SG11202110349VA - Homomorphic encryption with applications to private information retrieval - Google Patents

Homomorphic encryption with applications to private information retrieval

Info

Publication number
SG11202110349VA
SG11202110349VA SG11202110349VA SG11202110349VA SG11202110349VA SG 11202110349V A SG11202110349V A SG 11202110349VA SG 11202110349V A SG11202110349V A SG 11202110349VA SG 11202110349V A SG11202110349V A SG 11202110349VA SG 11202110349V A SG11202110349V A SG 11202110349VA
Authority
SG
Singapore
Prior art keywords
applications
information retrieval
private information
homomorphic encryption
homomorphic
Prior art date
Application number
SG11202110349VA
Inventor
Craig Broadwell Gentry
Shai Halevi
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Publication of SG11202110349VA publication Critical patent/SG11202110349VA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2353Processing of additional data, e.g. scrambling of additional data or processing content descriptors specifically adapted to content descriptors, e.g. coding, compressing or processing of metadata

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Algebra (AREA)
  • Mathematical Optimization (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Multimedia (AREA)
  • Library & Information Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Non-Silver Salt Photosensitive Materials And Non-Silver Salt Photography (AREA)
SG11202110349VA 2019-06-18 2020-06-15 Homomorphic encryption with applications to private information retrieval SG11202110349VA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/444,540 US10985904B2 (en) 2019-06-18 2019-06-18 Compressible (F)HE with applications to PIR
US16/444,278 US10972252B2 (en) 2019-06-18 2019-06-18 Compressible (F)HE with applications to PIR
PCT/EP2020/066490 WO2020254248A1 (en) 2019-06-18 2020-06-15 Homomorphic encryption with applications to private information retrieval

Publications (1)

Publication Number Publication Date
SG11202110349VA true SG11202110349VA (en) 2021-10-28

Family

ID=74038352

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202110349VA SG11202110349VA (en) 2019-06-18 2020-06-15 Homomorphic encryption with applications to private information retrieval

Country Status (12)

Country Link
US (4) US10985904B2 (en)
EP (1) EP3984160B1 (en)
JP (2) JP7486529B2 (en)
KR (1) KR20220004201A (en)
CN (1) CN113906712A (en)
AU (1) AU2020294855B2 (en)
BR (1) BR112021025744A2 (en)
CA (1) CA3143362A1 (en)
IL (1) IL288975B2 (en)
MX (1) MX2021014837A (en)
SG (1) SG11202110349VA (en)
WO (1) WO2020254248A1 (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180373882A1 (en) * 2017-06-23 2018-12-27 Thijs Veugen Privacy preserving computation protocol for data analytics
CN112182595B (en) * 2019-07-03 2024-03-26 北京百度网讯科技有限公司 Model training method and device based on federal learning
US11526466B2 (en) * 2019-08-23 2022-12-13 Salesforce, Inc. Uniform growth for differently sized files
US20210081807A1 (en) * 2019-09-17 2021-03-18 Sap Se Non-Interactive Private Decision Tree Evaluation
IL272520A (en) * 2020-02-06 2021-08-31 Google Llc Aggregating encrypted network values
KR20210146513A (en) * 2020-05-27 2021-12-06 삼성전자주식회사 Artificial intelligence calculation semiconductor device and storage device comprising the same
EP3993308A1 (en) * 2020-10-29 2022-05-04 Zama SAS Fully homomorphic cryptography with improved data item representation
CN112766495A (en) * 2021-01-26 2021-05-07 支付宝(杭州)信息技术有限公司 Deep learning model privacy protection method and device based on mixed environment
EP4050471A1 (en) * 2021-02-26 2022-08-31 Zama SAS Encrypted scalar multiplication
US20220321332A1 (en) * 2021-03-30 2022-10-06 International Business Machines Corporation Post-quantum cryptography secured execution environments for edge devices
US20220358237A1 (en) * 2021-05-04 2022-11-10 International Business Machines Corporation Secure data analytics
US11722290B2 (en) * 2021-05-21 2023-08-08 Samsung Electronics Co., Ltd. Method and apparatus for modulus refresh in homomorphic encryption
US11461481B1 (en) * 2021-06-04 2022-10-04 Polyverse Corporation Encrypted to be executed software code and execution environment apparatuses, systems, and methods
US12021967B2 (en) * 2021-07-14 2024-06-25 Siemens Healthineers Ag Privacy preserving artificial intelligence based clinical decision support
CN115694776A (en) * 2021-07-27 2023-02-03 三星电子株式会社 Storage device, storage system operation method and computing system
CN113660085B (en) * 2021-08-13 2023-06-06 北方工业大学 Quantum security multiparty calculation method based on quantum homomorphic encryption
US20230143175A1 (en) * 2021-10-29 2023-05-11 Seagate Technology Llc Device specific multiparty computation
CN115378571A (en) * 2022-06-28 2022-11-22 中国人民武装警察部队工程大学 GSW type multi-key fully homomorphic encryption method with efficient ciphertext expansion process
KR20240018910A (en) 2022-08-03 2024-02-14 경희대학교 산학협력단 Quantum end-to-end encryption system and operating method thereof
CN116016571A (en) * 2022-12-29 2023-04-25 中国科学技术大学 Distributed storage method, system, equipment and storage medium based on RCRT
US11977657B1 (en) * 2023-02-22 2024-05-07 Lorica Cybersecurity Inc. Method and system for confidential repository searching and retrieval
CN117729534A (en) * 2023-05-17 2024-03-19 荣耀终端有限公司 Query method, electronic equipment and system

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9569771B2 (en) 2011-04-29 2017-02-14 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields
KR101795771B1 (en) * 2013-03-18 2017-11-09 한국전자통신연구원 System and method for providing compressed encryption and decryption in homomorphic cryptography based on intergers
KR102019159B1 (en) * 2013-12-23 2019-09-09 한국전자통신연구원 Apparatus and methdo for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
US9397832B2 (en) * 2014-08-27 2016-07-19 International Business Machines Corporation Shared data encryption and confidentiality
WO2016048775A1 (en) 2014-09-26 2016-03-31 Thomson Licensing Xor-homomorphic cryptosystems with fast key generation
JP6381128B2 (en) * 2015-02-05 2018-08-29 国立研究開発法人産業技術総合研究所 SEARCH SYSTEM, CLIENT, SERVER, SEARCH PROGRAM, AND SEARCH METHOD
FR3035986B1 (en) 2015-05-06 2018-07-27 Morpho METHOD FOR GENERATING A MESSAGE SIGNATURE FROM A DIGITAL SIGNATURE TOKEN USING A HOMOMORPHIC ENCRYPTION FUNCTION
WO2017008043A1 (en) * 2015-07-08 2017-01-12 Brown University Homomorphic encryption
FR3040842B1 (en) * 2015-09-03 2018-12-07 Commissariat A L'energie Atomique Et Aux Energies Alternatives METHOD OF CONFIDENTIAL INTERROGATION OF A GEODEPENDANT SERVICE BY HOMOMORPHIC CRYPTOGRAPHY
WO2017036547A1 (en) * 2015-09-04 2017-03-09 Nec Europe Ltd. Method for providing encrypted data in a database and method for searching on encrypted data
EP3361469B8 (en) * 2015-10-09 2021-03-10 Mitsubishi Electric Corporation Secret search system, management device, secret search method, and secret search program
US10721057B2 (en) * 2017-01-20 2020-07-21 Enveil, Inc. Dynamic channels in secure queries and analytics
KR101919940B1 (en) * 2017-02-08 2018-11-19 서울대학교산학협력단 Method for Processing Dynamic Data by Fully Homomorphic Encryption
CN108964869A (en) * 2018-06-08 2018-12-07 浙江捷尚人工智能研究发展有限公司 The short full homomorphic cryptography method and system of key

Also Published As

Publication number Publication date
US10985904B2 (en) 2021-04-20
IL288975B1 (en) 2024-02-01
US11394526B2 (en) 2022-07-19
WO2020254248A1 (en) 2020-12-24
AU2020294855A1 (en) 2021-10-14
EP3984160A1 (en) 2022-04-20
IL288975B2 (en) 2024-06-01
MX2021014837A (en) 2022-01-18
KR20220004201A (en) 2022-01-11
JP7486529B2 (en) 2024-05-17
US11502821B2 (en) 2022-11-15
CA3143362A1 (en) 2020-12-24
US20210111865A1 (en) 2021-04-15
IL288975A (en) 2022-02-01
EP3984160C0 (en) 2023-07-26
US20200403772A1 (en) 2020-12-24
CN113906712A (en) 2022-01-07
US20210111864A1 (en) 2021-04-15
JP2022537531A (en) 2022-08-26
BR112021025744A2 (en) 2022-02-22
EP3984160B1 (en) 2023-07-26
JP2024063125A (en) 2024-05-10
US20200403781A1 (en) 2020-12-24
US10972252B2 (en) 2021-04-06
AU2020294855B2 (en) 2023-08-10

Similar Documents

Publication Publication Date Title
IL288975A (en) Homomorphic encryption with applications to private information retrieval
ZA201902554B (en) Blockchain data protection using homomorphic encryption
EP3545640A4 (en) Blockchain data protection using homomorphic encryption
SG11201913992XA (en) Blockchain architecture with record security
GB2540987B (en) Bootstrapping without transferring private key
EP3256967A4 (en) Increasing search ability of private, encrypted data
EP3811296A4 (en) Mutual information adversarial autoencoder
EP3189459A4 (en) Encrypting and decrypting information
EP3274904A4 (en) Systems, methods, and apparatus to provide private information retrieval
EP3238374A4 (en) Encryption key retrieval
EP3750099A4 (en) Key encryption handling
DK3192869T3 (en) INSULATED OLIGONUKLEOTID AND APPLICATION THEREFORE IN NUCLEAR INQUIRY
PL3574630T3 (en) Secret-based blockchain storage with privacy
IL266445B (en) Secure key management
EP3843326A4 (en) Method and device employing smart contract to realize identity-based key management
EP3080945A4 (en) Obfuscating in memory encryption keys
IT201700117886A1 (en) ENDOTHERMAL ENGINE WITH PERFECT LUBRICATION CIRCUIT
ZA201808278B (en) Key wallet butterfly type
DK3555132T3 (en) ANTIBODIES TO LIF AND USES THEREOF
GB2615676B (en) Private key management
EP3011009A4 (en) Bacterial mutants with improved transformation efficiency
IT201600108158A1 (en) ENDOTHERMAL ENGINE WITH IMPROVED DISTRIBUTION SYSTEM
ES1170208Y (en) SECURITY PROVISION FOR CONNECTING ELECTRICAL AND DIGITAL METERS
ITUA20163350A1 (en) SHELL FOR LOW VOLTAGE JOINTS FOR GEL INSULATION WITH REMOVABLE BULKHEADS.
EP3759768A4 (en) Power plugs with lock rings