SG11202108409WA - Fast oblivious transfers - Google Patents

Fast oblivious transfers

Info

Publication number
SG11202108409WA
SG11202108409WA SG11202108409WA SG11202108409WA SG11202108409WA SG 11202108409W A SG11202108409W A SG 11202108409WA SG 11202108409W A SG11202108409W A SG 11202108409WA SG 11202108409W A SG11202108409W A SG 11202108409WA SG 11202108409W A SG11202108409W A SG 11202108409WA
Authority
SG
Singapore
Prior art keywords
fast
oblivious transfers
oblivious
transfers
fast oblivious
Prior art date
Application number
SG11202108409WA
Inventor
Daniel Siegfried Werner Masny
Peter Byerley Rindal
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11202108409WA publication Critical patent/SG11202108409WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/50Oblivious transfer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
SG11202108409WA 2019-02-12 2019-06-14 Fast oblivious transfers SG11202108409WA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201962804435P 2019-02-12 2019-02-12
US16/434,338 US11190496B2 (en) 2019-02-12 2019-06-07 Fast oblivious transfers
PCT/US2019/037318 WO2020167333A1 (en) 2019-02-12 2019-06-14 Fast oblivious transfers

Publications (1)

Publication Number Publication Date
SG11202108409WA true SG11202108409WA (en) 2021-08-30

Family

ID=71945415

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202108409WA SG11202108409WA (en) 2019-02-12 2019-06-14 Fast oblivious transfers

Country Status (5)

Country Link
US (2) US11190496B2 (en)
EP (1) EP3924852B1 (en)
CN (1) CN113424185B (en)
SG (1) SG11202108409WA (en)
WO (1) WO2020167333A1 (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11856093B2 (en) * 2018-03-30 2023-12-26 Centre National De La Recherche Scientifique (Cnrs) Method for spacetime-constrained oblivious transfer
US11372988B2 (en) 2019-06-25 2022-06-28 Raytheon Company Secure data deletion and sanitization in distributed file systems
US11658815B2 (en) * 2020-08-03 2023-05-23 Coinbase Il Rd Ltd. System and method for performing key operations during a multi-party computation process
KR20220052352A (en) * 2020-08-14 2022-04-27 구글 엘엘씨 Online privacy protection technology
CN112134682B (en) * 2020-09-09 2022-04-12 支付宝(杭州)信息技术有限公司 Data processing method and device for OTA protocol
CN112564887A (en) * 2020-11-30 2021-03-26 北京百度网讯科技有限公司 Key protection processing method, device, equipment and storage medium
US11799643B2 (en) * 2021-01-19 2023-10-24 Bank Of America Corporation Collaborative architecture for secure data sharing
CN113094468A (en) * 2021-02-02 2021-07-09 北京融数联智科技有限公司 OT-based multi-data-source relational graph construction and data alignment method
US11569987B2 (en) * 2021-02-12 2023-01-31 Blackberry Limited Method and system for key agreement utilizing plactic monoids
US11924348B2 (en) * 2021-02-27 2024-03-05 International Business Machines Corporation Honest behavior enforcement via blockchain
CN112966022B (en) * 2021-03-10 2024-04-05 安徽航天信息科技有限公司 Information query method, device and system of data transaction platform
CN112800479B (en) * 2021-04-07 2021-07-06 支付宝(杭州)信息技术有限公司 Multi-party combined data processing method and device by using trusted third party
CN113242123B (en) * 2021-04-29 2023-03-17 龚健 Common user data acquisition method and device and server
CN113381854B (en) * 2021-05-21 2022-05-31 杭州趣链科技有限公司 Data transmission method, device, equipment and storage medium
US11956370B2 (en) 2021-06-23 2024-04-09 Blackberry Limited Method and system for digital signatures utilizing multiplicative semigroups
US20230155811A1 (en) * 2021-11-12 2023-05-18 Micron Technology, Inc. Encrypted information sharing with lightweight devices
CN114301591B (en) * 2021-12-28 2024-06-18 支付宝(杭州)信息技术有限公司 Method, device and system for executing inadvertent transmission protocol
CN114301702B (en) * 2021-12-30 2024-01-30 中国电信股份有限公司 Proxy confusing transmission method and device, storage medium and electronic equipment
CN114553593B (en) * 2022-03-22 2024-05-28 杭州博盾习言科技有限公司 Multiparty secure computing privacy exchange method, device, equipment and storage medium
CN115001674A (en) * 2022-06-02 2022-09-02 蚂蚁区块链科技(上海)有限公司 Execution method of sharing OT protocol, secure multi-party computing method and device
CN115412246B (en) * 2022-11-01 2023-01-31 北京信安世纪科技股份有限公司 Method, device, equipment and storage medium for inadvertent transmission
CN117336100B (en) * 2023-11-27 2024-02-23 湖南湘科智慧科技有限公司 Data processing method and device based on escort service multiparty flattened communication

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7480384B2 (en) 2003-02-10 2009-01-20 International Business Machines Corporation Method for distributing and authenticating public keys using random numbers and Diffie-Hellman public keys
US7620625B2 (en) * 2004-05-20 2009-11-17 Ntt Docomo, Inc. Method and apparatus for communication efficient private information retrieval and oblivious transfer
US20070269041A1 (en) 2005-12-22 2007-11-22 Rajat Bhatnagar Method and apparatus for secure messaging
US8516267B2 (en) * 2009-12-18 2013-08-20 Adrian Spalka Computer readable storage medium for generating an access key, computer implemented method and computing device
US8520842B2 (en) 2010-01-07 2013-08-27 Microsoft Corporation Maintaining privacy during user profiling
US8577029B2 (en) * 2010-09-10 2013-11-05 International Business Machines Corporation Oblivious transfer with hidden access control lists
US8990570B2 (en) 2012-07-31 2015-03-24 Alcatel Lucent Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer
WO2014069783A1 (en) * 2012-10-31 2014-05-08 삼성에스디에스 주식회사 Password-based authentication method, and apparatus for performing same
US9813245B2 (en) * 2014-08-29 2017-11-07 Visa International Service Association Methods for secure cryptogram generation
CN107251476A (en) * 2015-02-13 2017-10-13 维萨国际服务协会 Secret communication is managed
US11316671B2 (en) 2015-06-22 2022-04-26 Viasat, Inc. Accelerated encryption and decryption of files with shared secret and method therefor
US9846785B2 (en) * 2015-11-25 2017-12-19 International Business Machines Corporation Efficient two party oblivious transfer using a leveled fully homomorphic encryption
LT3268914T (en) * 2016-02-23 2018-11-12 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US20170317823A1 (en) 2016-04-28 2017-11-02 Amish Gaganvihari Gandhi Zero Knowledge Encrypted File Transfer
US10715319B2 (en) * 2016-12-15 2020-07-14 Universite Paris Diderot Method and system for spacetime-constrained oblivious transfer

Also Published As

Publication number Publication date
EP3924852A4 (en) 2022-04-06
EP3924852B1 (en) 2024-05-22
US11601407B2 (en) 2023-03-07
CN113424185A (en) 2021-09-21
WO2020167333A1 (en) 2020-08-20
US20220045994A1 (en) 2022-02-10
US20200259800A1 (en) 2020-08-13
EP3924852A1 (en) 2021-12-22
US11190496B2 (en) 2021-11-30
CN113424185B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
SG11202108409WA (en) Fast oblivious transfers
DK3958977T3 (en) Camptothecinderivater
CA196372S (en) Soundbar
CA189498S (en) Showerbase
CA191618S (en) Floorwasher - nozzle
CA201156S (en) Banquette
GB201901778D0 (en) Aladin
DK3980417T3 (en) PRMT5-Inhibitorer
CA190552S (en) Hand-dryer
CA189795S (en) Handshower
CA189673S (en) Uroflowmeter
CA195194S (en) Can
CA193248S (en) Mandoline
CA190385S (en) Beverageware
CA190384S (en) Beverageware
EP3689729C0 (en) Anti-skid-pedal
CA189047S (en) Hammock-tent
GB201900347D0 (en) Blazeloc
CA194482S (en) Kick-scooter
DK3832828T3 (en) Strømforyningsnetsystem
CA192228S (en) Hydrogenerator
CA190974S (en) Hoodie
CA190387S (en) Beverageware
CA190386S (en) Beverageware
CA189434S (en) Jerrycan