DEVICE SPECIFIC MULTIPARTY COMPUTATION
    1.
    发明公开

    公开(公告)号:US20230143175A1

    公开(公告)日:2023-05-11

    申请号:US17514755

    申请日:2021-10-29

    CPC classification number: H04L9/085 G06F17/18 H04L9/0875 H04L2209/46

    Abstract: In one implementation, the disclosure provides systems and methods for a multi-party secret sharing protocol that is device specific in that the secret matrix used herein is tied to individual computing devices. Specifically, the method includes determining device channel errors of a plurality of computing devices based on channel impulse response (CIR) of communication channels of the plurality of computing devices, training a linear regression model using the device channel errors to generate learning with error (LWE) secrets for each of the plurality of computing devices, generating a general access structure secret matrix using the LWE secrets from each of the plurality of computing devices, and distributing shares of the general access structure secret matrix to the plurality of computing devices based on a multi-party secret sharing protocol, wherein the multi-party secret sharing protocol provides that the general access structure secret matrix cannot be constructed without shares from an authorized set of the computing devices.

    FULLY HOMOMORPHIC ENCRYPTION FROM ERROR CANCELING SET SYSTEMS

    公开(公告)号:US20220247550A1

    公开(公告)日:2022-08-04

    申请号:US17164509

    申请日:2021-02-01

    Abstract: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.

    THRESHOLD SECRET SHARING WITH HIDDEN ACCESS STRUCTURES

    公开(公告)号:US20230379144A1

    公开(公告)日:2023-11-23

    申请号:US17748900

    申请日:2022-05-19

    Inventor: Foo Yee YEO

    CPC classification number: H04L9/085

    Abstract: Cryptographic sharing of a cryptographic secret among multiple parties provides a share of the cryptographic secret is generated for each party. Multiple threshold access structure tokens are generated for each party of the multiple parties. The threshold access structure tokens are generated for a party from one or more random token polynomials selected from a finite field based on the numbers of the multiple parties capable of attempting to reconstruct the cryptographic secret. The share of the cryptographic secret and the multiple threshold access structure tokens generated for each party are distributed to the corresponding party. At least a threshold number of the parties can reconstruct the cryptographic secret using the shares of the cryptographic secret and threshold access structure tokens corresponding to at least a threshold number of the parties attempting to reconstruct the cryptographic secret while less than the threshold number of parties cannot reconstruct the cryptographic secret.

    LAYERED SECRET SHARING WITH FLEXIBLE ACCESS STRUCTURES

    公开(公告)号:US20220085979A1

    公开(公告)日:2022-03-17

    申请号:US17018991

    申请日:2020-09-11

    Abstract: A layered secret sharing scheme in which a trust set of each of the parties receiving a share of the secret is received and used to generate an authorized set and an adversary set for reconstruction of a secret. In this regard, an access structure defining an authorized subset of participants may be based, at least in part, on the encoded trust subsets of the shares. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized subset of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized subset of participants or if participants define an adversary subset, the secret reconstruction fails. In this regard, even if an authorized subset is present, if an adversary subset is present, the reconstruction may be “killed.”

    POLYNOMIAL FUNCTION SECRET SHARING

    公开(公告)号:US20230102012A1

    公开(公告)日:2023-03-30

    申请号:US17490965

    申请日:2021-09-30

    Abstract: Polynomial function secret sharing provides for computation of reconstruction share results for a polynomial function on an input. An allocatable share of the polynomial function is received at a computing system of the share result computation systems. The allocatable share is generated from the polynomial function. Each of the allocatable shares is distributed to a unique share result computation system of the share result computation systems. Each allocatable share includes a share element for each coefficient in the polynomial function, wherein the share elements for a coefficient across the share result computation systems summing to the coefficient. A reconstruction share result is generated at the computing system by computing a dot product of the input and the allocatable share received by the computing system. A combination of the reconstruction share results generated by the share result computation systems yields a reconstructed result of the polynomial function on the input.

    PRIVACY PRESERVING SECRET SHARING FROM NOVEL COMBINATORIAL OBJECTS

    公开(公告)号:US20220085978A1

    公开(公告)日:2022-03-17

    申请号:US17018899

    申请日:2020-09-11

    Abstract: A secret sharing scheme in which a trust structure of the parties receiving a share of the secret is encoded in the shares. In this regard, an access structure defining an authorized set of participants may be based, at least in part, on the encoded trust structures. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized set of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized set of participants, the secret reconstruction fails. In this regard, secret sharing with asymmetrical trust structures may be provided in which the trust structures are not known by other parties in the scheme.

    MULTIPLE EVALUATION THRESHOLD FUNCTION SECRET SHARING

    公开(公告)号:US20230095443A1

    公开(公告)日:2023-03-30

    申请号:US17489592

    申请日:2021-09-29

    Abstract: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.

    YES AND NO SECRET SHARING WITH HIDDEN ACCESS STRUCTURES

    公开(公告)号:US20220329410A1

    公开(公告)日:2022-10-13

    申请号:US17219496

    申请日:2021-03-31

    Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.

    ENFORCING ACCESS STRUCTURES IN FULLY HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20220255720A1

    公开(公告)日:2022-08-11

    申请号:US17164609

    申请日:2021-02-01

    Abstract: A homomorphic encryption system receives a ciphertext output of an arithmetic evaluation function. The arithmetic evaluation function is performed on a ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. The ciphertext output is decrypted using a summation of two or more noise-canceling party identifiers of two or more authorized parties, wherein the intersection property of the sets cancels out errors generated during the decrypting operation for the two or more authorized parties.

Patent Agency Ranking