Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49 results about "Outsourcing computation" patented technology

Outsourcing computation with verifiability is a merging notion in cloud computing, which enables lightweight clients to outsource costly computation tasks to the cloud and efficiently check the correctness of the result in the end.

Portal system and method for managing resources in a networked computing environment

A service information portal (SIP) and associated methodology for providing customer-based management information of networked computing environments for Internet service providers (ISPs), outsourcers, and enterprise service providers ("service providers"). The invention enables such service providers to provide the network administrators / users / customers / network managers / network operators ("network administrators") they serve with flexible, extensible, tailored, in-depth views of hosted computing environments in an intuitive graphical format. Generally, the invention extracts from relevant computing environment entities specified information for managing the outsourced computing environment. The specified information is presented on a customized display for consideration and interaction by the network administrator. Specifically, aspects of the invention include a database of executable portal view profiles each designed for and / or by a particular network administrator. Each such portal view profile references one or more portal data miner modules included in a library of such modules. When a portal view profile is invoked, the referenced data miner modules are executed to access hardware and / or software entities in the computing environment for information that is displayed to assist a network administrator manage the outsourced computing environment.
Owner:HEWLETT PACKARD DEV CO LP

Outsourcing encrypted data-orientated verifiable intersection operation method and system

The invention relates to an outsourcing encrypted data-orientated verifiable intersection operation method and system and belongs to the verifiable outsourcing computation field. The method is carried out among a third-party trusted entity, at least two client entities and an outsourcing server side; the client entities are holders of data sets and requesters of data set intersection operation; the third-party entity is mainly responsible for the initialization and distribution of common parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying results and proofs returned by the outsourcing server side and decrypting an ciphertext data set returned by the outsourcing server side; the outsourcing server side is mainly responsible for performing data set intersection operation; and a plaintext data set is not required to be obtained through decryption when the outsourcing server side performs intersection operation, and the outsourcing server performs operation on a ciphertext, and therefore, the privacy of user data can be ensured. The method and system have the advantages of low frequency of interaction among the entities, low communication cost and efficient correctness verification of operation results.
Owner:NORTHEASTERN UNIV

Privacy protection query method and device supporting outsourcing calculation and related equipment

The embodiment of the invention discloses a privacy protection query method and device supporting outsourcing computing and related equipment, and the method comprises the steps: receiving P keywords, classifying the P keywords to obtain Q types of keywords, and enabling each type of keywords to correspond to a bucket ID; sorting the Q-class keywords according to the bucket ID; public parameters of each type of keywords in the Q types of keywords after sorting are determined, Q groups of public parameters are obtained, and each group of public parameters corresponds to one bucket; the Q groups of public parameters are sent to the server side, corresponding buckets are called for query through the server side according to the Q groups of public parameters and the corresponding sequence, a first query result is obtained, and each bucket is used for storing a mapping relation between a preset keyword and local data; and receiving a first query result fed back by the server, performing decryption operation according to the first query result to obtain a second query result, and feeding back the second query result to the client. By adopting the embodiment of the invention, the hidden trace query efficiency can be improved.
Owner:深圳市洞见智慧科技有限公司

Security outsourcing method for two bilinear pairings based on dual cloud servers

The invention discloses a security outsourcing method for two bilinear pairings based on dual cloud servers. First, a user T performing outsourcing computation calls a subroutine Rand for improving the computing speed to generate a six-tuple, and elements in the six-tuple are utilized to divide e(A, B)*e(C, D) logic into four parts. Then, Rand is called to generate two new six-tuples, computing servers U1 and U2 are inquired four times respectively, the servers work out bilinear pairing results, four parts of the bilinear pairing results serve as intermediate computing results, and the other four parts of the bilinear pairing results serve as test data. Finally, whether output results of U1 and the U2 are correct is detected, and results are worked out according to the response of the servers. The security outsourcing method is suitable for resource-constrained devices. The security outsourcing method has the advantages of high computing efficiency and fewer operations. Outsourcers do not need to carry out high-cost SM and Exp operation any longer. Moreover, the security outsourcing method of the invention is applicable to an outsourcing computation scene of multiple bilinear pairings, and is of higher practical application value.
Owner:SHANGHAI UNIV

Hierarchical security multi-party calculation method and device based on Chinese remainder theorem

ActiveCN112700152AAchieve the purpose of computingDigital data protectionResourcesCiphertextChinese remainder theorem
The invention relates to a hierarchical security multi-party computing method and device based on the Chinese remainder theorem, and the method comprises the steps: enabling a computing task to be divided into an outer package subtask and an autonomous subtask through a computing father node, and distributing a writing subkey and a reading subkey for each outer package subtask; sending each outer packet sub-task and the corresponding write-in sub-key to each computing sub-node in a safe mode; enabling the computing father node and the computing child nodes to obtain data of respective child tasks through computing, and storing outsourcing computing data in a public result ciphertext through writing of child keys and sharing and transmitting the outsourcing computing data in the public result ciphertext; enabling the computing father node to obtain outsourcing computing data calculated by each computing child node from the public result ciphertext by reading the child key, and calculating a final result of the calculation task. According to the method, the computing sub-nodes can assist each other to complete the computing task together, but the computing data of other computing sub-nodes and the final computing data of the computing task cannot be obtained, so that secure multi-party computing is realized.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Block generation method and device, block synchronization method and device, blockchain system and storage medium

The invention discloses a block generation and consensus method and device, a block synchronization method and device, a blockchain system and a storage medium. The block generation method comprises the steps that a first node receives incremental transaction data which is not packaged onto a blockchain from a blockchain network; sending the incremental transaction data to a first outsourcing computing service node for the first outsourcing computing service node to perform first computing; receiving a first computing result of the first outsourcing calculation service node, verifying the first computing result, and if the verification is passed, signing the first computing result and constructing an alternative block according to the first computing result; and publishing the alternativeblock to the blockchain network. According to the method, the first computing is outsourced to the first outsourcing computing service node, so that the hardware requirement of the first node is reduced, the participation in the blockchain network consensus does not simply depend on the computing power, the network and the storage resources any more, the mining people probability of the low-computing-power node is improved, and the equity and fairness of mining accounting are ensured.
Owner:北京邦天信息技术有限公司

SHE-based secure outsourcing method

The invention discloses a security outsourcing method based on SHE, and belongs to the technical field of network security, and the method comprises the steps: enabling a trusted third party to carryout the on-demand packaging of generated addition homomorphic and multiplication homomorphic public and private keys through employing public information, and transmitting the public and private keysto a user, a proxy server and a public cloud server; preprocessing the coefficient and the index of the outsourcing polynomial by a client user, encrypting the processed data, and uploading the encrypted data to a proxy server; then establishing connection between the proxy server and the public cloud server to execute secret index calculation; enabling the public cloud server to calculate the processed outsourcing polynomial by using the encryption index and coefficient generated by calculation, and performing ciphertext conversion; finally, enabling the proxy server to receive the ciphertextconversion result calculated by the public cloud server for preliminary decryption, and sending the result to the user for final decryption after the decryption is passed. According to the method, the user can be helped to obtain the desired outsourcing calculation result more safely and efficiently.
Owner:NORTHEASTERN UNIV

Attribute-based verifiable outsourcing and revocable Internet of Things security communication method

The invention belongs to the technical field of attribute encryption, and discloses an attribute-based verifiable outsourcing and revocable Internet of Things security communication method. The methodcomprises the following steps: a system is initialized; an authorization center allocates an attribute set to a data user and generates a key required by decryption for the data user; an Internet ofThings node symmetrically encrypts the data; the Internet of Things node encrypts the symmetric key by using attribute-based encryption; the data user sends a data access request to the Internet of Things platform and decrypts the data; and the Internet of Things platform cancels a specific user in the system. The method has the advantages of low equipment calculation overhead, verifiable outsourcing calculation, resistance to collusion attacks of malicious auxiliary nodes, support of dynamic permission management of the system and the like, and can be used for solving the problems of batch access control, huge number of keys, limited equipment resources and the like in the application of the Internet of Things. The lightweight security communication method is realized, and a revocable function of the key is realized.
Owner:THE 22ND RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Cloud outsourcing computing security method based on SGX technology

The invention discloses a cloud outsourcing computing security method based on an SGX technology, belongs to the field of cloud computing security, and solves the problems of opaque and unsafe operation environment of a cloud environment. According to the method, the credibility of the cloud computing node is ensured by utilizing the trusted execution environment Enclave provided by the Intel SGX, the cloud environment is configured and remotely authenticated through a unified security standard formulated by a third-party trusted mechanism in the registration stage, and the security and reliability of the software and hardware environment of the cloud are ensured. A public and private key pair is formed by using a cryptology library of Intel SGX, a public key generates a cluster certificate, and a private key is stored in a cloud end through a sealing mechanism, so that only an authenticated Enclave with the same configuration can obtain the certificate private key through unblocking. In a working stage, a user encrypts own private data through a public key in a cluster certificate and uploads the private data to a cloud environment, a cloud node starts Enclave to carry out remote authentication on a third-party trusted institution, a private key is obtained through a sealing mechanism, user data is decrypted and read, and calculation, encryption and output are carried out.
Owner:BEIJING UNIV OF TECH

Multivariate identity authentication method and system for power grid data outsourcing calculation

PendingCN113468596AAlleviate the pressure of network securityTrue and valid identityDigital data protectionDigital data authenticationIp addressEngineering
The invention discloses a multivariate identity authentication method and system for power grid data outsourcing calculation, and the method comprises the steps: collecting various biological information of a user at the same time through a biological information collection device, transmitting the biological information to an identity authentication server, and carrying out the identity authentication of the user through the identity authentication server; enabling a calculation entrusting party and a calculation party of the power grid data to generate a session key in a mode of continuously exchanging intermediate values through a PAKE protocol, and encrypting and decrypting transmission data by using the session key to complete identity authentication between the calculation entrusting party and the calculation party; performing authentication verification on the power grid data needing to be subjected to outsourcing calculation, and performing authentication verification on a calculation result by a calculation entrusting party when a calculation party returns the calculation result; and enabling the encryption machine to write the IP address of the privacy computing server into the IP white list, and completing authentication of the privacy computing server. The method is compatible with various authentication requirements of personnel, equipment, systems, data and the like, and ensures the safety of power consumption data outsourcing calculation.
Owner:SHENZHEN POWER SUPPLY BUREAU

Lightweight privacy protection outsourcing electroencephalogram signal feature extraction method

The invention provides a lightweight privacy protection outsourcing electroencephalogram signal feature extraction method. According to the method, an edge server is allowed to perform feature extraction on electroencephalogram signal data uploaded by a user on the premise that plaintext electroencephalogram signal data cannot be acquired; meanwhile, in order to realize privacy protection of the electroencephalogram signals, a series of safe outsourcing computing protocols are designed, so that feature extraction of the encrypted electroencephalogram signals is realized; in addition, in order to improve the signal-to-noise ratio of the electroencephalogram signals, spatial filtering is conducted on the electroencephalogram signals through TRCA; finally, in order to reduce response delay between the user and the server, an edge computing technology is introduced. It is ensured that privacy information related to original electroencephalogram data is not leaked. According to the technical scheme, the feature extraction of the outsourcing electroencephalogram signal is realized while the privacy security of related information in the electroencephalogram signal is ensured, and the local calculation and communication cost of a user is reduced.
Owner:FUZHOU UNIV

A safe, controllable and efficient data sharing method and system in a cloud computing environment

The invention discloses a safe, controllable and efficient data sharing method and system in a cloud computing environment. The method comprises the following steps: setting a system public parameterPP and a system master key MSK; generating a public key PK and a private key SK of the data owner according to the parameter PP;generating a conversion key TK and a recovery key RK of the data consumer according to the parameter PP, the main key MSK and the attribute set (please see the formula in the specification); encrypting the plaintext message m according to the parameter PP, the private keySK and the access control structure, and generating a file original ciphertext CT (Computed Tomography); converting the key TK according to the parameter PP, and performing outsourcing decryption onthe CT to generate a file intermediate ciphertext TCT; and according to the parameter PP, the public key PK and the recovery key RK, carrying out decryption operation on the file intermediate ciphertext TCT, and verifying whether the file intermediate ciphertext TCT is a plaintext message m encrypted by the data owner. According to the invention, the user can efficiently verify the correctness ofoutsourcing calculation and authenticate the data source.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Homomorphic encryption method based on random weighted unitary matrix in outsourcing computation

The invention discloses a homomorphic encryption method based on a random weighted unitary matrix in outsourcing computation. The method is same as the basic unitary matrix, and has the fully homomorphic encryption characteristic and can be applied to the non-integer field computation, and has the honesty check characteristic of the full number field and better security. Compared with the classical cryptography scheme which can be only applied to the integer field, the method can be applied to any number field with operable matrix, the number field comprises real number and plural; compared with the existing same-type encryption method, the scheme not only has the fully-homomorphic feature, and can resist the statistical attacks (such as feature value attack, the matrix trace attack and like) on the invariance of the unitary matrix while not importing ill-condition number for the computation after the encryption by adopting the weighted unitary matrix, thereby providing real check characteristic. The method is suitable for any matrix encryption, and especially suitable for the application scene with independent computation and independent encryption due to good homogeneity, such asoutsourcing computation.
Owner:HUBEI UNIV OF TECH

A Homomorphic Encryption Method Based on Random Weighted Unitary Matrix in Outsourced Computing

ActiveCN108632033BResistant to Statistical AttacksResistance to random attacksKey distribution for secure communicationCryptographic attack countermeasuresReal arithmeticAttack
The invention discloses a homomorphic encryption method based on a random weighted unitary matrix in outsourcing computation. The method is same as the basic unitary matrix, and has the fully homomorphic encryption characteristic and can be applied to the non-integer field computation, and has the honesty check characteristic of the full number field and better security. Compared with the classical cryptography scheme which can be only applied to the integer field, the method can be applied to any number field with operable matrix, the number field comprises real number and plural; compared with the existing same-type encryption method, the scheme not only has the fully-homomorphic feature, and can resist the statistical attacks (such as feature value attack, the matrix trace attack and like) on the invariance of the unitary matrix while not importing ill-condition number for the computation after the encryption by adopting the weighted unitary matrix, thereby providing real check characteristic. The method is suitable for any matrix encryption, and especially suitable for the application scene with independent computation and independent encryption due to good homogeneity, such asoutsourcing computation.
Owner:HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products