-
公开(公告)号:US20240223359A1
公开(公告)日:2024-07-04
申请号:US18610167
申请日:2024-03-19
Applicant: Seagate Technology LLC
Inventor: Foo Yee YEO , Vipin Singh SEHRAWAT
CPC classification number: H04L9/085 , H04L9/0656
Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
-
公开(公告)号:US20220358053A1
公开(公告)日:2022-11-10
申请号:US17308882
申请日:2021-05-05
Applicant: Seagate Technology LLC
Inventor: Riyan Alex MENDONSA , Yasaman KESHTKARJAHROMI , Josip RELOTA , Vipin Singh SEHRAWAT
Abstract: In at least one implementation, technology disclosed herein provides a method including generating a plurality of shares of an encryption key such that a combination of shares having a cardinality above a threshold cardinality is sufficient to retrieve data encrypted with the encryption key, distributing the plurality of shares among a plurality of devices, the plurality of devices including one or more disc drive cartridges and one or more printed circuit board assemblies (PCBAs) configured to host one or more of the disc drive cartridges, receiving one or more of the plurality of shares from the plurality of devices, and in response to determining that cardinality of the received one or more of the plurality of shares is above the threshold cardinality, retrieving the data encrypted with the key.
-
公开(公告)号:US20230102012A1
公开(公告)日:2023-03-30
申请号:US17490965
申请日:2021-09-30
Applicant: Seagate Technology LLC
Inventor: Nolan MIRANDA , Vipin Singh SEHRAWAT , Foo Yee YEO
IPC: H04L9/08
Abstract: Polynomial function secret sharing provides for computation of reconstruction share results for a polynomial function on an input. An allocatable share of the polynomial function is received at a computing system of the share result computation systems. The allocatable share is generated from the polynomial function. Each of the allocatable shares is distributed to a unique share result computation system of the share result computation systems. Each allocatable share includes a share element for each coefficient in the polynomial function, wherein the share elements for a coefficient across the share result computation systems summing to the coefficient. A reconstruction share result is generated at the computing system by computing a dot product of the input and the allocatable share received by the computing system. A combination of the reconstruction share results generated by the share result computation systems yields a reconstructed result of the polynomial function on the input.
-
公开(公告)号:US20220085978A1
公开(公告)日:2022-03-17
申请号:US17018899
申请日:2020-09-11
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Foo Yee YEO
Abstract: A secret sharing scheme in which a trust structure of the parties receiving a share of the secret is encoded in the shares. In this regard, an access structure defining an authorized set of participants may be based, at least in part, on the encoded trust structures. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized set of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized set of participants, the secret reconstruction fails. In this regard, secret sharing with asymmetrical trust structures may be provided in which the trust structures are not known by other parties in the scheme.
-
公开(公告)号:US20220014386A1
公开(公告)日:2022-01-13
申请号:US16912482
申请日:2020-06-25
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Dmitriy VASSILYEV
Abstract: In one implementation, the disclosure provides systems and methods for generating a secure signature using a device-specific and group-specific moving target authentication protocol. According to one implementation, generating the secure signature entails determining a state of a first device in association with a select time interval. The state of the first device is defined by one or more time-variable characteristics of the first device. The device computes an output for a signing function that depends upon the determined state of the first device associated with the first time interval.
-
公开(公告)号:US20230143175A1
公开(公告)日:2023-05-11
申请号:US17514755
申请日:2021-10-29
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Dmitriy VASSILYEV , Foo Yee YEO
CPC classification number: H04L9/085 , G06F17/18 , H04L9/0875 , H04L2209/46
Abstract: In one implementation, the disclosure provides systems and methods for a multi-party secret sharing protocol that is device specific in that the secret matrix used herein is tied to individual computing devices. Specifically, the method includes determining device channel errors of a plurality of computing devices based on channel impulse response (CIR) of communication channels of the plurality of computing devices, training a linear regression model using the device channel errors to generate learning with error (LWE) secrets for each of the plurality of computing devices, generating a general access structure secret matrix using the LWE secrets from each of the plurality of computing devices, and distributing shares of the general access structure secret matrix to the plurality of computing devices based on a multi-party secret sharing protocol, wherein the multi-party secret sharing protocol provides that the general access structure secret matrix cannot be constructed without shares from an authorized set of the computing devices.
-
公开(公告)号:US20220247550A1
公开(公告)日:2022-08-04
申请号:US17164509
申请日:2021-02-01
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Foo Yee YEO
IPC: H04L9/00
Abstract: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.
-
公开(公告)号:US20230388116A1
公开(公告)日:2023-11-30
申请号:US17824750
申请日:2022-05-25
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Josip RELOTA
CPC classification number: H04L9/16 , H04L9/0869 , H04L9/008
Abstract: Key rotation verification without decryption is provided. Two ciphertext inputs encrypted from a plaintext input by an encryption function using different cryptographic keys are input, wherein the encryption function is selected from a function family having an output space of one or more convex sets. A divergence between the two ciphertext inputs is computed. A membership oracle is executed on the two ciphertext inputs, wherein the two ciphertext inputs are determined to be members of the same convex set of the one or more convex sets if the computed divergence satisfies a separation condition. The two ciphertext inputs are validated to both correspond to the same plaintext input, responsive to determining that the two ciphertext inputs are members of the same convex set, wherein the two ciphertext inputs do not correspond to the same plaintext input if the two ciphertext inputs are not members of the same convex set.
-
公开(公告)号:US20220318431A1
公开(公告)日:2022-10-06
申请号:US17219263
申请日:2021-03-31
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT
Abstract: A computer-implemented method receives at least two unique versions of program code of a program, generates a code-based key for each unique version of the program code, generates a code-based signature for each unique version of the program using a bi-homomorphic pseudorandom function selected from a family of bi-homomorphic pseudorandom functions. Each code-based signature is generated by the selected bi-homomorphic pseudorandom function based on the corresponding code-based key. Each generated code-based signature for each unique version of the program code is incorporated into the program code of the corresponding unique version of the program.
-
公开(公告)号:US20220085979A1
公开(公告)日:2022-03-17
申请号:US17018991
申请日:2020-09-11
Applicant: Seagate Technology LLC
Inventor: Vipin Singh SEHRAWAT , Foo Yee YEO
Abstract: A layered secret sharing scheme in which a trust set of each of the parties receiving a share of the secret is received and used to generate an authorized set and an adversary set for reconstruction of a secret. In this regard, an access structure defining an authorized subset of participants may be based, at least in part, on the encoded trust subsets of the shares. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized subset of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized subset of participants or if participants define an adversary subset, the secret reconstruction fails. In this regard, even if an authorized subset is present, if an adversary subset is present, the reconstruction may be “killed.”
-
-
-
-
-
-
-
-
-