HK1243524B - Multi-party encryption cube processing apparatuses, methods and systems - Google Patents
Multi-party encryption cube processing apparatuses, methods and systemsInfo
- Publication number
- HK1243524B HK1243524B HK18102943.4A HK18102943A HK1243524B HK 1243524 B HK1243524 B HK 1243524B HK 18102943 A HK18102943 A HK 18102943A HK 1243524 B HK1243524 B HK 1243524B
- Authority
- HK
- Hong Kong
- Prior art keywords
- data
- preferences
- dataset
- cryptographic
- operations
- Prior art date
Links
Description
此对专利证书公开文献的申请描述了针对各种新颖创新(在下文称为“公开内容”)的发明性方面,并且含有受到版权、屏蔽作品和/或其他知识产权保护的材料。此类知识产权的相应拥有者不反对任何人对本公开的传真复制,就像在公布的专利局文件/记录中那样,但另外保留所有权利。This application for letter patent disclosure describes inventive aspects that are directed to various new innovations (hereinafter referred to as the "disclosure") and contains material that is protected by copyright, screen work, and/or other intellectual property rights. The respective owners of such intellectual property have no objection to the facsimile reproduction by anyone of the disclosure, as it appears in the published Patent Office file/records, but otherwise reserve all rights.
优先权priority
此申请要求2015年2月12日提交且标题为“云加密密钥中介设备、方法和系统”的美国专利申请序列号62/115,178的优先权。前述申请的整个内容明确地以引用的方式并入本文中。This application claims priority to U.S. Patent Application Serial No. 62/115,178, filed on February 12, 2015, and entitled “Cloud Encryption Key Broker Apparatus, Methods, and Systems,” the entire contents of which are expressly incorporated herein by reference.
技术领域Technical Field
本创新一般涉及多方加密方法,且更具体来说,涉及多方加密立方体处理设备、方法和系统或MPEC。The present innovation relates generally to multi-party encryption methods and, more particularly, to multi-party encryption cube processing devices, methods and systems or MPEC.
背景技术Background Art
安全的多方计算方法有助于产生在让多方联合地处理他们的数据的同时保持他们的相应数据彼此私密的方法。换句话说,这些方法允许多方基于多条个体持有的秘密信息来联合地计算值,而不会在所述过程中向彼此显露他们的相应机密信息。Secure multi-party computation methods contribute to methods that allow multiple parties to jointly process their data while keeping their respective data private from one another. In other words, these methods allow multiple parties to jointly compute a value based on multiple pieces of individually held secret information without revealing their respective confidential information to one another in the process.
例如,当公司和厂商等用户需要交流和交换想法但需要使他们的基础数据受到保护时,这是有用的。举例来说,商家数据拥有者可能对一起联营数据以执行交易数据分析感兴趣。在此实例中,商家数据拥有者可以查看交易数据的汇总版本(或另一形式的聚合数据)而查看不到基础数据。This is useful, for example, when users such as companies and vendors need to communicate and exchange ideas but need to keep their underlying data protected. For example, a merchant data owner may be interested in pooling data to perform transaction data analysis. In this instance, the merchant data owner can view a summarized version of the transaction data (or another form of aggregated data) without viewing the underlying data.
虽然安全的多方计算方法有助于产生此类汇总数据而不会使每一方的基础机密数据显露给其他方,然而,从性能角度来看,现今的用于保护多方之间的数据交换的方法往往较慢。While secure multi-party computation methods can help generate such summary data without revealing each party's underlying confidential data to the others, current methods for securing data exchange between multiple parties tend to be slow from a performance perspective.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
随附的附录和/或附图说明根据本描述的各个非限制性、示例性创新方面:The accompanying appendices and/or figures illustrate various non-limiting, exemplary innovative aspects according to the present description:
图式内的每个参考数字的前面的数字指示其中引入和/或详述那个参考数字的图。因此,将在图1中找到和/或引入对参考数字101的详细论述。在图2中引入参考数字201等。The number preceding each reference numeral in the drawings indicates the figure in which that reference numeral is introduced and/or detailed. Thus, a detailed discussion of reference numeral 101 will be found and/or introduced in Figure 1. Reference numeral 201 is introduced in Figure 2, etc.
图1是描绘MPEC的用户进行访问的框图。FIG1 is a block diagram depicting user access to MPEC.
图2是描绘使用MPEC以允许两个数据拥有用户访问彼此的数据的框图。FIG. 2 is a block diagram depicting the use of MPEC to allow two data-owning users to access each other's data.
图3是描绘使用MPEC的操作情景的流程图。FIG3 is a flow chart depicting an operational scenario using MPEC.
图4至图6是描绘MPEC的各种过程流的框图。4-6 are block diagrams depicting various process flows of MPEC.
图7至图8描绘可以与在本文所描述的操作一起使用的示例性计算机和软件组件。7-8 depict exemplary computers and software components that may be used with the operations described herein.
发明内容Summary of the Invention
在本文公开了(例如)用于在安全多方计算内使用的计算机实施的系统和方法。举例来说,公开了用于存储偏好的系统和方法。基于偏好来存储数据集。确定处理询问涉及基于偏好对数据集执行容许的操作。Disclosed herein are computer-implemented systems and methods for use, for example, within secure multi-party computation. For example, systems and methods for storing preferences are disclosed. A data set is stored based on the preferences. Determining processing a query involves performing permissible operations on the data set based on the preferences.
作为另一实例,公开了用于由一个或多个数据处理器存储操作偏好和密码偏好的系统和方法,所述操作偏好和密码偏好与数据集相关联。基于操作偏好和密码偏好来存储数据集。分析与至少数据集相关联的询问。确定处理询问涉及基于操作偏好对数据集执行容许的操作。基于第一密码偏好来选择一个或多个密码协议。使用所述一个或多个密码协议对数据集执行容许的操作。As another example, a system and method are disclosed for storing, by one or more data processors, operational preferences and cryptographic preferences associated with a data set. The data set is stored based on the operational preferences and cryptographic preferences. A query associated with at least the data set is analyzed. A determination is made that processing the query involves performing an allowable operation on the data set based on the operational preferences. One or more cryptographic protocols are selected based on a first cryptographic preference. The allowable operation is performed on the data set using the one or more cryptographic protocols.
具体实施方式DETAILED DESCRIPTION
图1在100处示出说明MPEC的示例性实施例的框图。在图1中,提供一个或多个数据库102以存储多个数据拥有者的信息。数据库102可以呈集中的数据库仓库的形式以用于存储来自多个商家、支付服务提供商等的交易数据。FIG1 shows a block diagram illustrating an exemplary embodiment of MPEC at 100. In FIG1 , one or more databases 102 are provided to store information of multiple data owners. The database 102 may be in the form of a centralized database warehouse for storing transaction data from multiple merchants, payment service providers, etc.
希望分析所存储的数据的用户104可以通过MPEC 106访问存储在数据库102中的数据。MPEC 106允许分析结果“公开”(例如,显露给请求的用户),而数据库102中的基础数据甚至对其他参与的数据拥有者保持机密和安全。Users 104 who wish to analyze the stored data may access the data stored in database 102 through MPEC 106. MPEC 106 allows analysis results to be "public" (e.g., revealed to the requesting user) while the underlying data in database 102 remains confidential and secure even from other participating data owners.
用户104可以直接地或者通过若干方式(例如,经由一个或多个网络108)与MPEC106间接地交互。可以通过网络108访问的服务器110可以操控系统106。数据库102可以存储将由系统106分析的数据以及由系统106产生的任何中间或最终数据。Users 104 may interact with MPEC 106 directly or indirectly through a number of means, such as via one or more networks 108. Server 110, accessible through network 108, may host system 106. Database 102 may store data to be analyzed by system 106 and any intermediate or final data generated by system 106.
图2示出用于允许两个数据拥有用户202经由MPEC 106访问彼此的数据的信息交换机构200。为了至少部分地实现此,MPEC 106向数据拥有者提供如204处所示的加密和数据分析工具。所述系统可以提供预先界定的算法/协议,拥有者可以从所述预先界定的算法/协议中进行选择以交换信息。举例来说,拥有者可以从算法/协议(例如,姚式加密方法或在实地已知的其他加密技术)的列表中进行选择。(在标题为“用于金融风险分析的数据管理系统和处理”的美国公布号US 2014/0351104A1中论述了姚式加密方法的技术,其以引用的方式并入本文以用于所有目的)。FIG2 illustrates an information exchange mechanism 200 for allowing two data-owning users 202 to access each other's data via the MPEC 106. To achieve this, at least in part, the MPEC 106 provides encryption and data analysis tools, as shown at 204, to the data owners. The system may provide predefined algorithms/protocols from which the owners may select to exchange information. For example, the owners may select from a list of algorithms/protocols, such as Yao's encryption or other encryption techniques known in the art. (The Yao's encryption technique is discussed in U.S. Publication No. US 2014/0351104A1, entitled "Data Management Systems and Processing for Financial Risk Analysis," which is incorporated herein by reference for all purposes.)
另外,每个数据拥有者可以指定将如何处置其数据。数据拥有者可以通过向MPEC106指定一方偏好202(例如,配置)来完成此指定。拥有者专有偏好可以包含具有所界定的一组所允许的操作(例如,检索、结合等)的每个拥有者专有的数据集。例如,另一偏好可以指定每个数据操作可以使用多个密码算法/协议。Additionally, each data owner can specify how their data will be handled. Data owners can do this by specifying preferences 202 (e.g., configurations) to the MPEC 106. Owner-specific preferences can include a set of data sets specific to each owner with a defined set of allowed operations (e.g., retrieval, join, etc.). For example, another preference can specify that multiple cryptographic algorithms/protocols can be used for each data operation.
在处理询问请求中使用所述偏好。举例来说,MPEC 106确定询问是否涉及基于预先指定的操作偏好对拥有者的数据执行容许的操作。密码偏好选择将使用哪些一个或多个密码协议来对数据集执行容许的操作。向请求者发送询问结果,但是以维持其他用户的数据的机密性的程度进行。The preferences are used in processing query requests. For example, MPEC 106 determines whether the query involves performing a permitted operation on the owner's data based on pre-specified operation preferences. The cryptographic preferences select which cryptographic protocol or protocols will be used to perform the permitted operation on the data set. The query results are sent to the requester, but at a level that maintains the confidentiality of other users' data.
图3描绘涉及MPEC的操作情景的实例。所述操作情景涉及经加密的数据库,其中多个数据拥有者可以向数据库问问题,且随后基于数据库中含有的基础敏感数据而得到合计统计响应或汇总列表。在此情景下,数据拥有者不具体知晓数据库内实际上含有什么东西。Figure 3 depicts an example of an operational scenario involving MPEC. The operational scenario involves an encrypted database where multiple data owners can ask questions of the database and then receive aggregate statistical responses or summary lists based on the underlying sensitive data contained in the database. In this scenario, the data owners do not have specific knowledge of what is actually contained in the database.
在所述实例中,用户在300处提供偏好以供MPEC用于执行其操作。所述偏好包含容许的操作和优选的加密协议。应理解,在其他操作情景下,偏好可以仅包含容许的操作或仅包含优选的加密协议或其组合。In the example, the user provides preferences at 300 for the MPEC to use in performing its operations. The preferences include allowed operations and preferred encryption protocols. It should be understood that in other operating scenarios, the preferences may include only allowed operations or only preferred encryption protocols, or a combination thereof.
在302和304处,从多个数据拥有者接收敏感信息。在此操作情景下,所述敏感信息包含与商家相关联的SKU(库存单位)信息。SKU信息可以含有对可以在商家的生意中购买的不同的产品和服务的识别。在此实例中,所述敏感信息还包含支付处理公司的交易数据。At 302 and 304, sensitive information is received from multiple data owners. In this operational scenario, the sensitive information includes SKU (stock keeping unit) information associated with a merchant. The SKU information may contain identification of different products and services that can be purchased from the merchant's business. In this example, the sensitive information also includes transaction data from a payment processing company.
在306处,数据拥有者之一提供涉及敏感信息的询问。在308处,MPEC根据指定的偏好对由第一和第二数据用户使用加密协议提供的数据集执行容许的操作。随后向第一数据拥有者提供聚合结果。At 306, one of the data owners provides a query involving sensitive information. At 308, the MPEC performs permitted operations on the data sets provided by the first and second data users using an encrypted protocol according to the specified preferences. An aggregated result is then provided to the first data owner.
举例来说,商家数据拥有者可以提供SKU数据且另一数据拥有者可以提供交易数据。MPEC可以在经加密的空间中结合两条数据并且提供聚合类型信息,例如按项目什么是最大金额线。可以产生立方体,所述立方体允许在所述立方体内的不同层级使用选定的加密协议对信息进行加密。For example, a merchant data owner can provide SKU data and another data owner can provide transaction data. MPEC can combine the two data in an encrypted space and provide aggregate type information, such as what is the maximum amount line by item. A cube can be generated that allows information to be encrypted at different levels within the cube using a selected encryption protocol.
图4描绘MPEC的示例性实施例中的软件计算机组件。多个加密协议400可以用于MPEC内。MPEC基于所存储的偏好402选择那些加密协议400来处置请求/询问404。当首先为一方设置立方体时,该方选择可以执行何组操作,进而限制可以产生什么立方体。这使得为数据使用提供更大的安全性。此外,数据拥有者可以提供用于在MPEC内使用的他们的自身的加密协议。如果数据拥有者已经开始信任特定加密协议并且那个协议当前不存在于MPEC内,那么可以这样。FIG4 depicts the software computer components of an exemplary embodiment of the MPEC. Multiple encryption protocols 400 can be used within the MPEC. The MPEC selects which encryption protocols 400 to handle requests/queries 404 based on stored preferences 402. When a cube is first set up for a party, the party selects which set of operations can be performed, thereby limiting what cubes can be generated. This provides greater security for data use. Additionally, data owners can provide their own encryption protocols for use within the MPEC. This is possible if the data owner has come to trust a particular encryption protocol and that protocol is not currently available within the MPEC.
MPEC通过偏好而采用专用的加密算法来用于特定任务。举例来说,可以通过同态状方法或姚式算法来执行跨结合类型数据的计算。这允许各方决定最终协议并且通过在部署中产生异构型环境而提供更大的安全性。更具体来说,对于请求,平台知道各方的配置并且采用适当的协议来提取数据。MPEC utilizes specialized encryption algorithms based on preferences for specific tasks. For example, computations across data types can be performed using homomorphic methods or Yao-style algorithms. This allows each party to determine the final protocol and provides greater security by creating a heterogeneous environment within the deployment. More specifically, for each request, the platform understands the configurations of each party and employs the appropriate protocol to extract data.
MPEC可以进一步包含操作为路由层406的功能性。路由层406将请求/询问404重新引导到将在处理请求/询问404中涉及的那些软件和数据库组件。The MPEC may further include functionality that operates as a routing layer 406. The routing layer 406 redirects the request/query 404 to those software and database components that will be involved in processing the request/query 404.
图5说明询问分析器500分析所述询问以确定用于处理所述询问的最佳方式。这可以涉及用于处理询问的二层系统502。Figure 5 illustrates a query analyzer 500 analyzing the query to determine the best way to process the query. This may involve a two-tier system 502 for processing the query.
作为二层处理系统的实例,图6说明通过使用允许较小类型的询问处理以使用存储器内存储装置606来用于性能增益的数据库路由器602和数据库管理器604或者用于对更大数据集的其他类型的处理的文件系统608的额外的最佳处理能力。以此方式,为立方体提供用于诊断的智能层。As an example of a two-tier processing system, Figure 6 illustrates the additional optimal processing capabilities provided by using a database router 602 and a database manager 604 that allow smaller types of query processing to use in-memory storage 606 for performance gains, or a file system 608 for other types of processing of larger data sets. In this way, an intelligent layer for diagnostics is provided for the cube.
更具体来说,针对每个数据元素需要较大的存储器内使用的方法可以使用分布式文件系统,比如Hadoop。具有较小要求的方法可以使用存储器内数据库。基于询问的量和类型,MPEC可以自动地将数据移入和移出存储器以增强性能。对于特定协议,可以拆分数据,且算法被调适成在进行中增强性能。举例来说,如果需要优化,那么系统可以基于所涉及的算法的设定动作来选择动作。如果算法允许将功能性拆分为子立方体,那么系统将选择这个动作。如果这不可用,那么可以分配更多的存储器。More specifically, methods that require a large amount of memory per data element can use a distributed file system such as Hadoop. Methods with smaller requirements can use an in-memory database. Based on the volume and type of queries, MPEC can automatically move data in and out of memory to enhance performance. For specific protocols, data can be split and the algorithm adapted to enhance performance on the fly. For example, if optimization is required, the system can select an action based on the set actions of the algorithm involved. If the algorithm allows the functionality to be split into sub-cubes, the system will select this action. If this is not available, more memory can be allocated.
这个实例中的询问分析器检查数据使用、算法和询问复杂性以确定是否应执行再优化。举例来说,这可以包含基于使用历史对空间进行再加密。另外,可能不需要对整个立方体进行加密,仅在向请求者提供结果时需要安全的那些部分需要经过加密。The query analyzer in this example examines data usage, algorithms, and query complexity to determine if re-optimization should be performed. This could, for example, involve re-encrypting the space based on usage history. Alternatively, the entire cube might not need to be encrypted; only the parts that need to be secure when providing results to the requester need to be encrypted.
应理解,除了存储器内存储之外可以使用其他方法,例如使用具有节点、边缘和性质的语义询问的图表结构来表示和存储数据的图表数据库。以此方式,MPEC允许复杂的数据结构,比如使用多种加密技术来表达的图表。It will be appreciated that other approaches besides in-memory storage may be used, such as a graph database that uses a semantically queried graph structure with nodes, edges, and properties to represent and store data. In this way, MPEC allows complex data structures, such as graphs, to be expressed using a variety of encryption techniques.
作为对本文公开的系统和方法的广泛范围的进一步说明,可以使用本文公开的方法中的一者或多者来配置MPEC以提供专用加密算法的集合的构架,所述专用加密算法在提供最佳性能的同时实现广泛的用例。As a further illustration of the broad scope of the systems and methods disclosed herein, one or more of the methods disclosed herein may be used to configure MPEC to provide a framework for a collection of specialized encryption algorithms that enable a wide range of use cases while providing optimal performance.
图7和图8描绘用于与本文公开的操作一起使用的示例性系统。举例来说,图7描绘示例性系统700,其包含计算机架构,其中处理系统702(例如,位于给定计算机中或者位于可以彼此分离和不同的多个计算机中的一个或多个计算机处理器)包含在处理系统702上执行的MPEC 704。处理系统702具有对除了一个或多个数据存储装置708之外的计算机可读存储器707的访问权。一个或多个数据存储装置708可以包含用户偏好710。处理系统702可以是分布式并行计算环境,其可以用于处置非常大规模的数据集。FIG7 and FIG8 depict exemplary systems for use with the operations disclosed herein. For example, FIG7 depicts an exemplary system 700 comprising a computer architecture in which a processing system 702 (e.g., one or more computer processors located in a given computer or in multiple computers that may be separate and distinct from one another) comprises an MPEC 704 executing on the processing system 702. The processing system 702 has access to a computer-readable memory 707 in addition to one or more data storage devices 708. The one or more data storage devices 708 may contain user preferences 710. The processing system 702 may be a distributed parallel computing environment that can be used to process very large data sets.
图8描绘包含客户端-服务器架构的系统720。一个或多个用户PC 722经由一个或多个网络728访问在处理系统727上运行MPEC系统737的一个或多个服务器724。一个或多个服务器724可以访问计算机可读存储器730以及一个或多个数据存储装置732。8 depicts a system 720 comprising a client-server architecture. One or more user PCs 722 access one or more servers 724 running an MPEC system 737 on a processing system 727 via one or more networks 728. The one or more servers 724 have access to a computer readable memory 730 and one or more data storage devices 732.
在图7和图8中,计算机可读存储器(例如,在707处)或数据存储装置(例如,在708处)可以包含用于存储和关联在示例性系统中使用的各种数据的一个或多个数据结构。举例来说,可以使用存储在前述位置中的任一者的数据结构来存储包含用户偏好等的数据。In Figures 7 and 8, a computer-readable memory (e.g., at 707) or a data storage device (e.g., at 708) may contain one or more data structures for storing and associating various data used in the exemplary system. For example, a data structure stored in any of the aforementioned locations may be used to store data including user preferences, etc.
元件管理器、实时数据缓冲器、输送器、文件输入处理器、数据库索引共享访问存储器加载程序、参考数据缓冲器和数据管理器中的每一者可以包含存储在连接到磁盘控制器的磁盘驱动器、ROM和/或RAM中的一者或多者中的软件应用。处理器可以在需要时访问一个或多个组件。Each of the element manager, real-time data buffer, conveyor, file input processor, database index shared access memory loader, reference data buffer, and data manager may comprise a software application stored in one or more of a disk drive connected to the disk controller, ROM, and/or RAM. The processor may access one or more components when needed.
显示器接口可以准许以音频、图形或字母数字的格式在显示器上显示来自总线的信息。可以任选地使用各种通信端口进行与外部装置的通信。The display interface may permit information from the bus to be displayed on a display in audio, graphical, or alphanumeric format.Various communication ports may optionally be used for communication with external devices.
除了这些计算机类型组件之外,硬件还可以包含例如键盘等数据输入装置,或例如麦克风、遥控器、指针、鼠标和/或操纵杆等其他输入装置。In addition to these computer-type components, the hardware may also include data input devices such as a keyboard, or other input devices such as a microphone, remote control, pointer, mouse, and/or joystick.
另外,可以通过包括可以由装置处理子系统执行的程序指令的程序代码在许多不同类型的处理装置上实施在本文所描述的方法和系统。软件程序指令可以包含源代码、目标代码、机器代码或可操作以致使处理系统执行在本文所描述的方法和操作并且可以通过任何合适的语言(例如,C、C++、JAVA或任何其他合适的编程语言)提供的任何其他存储的数据。然而,还可以使用其他实施方案,例如被配置成执行在本文所描述的方法和系统的固件或甚至适当设计的硬件。In addition, the methods and systems described herein can be implemented on many different types of processing devices by program code comprising program instructions that can be executed by the device processing subsystem. The software program instructions can include source code, object code, machine code, or any other stored data that is operable to cause the processing system to perform the methods and operations described herein and can be provided in any suitable language (e.g., C, C++, JAVA, or any other suitable programming language). However, other embodiments can also be used, such as firmware or even appropriately designed hardware configured to perform the methods and systems described herein.
所述系统和方法的数据(例如,关联、映射、数据输入、数据输出、中间数据结果、最终数据结果等)可以存储和实施于一种或多种不同类型的计算机实施的数据存储装置中,例如不同类型的存储装置和编程构造(例如,RAM、ROM、快闪存储器、平面文件、数据库、编程数据结构、编程变量、IF-THEN(或类似类型)声明构造等)。应注意,数据结构描述了用于对数据进行组织并且将数据存储在数据库、程序、存储器或其他计算机可读介质中以供计算机程序使用的格式。The data of the described systems and methods (e.g., associations, mappings, data inputs, data outputs, intermediate data results, final data results, etc.) can be stored and implemented in one or more different types of computer-implemented data storage devices, such as different types of storage devices and programming constructs (e.g., RAM, ROM, flash memory, flat files, databases, programming data structures, programming variables, IF-THEN (or similar type) statement constructs, etc.). It should be noted that a data structure describes a format for organizing and storing data in a database, program, memory, or other computer-readable medium for use by a computer program.
在本文所描述的计算机组件、软件模块、功能、数据存储装置和数据结构可以彼此直接或间接连接,以便允许它们的操作所需的数据流动。还应注意,模块或处理器包含(但不限于)执行软件操作的代码单元,且可以实施为(例如)子例程代码单元或软件功能代码单元或对象(如在面向对象的范式中)或小程序或以计算机脚本语言实施,或者实施为另一类型的计算机代码。软件组件和/或功能性可以位于单个计算机上或者跨多个计算机而分布,其取决于即将发生的情形。The computer components, software modules, functions, data storage devices and data structures described herein may be connected to each other directly or indirectly to allow the flow of data required for their operation. It should also be noted that a module or processor includes, but is not limited to, code units that perform software operations and may be implemented as, for example, subroutine code units or software function code units or objects (such as in an object-oriented paradigm) or applets or in a computer scripting language, or as another type of computer code. Software components and/or functionality may be located on a single computer or distributed across multiple computers, depending on the circumstances at hand.
虽然已经详细地并且参考本公开的特定实施例描述了本公开,但本领域技术人员将明白,可以在不脱离实施例的精神和范围的情况下做出各种改变和修改。因此,期望本公开涵盖对本公开的修改和变化。Although the present disclosure has been described in detail and with reference to specific embodiments thereof, it will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the embodiments. Therefore, it is intended that the present disclosure encompass modifications and variations of the present disclosure.
Claims (13)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562115178P | 2015-02-12 | 2015-02-12 | |
| US62/115178 | 2015-02-12 | ||
| PCT/US2016/017689 WO2016130887A1 (en) | 2015-02-12 | 2016-02-12 | Multi-party encryption cube processing apparatuses, methods and systems |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1243524A1 HK1243524A1 (en) | 2018-07-13 |
| HK1243524B true HK1243524B (en) | 2021-03-26 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11709947B2 (en) | Multi-party encryption cube processing apparatuses, methods and systems | |
| Rani et al. | An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment | |
| US10970402B2 (en) | Distributed learning preserving model security | |
| US10185773B2 (en) | Systems and methods of precision sharing of big data | |
| EP4143748B1 (en) | Decision tree-based inference on homomorphically-encrypted data | |
| CN113711536A (en) | Extract data from blockchain network | |
| US20150006893A1 (en) | Topic protection policy for publish-subscribe messaging system | |
| US12093658B1 (en) | Systems and methods for implementing an artificial intelligence-based solution for prompt orchestration by segregating processing requests into non-serialized tasks | |
| US9684866B1 (en) | Data analytics computing resource provisioning based on computed cost and time parameters for proposed computing resource configurations | |
| US12041157B2 (en) | Efficiently batching pre-encrypted data for homomorphic inference | |
| JP2023014431A (en) | Method of secure inquiry processing, computer program, and computer system (secure inquiry processing in graph store) | |
| Praitheeshan et al. | Private and trustworthy distributed lending model using hyperledger Besu | |
| Kumar et al. | HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment | |
| US11223529B1 (en) | Methods for inventorying and securing public cloud databases and devices thereof | |
| Poltavtseva et al. | Data protection in heterogeneous big data systems | |
| HK1243524B (en) | Multi-party encryption cube processing apparatuses, methods and systems | |
| Smilarubavathy et al. | Paillier homomorphic encryption with K-means clustering algorithm (phekc) for data mining security in cloud | |
| US11496554B1 (en) | Electronic device allocation and routing | |
| Perumal | Designing and Implementing a Scalable and Secure Cloud Infrastructure for Real-Time Data Processing in High-Performance Analytics | |
| Epishkina et al. | On Attribute-Based Encryption for Access Control to Multidimensional Data Structures |