Unlock instant, AI-driven research and patent intelligence for your innovation.

Techniques for securely executing code that operates on encrypted data on a public computer

A technology for encrypting data and computers, applied in computer security devices, quantum computers, internal/peripheral computer component protection, etc., can solve problems such as loss efficiency

Pending Publication Date: 2020-10-20
UNIV OF CENT FLORIDA RES FOUND INC +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the amount of stored data is very large, such as in the order of Terabits (Tb, 1Tb=10 12 bits), some efficiency is lost if most of the encrypted data must be returned to the local secure processor for processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Techniques for securely executing code that operates on encrypted data on a public computer
  • Techniques for securely executing code that operates on encrypted data on a public computer
  • Techniques for securely executing code that operates on encrypted data on a public computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention proposes a method and system for securely processing encrypted data on a common resource, for example, taking advantage of superior processing power, efficiency or resiliency, or a combination thereof, on a common resource such as the cloud. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the invention.

[0053] Notwithstanding that the numerical ranges and parameters setting forth broad ranges are approximations, the numerical values ​​set forth in specific non-limiting examples are reported as precisely as possible. Any numerical value, however, inherently contains certain errors resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques, for secure processing of encrypted data on public resources, include receiving first data indicating a sequence of reversible q-bit gates including a first segment for decrypting, a secondsegment for operating on the decrypted data, and a third segment for encrypting the resulting data. Second data indicates rules for replacing a first sequence of two gates operating on at least one shared bit of an input N-bit word with a different second sequence of one or more gates that produce the same output N-bit word. The second data is used to propagate: a gate from the first segment a distance into the second segment or beyond; and, a gate from the third segment a distance into the second segment or before. This produces an obfuscated sequence of reversible gates. Obfuscated instructions based on the obfuscated sequence of gates are sent to the public resources.

Description

Background technique [0001] Data can often be kept private from the public by encrypting the data and utilizing powerful public resources such as cloud data storage and cloud computing to store the encrypted data. However, when the amount of stored data is very large, such as in the order of Terabits (Tb, 1Tb=10 12 bits), some efficiency is lost if most of the encrypted data must be returned to the local secure processor for processing. Similarly, if the operation involves enormous computing resources, even with relatively little data, it would be advantageous to run it on a powerful public resource (such as a cloud processor) rather than on a secure computer with relatively limited computing power of. However, to decrypt the data, a processor on a powerful public source exposes the encryption method and reveals the underlying data. Contents of the invention [0002] Techniques are provided for securely processing encrypted data on an insecure but potentially powerful pub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/72
CPCG06F21/12G06F21/14H04L2209/16H04L9/0631H04L9/06G09C1/00G06N10/00G06N5/01G06F21/125G06F21/602G06F2221/2125G06F2221/033H04L9/0618
Inventor E·姆希奥罗C·卡蒙
Owner UNIV OF CENT FLORIDA RES FOUND INC