims 1
- 230000000996 additive effect Effects 0.000 claims 1
- 239000002131 composite material Substances 0.000 claims 1
- 238000007781 pre-processing Methods 0.000 claims 1
- 239000003643 water by type Substances 0.000 claims 1
Claims (36)
前記第1のコンピュータ・システムによって、圧縮可能な準同型暗号化動作を前記データベース内の前記データに対して実行し、前記データベース内の前記特定の情報に対応する1つまたは複数の圧縮された暗号文を決定することであって、前記圧縮可能な準同型暗号化動作が、第1の非圧縮準同型暗号方式および第2の圧縮準同型暗号方式を使用し、前記圧縮可能な準同型暗号化動作を前記実行することが、前記第1の準同型暗号方式を前記データに対して使用して、他の複数の暗号文を作成することと、前記第2の準同型暗号方式を前記他の複数の暗号文に対して使用して、前記他の複数の暗号文を、圧縮されたより少ない暗号文に圧縮することとを含み、前記第1および第2の準同型暗号方式が、両方とも同じ秘密鍵を使用する、前記決定することと、
前記第1のコンピュータ・システムによって、前記第2のコンピュータ・システムに、前記要求に対する応答を送信することであって、前記応答が、要求された前記特定の情報に対応する前記1つまたは複数の圧縮された暗号文を含む、前記送信することとを含む、方法。 receiving, at a first computer system, from a second computer system a request for specific information that can be determined using data in a database on said first computer system; The first computer system does not have a decryption key to decrypt the encrypted data or the encrypted request , and at least a portion of said data is encrypted, or said request is encrypted. said receiving;
performing, by the first computer system, a compressible homomorphic encryption operation on the data in the database to generate one or more compressed ciphers corresponding to the specific information in the database; determining a sentence, wherein the compressible homomorphic encryption operation uses a first uncompressed homomorphic encryption scheme and a second compressed homomorphic encryption scheme; said performing an operation comprises using said first homomorphic encryption scheme on said data to produce another plurality of ciphertexts; and applying said second homomorphic encryption scheme to said other using on a plurality of ciphertexts to compress said other plurality of ciphertexts into less compressed ciphertexts, wherein said first and second homomorphic encryption schemes are both the same. using a private key;
sending, by the first computer system, to the second computer system, a response to the request, the response corresponding to the specific information requested of the one or more said transmitting comprising compressed ciphertext.
前記第1のシステムが、前記暗号化データを復号するための復号鍵を持っておらず、前記暗号化データを前記第2のコンピュータ・システムから前記第1のコンピュータ・システムに送信することと、
前記第2のコンピュータ・システムによって、前記暗号化データを使用して決定され得る特定の情報に対する要求を送信することと、
前記第2のコンピュータ・システムで、前記第1のコンピュータ・システムから、前記要求に対する応答を受信することであって、前記応答が、要求された前記特定の情報に対応する1つまたは複数の圧縮された暗号文を含む、前記受信することと、
前記第2のコンピュータ・システムによって、前記1つまたは複数の圧縮された暗号文を対応する平文に復号することとを含む、方法。 encrypting the plaintext to create encrypted data, executed at a second computer system, for transmission to the first computer system;
said first system does not have a decryption key to decrypt said encrypted data and transmitting said encrypted data from said second computer system to said first computer system;
sending a request for specific information that can be determined by the second computer system using the encrypted data;
receiving, at the second computer system, from the first computer system, a response to the request, wherein the response corresponds to one or more compressions corresponding to the particular information requested; said receiving comprising encrypted ciphertext;
and decrypting, by the second computer system, the one or more compressed ciphertexts into corresponding plaintexts.
前記平文を含んでいる前記行列が行列
the matrix containing the plaintext is a matrix
前記平文を含んでいる前記行列が行列
the matrix containing the plaintext is a matrix
前記第1のコンピュータ・システムによって、圧縮可能な準同型暗号方式を前記データベース内のデータに対して実行して、前記データベース内の前記選択されたエントリに対応する暗号化された回答を計算することであって、前記圧縮可能な準同型暗号方式が、対応する平文の回答よりもあまり長くない前記暗号化された回答を生成し、その暗号化された回答の計算が、前記データベース内のバイトごとに数サイクルを必要とする、前記計算することと、
前記第1のコンピュータ・システムによって、前記第2のコンピュータ・システムに、前記要求に対する応答を送信することであって、前記応答が、要求されている前記選択されたエントリに対応する前記暗号化された回答を含む、前記送信することとを含む、方法。 receiving, at a first computer system, from a second computer system a request for entries selected from a database on said first computer system;
performing, by the first computer system, compressible homomorphic encryption on data in the database to compute an encrypted answer corresponding to the selected entry in the database; wherein the compressible homomorphic encryption scheme produces the encrypted answer that is not much longer than the corresponding plaintext answer, and the encrypted answer computation is byte-by-byte in the database said calculating, requiring several cycles to
sending, by the first computer system, to the second computer system, a response to the request, the response being the encrypted encrypted entry corresponding to the selected entry being requested; and sending the answer.
前記要求が、前記データベース内のインデックスiを有している選択されたエントリに対応し、
前記第1のコンピュータ・システムによって、圧縮可能な準同型暗号方式を前記データベース内の前記データに対して実行して、暗号化された回答を計算することが、
前記要求を処理して、インデックス要素(i1,i2,...,iD)を含んでいるインデックス要素の単項表現を取得することと、
前記N次元のうちの第1の次元について、各超行rに、i1番目の次元に対応する第1のベクトルからの前記超行に対応するr番目の暗号化されたビットを掛け、前記掛け算が前記i1番目の前記超行を除くすべてをゼロにすることによって、および結果として得られた暗号化された超行をすべて加算して、より小さい数の次元のより小さいデータベースを取得することによって、前記第1の次元を折り畳むことと、
前記インデックスiに対応する前記選択されたエントリのみを含んでいるゼロ次元の超立方体が残されるまで、1つずつ他の前記次元を折り畳み続けることとをさらに含み、
送信することが、前記インデックスiに対応する前記エントリを送信することを含む、請求項17に記載の方法。 indexing into the database to N database entries in corresponding N dimensions;
the request corresponds to a selected entry having index i in the database;
performing, by the first computer system, compressible homomorphic encryption on the data in the database to compute an encrypted answer;
processing the request to obtain a unary representation of index elements, including index elements (i1, i2, . . . , iD);
For a first of said N dimensions, multiply each super-row r by the r-th encrypted bit corresponding to said super-row from a first vector corresponding to i1-th dimension, and said multiplication by zeroing all but the i1-th superline, and adding all the resulting encrypted superlines to obtain a smaller database of a smaller number of dimensions , folding the first dimension;
continuing to fold the other dimensions one by one until a zero-dimensional hypercube is left that contains only the selected entry corresponding to the index i;
18. The method of claim 17, wherein transmitting comprises transmitting the entry corresponding to the index i.
前記第2のコンピュータ・システムによって、前記暗号化されたインデックスを使用する前記第1のコンピュータ・システムからの項目の検索を要求することと、
前記第2のコンピュータ・システムによって、前記第1のコンピュータ・システムから、前記要求に対する応答を受信することであって、前記応答が、前記暗号化されたインデックスを使用して要求された前記データベース内のエントリに対応する、1つまたは複数の圧縮された暗号文を含んでいる暗号化された回答を含む、前記受信することと、
前記第2のコンピュータ・システムによって、前記1つまたは複数の圧縮された暗号文を対応する平文に復号することとを含む、方法。 encrypting an index i of an entry transmitted by a second computer system to a first computer system and stored in a database by said first computer system, wherein said index i is ND said encrypting in a mixed radix of radixes, said database also comprising ND radixes;
requesting retrieval by the second computer system of items from the first computer system using the encrypted index;
receiving, by the second computer system, from the first computer system, a response to the request, wherein the response is in the database requested using the encrypted index; receiving an encrypted answer containing one or more compressed ciphertexts corresponding to entries in
and decrypting, by the second computer system, the one or more compressed ciphertexts into corresponding plaintexts.
i1の最下位ビットσ1,0には、単位元を使用して前記最下位ビットを乗算し、前記ビットσ1,0にはq’も掛けることと、
i1の他のビットには、幅広かつ短いガジェット行列を使用して前記他のビットを乗算することと、
j>1の他のijの単項表現をエンコードするビットには、やや四角形のガジェット行列を使用して、前記単項表現をエンコードする前記ビットを乗算することとを含む、請求項26に記載の方法。 Encrypting the index i
the least significant bit σ1,0 of i1 is multiplied by said least significant bit using identity, said bit σ1,0 also multiplied by q';
multiplying other bits of i1 using a wide and short gadget matrix;
27. The method of claim 26, comprising multiplying the bits encoding the unary representations with bits encoding other ij unary representations with j > 1 using a slightly rectangular gadget matrix. .
前記平文を含んでいる前記行列が行列
the matrix containing the plaintext is a matrix
前記平文を含んでいる前記行列が行列
the matrix containing the plaintext is a matrix
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2024029851A JP2024063125A (en) | 2019-06-18 | 2024-02-29 | Homomorphic encryption methods applied to private information retrieval |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/444,540 | 2019-06-18 | ||
US16/444,278 | 2019-06-18 | ||
US16/444,278 US10972252B2 (en) | 2019-06-18 | 2019-06-18 | Compressible (F)HE with applications to PIR |
US16/444,540 US10985904B2 (en) | 2019-06-18 | 2019-06-18 | Compressible (F)HE with applications to PIR |
PCT/EP2020/066490 WO2020254248A1 (en) | 2019-06-18 | 2020-06-15 | Homomorphic encryption with applications to private information retrieval |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2024029851A Division JP2024063125A (en) | 2019-06-18 | 2024-02-29 | Homomorphic encryption methods applied to private information retrieval |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2022537531A JP2022537531A (en) | 2022-08-26 |
JPWO2020254248A5 true JPWO2020254248A5 (en) | 2022-11-21 |
JP7486529B2 JP7486529B2 (en) | 2024-05-17 |
Family
ID=74038352
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021574206A Active JP7486529B2 (en) | 2019-06-18 | 2020-06-15 | Homomorphic encryption methods applied to private information retrieval |
JP2024029851A Pending JP2024063125A (en) | 2019-06-18 | 2024-02-29 | Homomorphic encryption methods applied to private information retrieval |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2024029851A Pending JP2024063125A (en) | 2019-06-18 | 2024-02-29 | Homomorphic encryption methods applied to private information retrieval |
Country Status (12)
Country | Link |
---|---|
US (4) | US10985904B2 (en) |
EP (1) | EP3984160B1 (en) |
JP (2) | JP7486529B2 (en) |
KR (1) | KR20220004201A (en) |
CN (1) | CN113906712A (en) |
AU (1) | AU2020294855B2 (en) |
BR (1) | BR112021025744A2 (en) |
CA (1) | CA3143362A1 (en) |
IL (1) | IL288975B2 (en) |
MX (1) | MX2021014837A (en) |
SG (1) | SG11202110349VA (en) |
WO (1) | WO2020254248A1 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180373882A1 (en) * | 2017-06-23 | 2018-12-27 | Thijs Veugen | Privacy preserving computation protocol for data analytics |
CN112182595B (en) * | 2019-07-03 | 2024-03-26 | 北京百度网讯科技有限公司 | Model training method and device based on federal learning |
US11526466B2 (en) * | 2019-08-23 | 2022-12-13 | Salesforce, Inc. | Uniform growth for differently sized files |
US20210081807A1 (en) * | 2019-09-17 | 2021-03-18 | Sap Se | Non-Interactive Private Decision Tree Evaluation |
IL272520A (en) * | 2020-02-06 | 2021-08-31 | Google Llc | Aggregating encrypted network values |
KR20210146513A (en) * | 2020-05-27 | 2021-12-06 | 삼성전자주식회사 | Artificial intelligence calculation semiconductor device and storage device comprising the same |
EP3993308A1 (en) * | 2020-10-29 | 2022-05-04 | Zama SAS | Fully homomorphic cryptography with improved data item representation |
CN112766495A (en) * | 2021-01-26 | 2021-05-07 | 支付宝(杭州)信息技术有限公司 | Deep learning model privacy protection method and device based on mixed environment |
EP4050471A1 (en) * | 2021-02-26 | 2022-08-31 | Zama SAS | Encrypted scalar multiplication |
US20220321332A1 (en) * | 2021-03-30 | 2022-10-06 | International Business Machines Corporation | Post-quantum cryptography secured execution environments for edge devices |
US20220358237A1 (en) * | 2021-05-04 | 2022-11-10 | International Business Machines Corporation | Secure data analytics |
US11722290B2 (en) * | 2021-05-21 | 2023-08-08 | Samsung Electronics Co., Ltd. | Method and apparatus for modulus refresh in homomorphic encryption |
US11461481B1 (en) * | 2021-06-04 | 2022-10-04 | Polyverse Corporation | Encrypted to be executed software code and execution environment apparatuses, systems, and methods |
EP4120617A1 (en) * | 2021-07-14 | 2023-01-18 | Siemens Healthcare GmbH | Privacy preserving artificial intelligence based clinical decision support |
CN115694776A (en) * | 2021-07-27 | 2023-02-03 | 三星电子株式会社 | Storage device, storage system operation method and computing system |
CN113660085B (en) * | 2021-08-13 | 2023-06-06 | 北方工业大学 | Quantum security multiparty calculation method based on quantum homomorphic encryption |
US20230143175A1 (en) * | 2021-10-29 | 2023-05-11 | Seagate Technology Llc | Device specific multiparty computation |
US20230327847A1 (en) * | 2022-04-10 | 2023-10-12 | International Business Machines Corporation | Compression of homomorphic ciphertexts |
CN115378571A (en) * | 2022-06-28 | 2022-11-22 | 中国人民武装警察部队工程大学 | GSW type multi-key fully homomorphic encryption method with efficient ciphertext expansion process |
KR20240018910A (en) | 2022-08-03 | 2024-02-14 | 경희대학교 산학협력단 | Quantum end-to-end encryption system and operating method thereof |
CN116016571A (en) * | 2022-12-29 | 2023-04-25 | 中国科学技术大学 | Distributed storage method, system, equipment and storage medium based on RCRT |
US11977657B1 (en) * | 2023-02-22 | 2024-05-07 | Lorica Cybersecurity Inc. | Method and system for confidential repository searching and retrieval |
CN117729534A (en) * | 2023-05-17 | 2024-03-19 | 荣耀终端有限公司 | Query method, electronic equipment and system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9569771B2 (en) | 2011-04-29 | 2017-02-14 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
KR101795771B1 (en) * | 2013-03-18 | 2017-11-09 | 한국전자통신연구원 | System and method for providing compressed encryption and decryption in homomorphic cryptography based on intergers |
KR102019159B1 (en) * | 2013-12-23 | 2019-09-09 | 한국전자통신연구원 | Apparatus and methdo for giving the compressed encryption functionality to integer-based homomorphic encryption schemes |
US9397832B2 (en) * | 2014-08-27 | 2016-07-19 | International Business Machines Corporation | Shared data encryption and confidentiality |
WO2016048775A1 (en) | 2014-09-26 | 2016-03-31 | Thomson Licensing | Xor-homomorphic cryptosystems with fast key generation |
JP6381128B2 (en) * | 2015-02-05 | 2018-08-29 | 国立研究開発法人産業技術総合研究所 | SEARCH SYSTEM, CLIENT, SERVER, SEARCH PROGRAM, AND SEARCH METHOD |
FR3035986B1 (en) | 2015-05-06 | 2018-07-27 | Morpho | METHOD FOR GENERATING A MESSAGE SIGNATURE FROM A DIGITAL SIGNATURE TOKEN USING A HOMOMORPHIC ENCRYPTION FUNCTION |
US10560257B2 (en) * | 2015-07-08 | 2020-02-11 | Brown University | Homomorphic encryption |
FR3040842B1 (en) * | 2015-09-03 | 2018-12-07 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | METHOD OF CONFIDENTIAL INTERROGATION OF A GEODEPENDANT SERVICE BY HOMOMORPHIC CRYPTOGRAPHY |
US10554385B2 (en) * | 2015-09-04 | 2020-02-04 | Nec Corporation | Method for providing encrypted data in a database and method for searching on encrypted data |
WO2017061024A1 (en) * | 2015-10-09 | 2017-04-13 | 三菱電機株式会社 | Secret retrieval system, management device, secret retrieval method, and secret retrieval program |
US10972251B2 (en) * | 2017-01-20 | 2021-04-06 | Enveil, Inc. | Secure web browsing via homomorphic encryption |
KR101919940B1 (en) * | 2017-02-08 | 2018-11-19 | 서울대학교산학협력단 | Method for Processing Dynamic Data by Fully Homomorphic Encryption |
CN108964869A (en) * | 2018-06-08 | 2018-12-07 | 浙江捷尚人工智能研究发展有限公司 | The short full homomorphic cryptography method and system of key |
-
2019
- 2019-06-18 US US16/444,540 patent/US10985904B2/en active Active
- 2019-06-18 US US16/444,278 patent/US10972252B2/en active Active
-
2020
- 2020-06-15 IL IL288975A patent/IL288975B2/en unknown
- 2020-06-15 WO PCT/EP2020/066490 patent/WO2020254248A1/en unknown
- 2020-06-15 CN CN202080039791.2A patent/CN113906712A/en active Pending
- 2020-06-15 MX MX2021014837A patent/MX2021014837A/en unknown
- 2020-06-15 KR KR1020217039840A patent/KR20220004201A/en not_active Application Discontinuation
- 2020-06-15 JP JP2021574206A patent/JP7486529B2/en active Active
- 2020-06-15 EP EP20733265.1A patent/EP3984160B1/en active Active
- 2020-06-15 SG SG11202110349VA patent/SG11202110349VA/en unknown
- 2020-06-15 CA CA3143362A patent/CA3143362A1/en active Pending
- 2020-06-15 AU AU2020294855A patent/AU2020294855B2/en active Active
- 2020-06-15 BR BR112021025744A patent/BR112021025744A2/en unknown
- 2020-12-23 US US17/132,388 patent/US11502821B2/en active Active
- 2020-12-23 US US17/132,286 patent/US11394526B2/en active Active
-
2024
- 2024-02-29 JP JP2024029851A patent/JP2024063125A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JPWO2020254248A5 (en) | ||
JP7486529B2 (en) | Homomorphic encryption methods applied to private information retrieval | |
JP6934963B2 (en) | Data encryption methods and systems | |
Norouzi et al. | A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos | |
KR102000861B1 (en) | Obfuscation for protection of streaming media and other data flows | |
US20210399874A1 (en) | Secure distributed key generation for multiparty homomorphic encryption | |
CN111510281A (en) | Homomorphic encryption method and device | |
US7912213B2 (en) | Device, system and method for fast secure message encryption without key distribution | |
Akavia et al. | Linear-regression on packed encrypted data in the two-server model | |
JPH09505901A (en) | Multi-stream encryption system for confidential communication | |
CN108197484B (en) | Method for realizing node data security in distributed storage environment | |
Zhdanov et al. | Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic | |
WO2023116144A1 (en) | Method and apparatus for joint data processing by two parties for protecting data privacy | |
Li et al. | Fully homomorphic encryption with table lookup for privacy-preserving smart grid | |
Xu et al. | Toward practical privacy-preserving linear regression | |
Zhang et al. | Support-set-assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds | |
CN111031322B (en) | BMP image encryption and decryption method and device of self-synchronizing chaotic stream cipher | |
JPH0697930A (en) | Block cipher processor | |
Chen et al. | Reversible data hiding in encrypted domain by signal reconstruction | |
Hashim et al. | Secret image sharing based on wavelet transform | |
CN108848073B (en) | Method and system for encrypting and decrypting data of real-time data acquisition system | |
Moreno-Alvarado et al. | Joint encryption and compression of audio based on compressive sensing | |
KR20150051567A (en) | Apparatus and methdo for encoding | |
Liu et al. | ESSVCS: an enriched secret sharing visual cryptography | |
CN109617683B (en) | Terminal and cloud server |