Anonymized generating and proving of processed data

A technology of data and plaintext data, which is applied in the field of anonymous generation and proof of data, and can solve problems such as semantic insecurity

Active Publication Date: 2021-12-28
SIEMENS HEALTHCARE GMBH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since RSA in its original form is deterministic, it is semantically unsafe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymized generating and proving of processed data
  • Anonymized generating and proving of processed data
  • Anonymized generating and proving of processed data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] figure 1 and figure 2 The data flows of the first and second embodiments of the method for providing processed data PD are shown. The data flow is between a first encryption entity ENC-E1, a second encryption entity ENC-E2, a processing entity PROC-E and a decryption entity DEC-E. The second encrypted entity exists only in figure 2 In the second embodiment shown in . In both implementations, entities differ pairwise. Alternatively, the first encryption entity ENC-E1 and the second encryption entity ENC-E2 may be the same entity and the decryption entity DEC-E is different from the first encryption entity ENC-E1 and the second encryption entity ENC-E2. Alternatively, the first encryption entity ENC-E1 and the decryption entity DEC-E may be the same entity and the second encryption entity ENC-E2 is different from the first encryption entity ENC-E1 and the decryption entity. Alternatively, the first encryption entity ENC-E1, the second encryption entity ENC-E2 and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides anonymous generation and attestation of processed data. The invention relates to a computer-implemented method for providing processed data. The method includes: receiving, by a first encryption entity, first plaintext data including a matrix of numbers; determining, by the first encryption entity, an encryption key including an integer matrix; homomorphically encrypting, by the first encryption entity, the first plaintext data based on a matrix multiplication of the first plaintext data and the encryption key, to generate first encrypted data; sending, by the first encryption entity, the first encrypted data to a processing entity; receiving, by a decryption entity, encrypted processed data from the processing entity, the encrypted processed data being based on the first encrypted data; decrypting, by the decryption entity, the encrypted processed data based on a matrix multiplication of the processed data and an inverse of the encryption key, to generate processed data; and providing, by the decryption entity, the processed data.

Description

technical field [0001] The present invention relates to anonymous generation and certification of processed data, in particular to a computer-implemented method for providing processed data, a providing system for providing processed data, a computer program, and a computer-readable medium. Background technique [0002] The Inventor Shylashree Nagaraja is affiliated with Department of Electronics and Communications Engineering, RV College of Engineering, Department of Electronics and Communications Engineering, RV College of Engineering, RV Vidyaniketan Post, Mysuru Road, Mile 8, Bengaluru – 560059, India 8th Mile). [0003] For processing large amounts of data, such as for training machine learning algorithms, a common approach is to utilize external resources, especially cloud computing resources. For example, a training data set may be stored in a cloud storage device, and a machine learning algorithm may be trained by a cloud computing processor based on the training da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06K9/62G06N20/00
CPCG06F21/602G06F21/6218G06F21/64G06N20/00G06F18/214G06F21/6245H04L9/008H04L2209/42H04L9/3093G06F17/16H04L9/0618H04L9/0825H04L9/0869
Inventor 斯里克里希纳·普拉萨德希拉什里·纳加拉贾
Owner SIEMENS HEALTHCARE GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products