Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33 results about "Oblivious transfer" patented technology

In cryptography, an oblivious transfer (OT) protocol is a type of protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.

Design method of safety face verification system based on CNN (convolutional neural network) feature extractor

The invention provides a design method of a safety face verification system based on a CNN (convolutional neural network) feature extractor, belongs to the field of biological feature identification, and particularly relates to a method of utilizing the CNN to extract face features and using a Paillier algorithm and an oblivious transfer technique to encrypt. Compared with the SCiFi (secure computation of face identification) system, the method has the advantages that the manually extracted feature is converted into the CNN self-learning feature, and the CNN self-learning feature is performed with binarization to remove the noise effect, so that the identification accuracy is higher; the testing identification rate is 91.48% on a view 2 of an LFW (labeled face wild) base; in the whole identification process, a server will not obtain any feature information of a requester, and only receive the feature ciphertext information, but not decrypt; a client only obtains whether the identification is passed or not, and does not know the other information, including hamming distance; one face picture is expressed by the 320bit feature, and compared with the SCiFi system, the feature data volume is decreased by 2/3, so that the consumption time of encrypting and identification is low, and the real-time performance is high.
Owner:BEIJING UNIV OF TECH

Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)

A server (120) uses a password (π) to construct a multiplicative group (ZN*) with a (hidden) smooth order subgroup (<x′>), where the group order (Pπ) depends on the password. The client (110) uses its knowledge of the password to generate a root extraction problem instance (z) in the group and to generate data (y) allowing the server to construct a discrete logarithm problem instance (y′) in the subgroup. The server uses its knowledge of the group order to solve the root extraction problem, and solves the discrete logarithm problem efficiently by leveraging the smoothness of the subgroup. A shared key (sk) can be computed as a function of the solutions to the discrete logarithm and root extraction problem instances. In some embodiments, in an oblivious transfer protocol, the server queries the client (at 230) for data whose position in a database (210) is defined by the password. The client provides (240) such data without knowing the data position associated with the server's query. The client obtains the data position independently from the password. The data positions and/or the respective data are used for authentication and shared secret key generation. Other embodiments are also provided.
Owner:NTT DOCOMO INC

K out of n oblivious transfer method and system

The invention discloses a k out of n oblivious transfer method and system. The method comprises following steps of outputting a multiplication cyclic group G according to security parameters; randomly selecting two generation elements in the multiplication cyclic group G; selecting k first random numbers from the multiplication cyclic group G, wherein the first random numbers are in one to one correspondence with k pieces of information to be obtained by an information receiver; calculating request data by the information receiver by utilizing an improved batch processing exponent arithmetic product algorithm according to the two generation elements and the first random numbers; sending the request data to an information holder; selecting second random numbers corresponding to n pieces of information held by the information holder from the multiplication cyclic group G; encrypting the n pieces of information by the information holder according to the request data and the second random numbers, thus obtaining ciphertexts; sending the ciphertexts corresponding to the k pieces of information to the information receiver; and decrypting the ciphertexts by the information receiver according to the first random numbers, thus obtaining the k pieces of information. According to the method provided by the invention, the calculating cost can be reduced; and the information transmission efficiency can be improved.
Owner:BEIHANG UNIV

Privacy protection method based on location service in scene of Internet of Things (IOT)

Provided is a privacy protection method based on location service in a scene of the Internet of Things (IOT). The privacy protection method based on the location service in the scene of the IOT comprises two privacy protection schemes according to the characteristics on the basis of the location service and the privacy protection level, namely an absolute privacy query scheme for a quite high security level and a query privacy scheme for a quite low security level. Through analysis of application scenes, the secure multi-party computation technology is integrated into IOT location privacy protection, by utilization of technologies such as adding random numbers, using dot product properties, and carrying out homomorphic encryption and oblivious transfer protocols, a dot which is nearest to a query input location in a database to be queried is calculated and found out, different levels of protection measures are taken according to the different application scenes, and therefore the effect that the privacy of query input, query results and contents of the database to be queried is protected is achieved in the absolute privacy protection scheme, and the privacy of the query input and the query results is protected in the query privacy protection scheme.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method for switching three-partner key with privacy protection based on password authentication

The present invention relates to an authenticated key exchange technique, and discloses a three-party password-based authenticated key exchange method which is provided with a privacy protection. The method comprises the following steps: an initialization step, exchanging the reserved information by two client subscribers which prepare to do key exchange; a client initialization stage, ciphering the information respectively by two client subscribers which prepare to do key exchange with the respective passwords and sharing passwords in the server and transmitting to the server together with the non-ciphered information; a server procession stage, when the server receives the request information from the client, using an oblivious transfer mechanism for processing these information and generating different returning information aiming at each one in two client subscribers, and then respectively transmitting these information to corresponding client subscriber; a client authorization step, when the client receives the returning information of the server, adopting a mechanism of normal key exchange for processing the returned information based on the password itself in order to generate the seed of the conversation key, and generating the authorization information with the seed of the conversation key for transmitting to the subscriber of the other side; and a conversation key generating step, if the authorization information from the subscriber of the other side is authorized, generating the conversation key with the seed of the conversation key. Compared with prior art, theplan not only realizes the three-party password-based authenticated key exchange, but also simultaneously and effectively protects the privacy information comprising identity and participation actionof the client subscriber which participates the key exchange.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products