US20230091538A1 - Privately querying a database with private set membership using succinct filters - Google Patents
Privately querying a database with private set membership using succinct filters Download PDFInfo
- Publication number
- US20230091538A1 US20230091538A1 US17/448,565 US202117448565A US2023091538A1 US 20230091538 A1 US20230091538 A1 US 20230091538A1 US 202117448565 A US202117448565 A US 202117448565A US 2023091538 A1 US2023091538 A1 US 2023091538A1
- Authority
- US
- United States
- Prior art keywords
- encrypted
- identifiers
- query identifier
- server
- filter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
Definitions
- This disclosure relates to determining private set membership using succinct filters.
- Private set membership is a cryptographic problem where a server or other device maintains a set of identifiers and a client desires to query whether a query identifier is a member of the server-held set in a privacy-preserving manner.
- the client may desire to keep the query identifier secret from the server and/or the server may desire to keep the set of identifiers secret from the client.
- One aspect of the disclosure provides a computer-implemented method that, when executed by data processing hardware, causes the data processing hardware to perform operations.
- the operations include obtaining, from a server, a filter including a set of encrypted identifiers. Each encrypted identifier of the set of encrypted identifiers is encrypted with a server key controlled by the server.
- the operations also include obtaining a request from a user. The request requests the data processing hardware to determine whether a query identifier is a member of a set of identifiers. The set of identifiers correspond to the set of encrypted identifiers.
- the operations also include transmitting an encryption request to the server. The encryption request requests the server to encrypt the query identifier.
- the operations include receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key.
- the operations also include determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers and when the encrypted query identifier is not a member of the set of encrypted identifiers, reporting, to the user, that the query identifier is not a member of the set of identifiers.
- Implementations of the disclosure may include one or more of the following optional features.
- the operations further include, when the encrypted query identifier is a member of the set of encrypted identifiers, reporting, to the user, that the query identifier may be a member of the set of identifiers.
- the operations further include, when using the filter determines that the encrypted query identifier may be a member of the set of encrypted identifiers, determining, using a cryptographic protocol based on ring learning with errors, whether the encrypted query identifier is a member of the set of encrypted identifiers.
- the operations include reporting, to the user, that the query identifier is a member of the set of identifiers and when using the cryptographic protocol determines that the encrypted query identifier is not a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is not a member of the set of identifiers.
- the filter includes a cuckoo filter or a bloom filter.
- the filter includes a plurality of portions and each portion of the plurality of portions includes a respective subset of encrypted identifiers.
- the operations further includes receiving, from the server, an update to one of the plurality of portions and replacing the one of the plurality of portions with the updated portion.
- the operations may further include, prior to receiving the update to the one of the plurality of portions, requesting the update from the server.
- the encryption request includes an oblivious pseudorandom function and the oblivious pseudorandom function conceals an identity of the query identifier from the server.
- a storage size of the filter is less than a storage size of the set of encrypted identifiers.
- the set of identifiers may include a set of Uniform Resource Locators (URLs) and the set of encrypted identifiers includes the set of URLs encrypted with the server key.
- the memory hardware stores instructions that when executed on the data processing hardware cause the data processing hardware to perform operations.
- the operations include obtaining, from a server, a filter including a set of encrypted identifiers. Each encrypted identifier of the set of encrypted identifiers is encrypted with a server key controlled by the server.
- the operations also include obtaining a request from a user. The request requests the data processing hardware to determine whether a query identifier is a member of a set of identifiers. The set of identifiers correspond to the set of encrypted identifiers.
- the operations also include transmitting an encryption request to the server. The encryption request requests the server to encrypt the query identifier.
- the operations include receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key.
- the operations also include determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers and when the encrypted query identifier is not a member of the set of encrypted identifiers, reporting, to the user, that the query identifier is not a member of the set of identifiers.
- the operations further include, when the encrypted query identifier is a member of the set of encrypted identifiers, reporting, to the user, that the query identifier may be a member of the set of identifiers.
- the operations further include, when using the filter determines that the encrypted query identifier may be a member of the set of encrypted identifiers, determining, using a cryptographic protocol based on ring learning with errors, whether the encrypted query identifier is a member of the set of encrypted identifiers.
- the operations include reporting, to the user, that the query identifier is a member of the set of identifiers and when using the cryptographic protocol determines that the encrypted query identifier is not a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is not a member of the set of identifiers.
- the filter includes a cuckoo filter or a bloom filter.
- the filter includes a plurality of portions and each portion of the plurality of portions includes a respective subset of encrypted identifiers.
- the operations further includes receiving, from the server, an update to one of the plurality of portions and replacing the one of the plurality of portions with the updated portion.
- the operations may further include, prior to receiving the update to the one of the plurality of portions, requesting the update from the server.
- the encryption request includes an oblivious pseudorandom function and the oblivious pseudorandom function conceals an identity of the query identifier from the server.
- a storage size of the filter is less than a storage size of the set of encrypted identifiers.
- the set of identifiers may include a set of Uniform Resource Locators (URLs) and the set of encrypted identifiers includes the set of URLs encrypted with the server key.
- FIG. 1 is a schematic view of an example system that provides private set membership capabilities using a succinct filter.
- FIGS. 2 A and 2 B are schematic views of exemplary outputs of the succinct filter of FIG. 1 .
- FIG. 3 is a schematic view of a ring learning with errors algorithm.
- FIG. 4 is a schematic view of a succinct filter divided into a number of portions.
- FIG. 5 is a schematic view of updating one of the portions of the succinct filter of FIG. 3 .
- FIG. 6 is a flowchart of an example arrangement of operations for a method of providing private set membership using a succinct filter.
- FIG. 7 is a schematic view of an example computing device that may be used to implement the systems and methods described herein.
- Private set membership refers to a cryptographic problem where a server maintains a set of identifiers and a client queries the server to determine whether a specific identifier is present in the set of identifiers in a privacy-preserving manner.
- the client may keep the queried identifier secret from the server and/or the server may keep the set of identifiers secret from the client.
- Such features are desirable in, for example, a URL verification system, where a client wants to determine if a URL is included in a list of known malicious URLs without revealing to the server the specific URL the client is requesting.
- a password leak check system may involves a client verifying if their password has been compromised (i.e., via a list of known compromised passwords) without the client revealing the password to the server or without the server revealing the entire list of compromised passwords to the client.
- One possibility for a private set membership system involves the server encrypting the entire set of identifiers with a private key and transmitting the entire encrypted set to the client.
- the client may then request the server encrypt (using the same private key) a query identifier (i.e., an identifier the client wishes to check against the server's set), and when the server returns the encrypted identifier, the client can determine if the encrypted identifier appears in the list of stored encrypted identifiers. While this method is relatively fast and efficient once established, it unfortunately requires the client to have sufficient bandwidth and storage to receive and store the entirety of the set of encrypted identifiers. In many scenarios, the client device will not have sufficient bandwidth and/or storage capabilities to make such a system feasible.
- Succinct filters are space-efficient probabilistic data structures that may be used to determine whether an element is a member of a set. Generally, false positive matches are possible while false negatives are not. That is, a succinct filter returns that either the element is not a member of the set or that the element may be a member of the set (i.e., definitely not in the set or possibly in the set).
- succinct filters are bloom filters and cuckoo filters.
- Implementations herein are directed toward a private set membership system that uses a succinct filter to maintain privacy between a client device and a server while drastically reducing the bandwidth and storage requirements of the client device.
- the server (or other computing device) generates a succinct filter that includes a set of encrypted identifiers and provides the succinct filter to the client device.
- the system uses the succinct filter, the system performs approximate membership queries that may incur false positives but not false negatives.
- the client sends a request to the server requesting the server to encrypt a query identifier using the same key used to encrypt the set of encrypted identifiers.
- the client after receiving the encrypted query identifier from the server, determines, using the succinct filter, whether the encrypted query identifier is not present in the set of encrypted identifiers. When the encrypted query identifier is not present, the client may generate a report or alert for a user indicating that the query identifier is not present in the set of identifiers that corresponds to the set of encrypted identifiers.
- an example system 100 includes a client device 10 (e.g., a user device) associated with a respective user or client 12 and in communication with a remote system 140 via a network 112 .
- the client device may correspond to any computing device, such as a desktop workstation, a laptop workstation, a server, or a mobile device (i.e., a smart phone).
- the client device 10 includes computing resources 122 (e.g., data processing hardware) and/or storage resources 124 (e.g., memory hardware).
- the remote system 140 may be a single computer, multiple computers, or a distributed system (e.g., a cloud environment) having scalable/elastic computing resources 142 (e.g., data processing hardware) and/or storage resources 144 (e.g., memory hardware).
- a data store 150 i.e., a remote storage device 150
- the data store 150 is configured to store a set of identifiers 152 , 152 a - n .
- Each identifier 152 uniquely identifies a piece of information (e.g., an email, a URL, a password, an image, etc.).
- the set of identifiers 152 identifies a set of known malicious URLs or a set of compromised passwords.
- the remote system executes a filter generator 160 .
- the filter generator 160 encrypts each identifier 152 in the set to generate a set of encrypted identifiers 152 E, 152 E a - n .
- Each identifier 152 is encrypted using the same private key 162 .
- the private key 162 is kept secret from the client device 10 and client 12 .
- the filter generator 160 populates a filter 400 (i.e., a succinct filter) with the encrypted identifiers 152 E using any conventional means appropriate for the specific succinct filter 400 .
- the succinct filter 400 is a cuckoo filter using hash tables based on cuckoo hashing to store fingerprints of each encrypted identifier 152 E.
- the succinct filter 400 is a bloom filter using a bit array and hash functions to map hashes of the encrypted identifiers 152 E to the array positions. Because cuckoo filters enable element insertion and element deletion, a cuckoo filter may be desirable over a bloom filter (which only enables element insertions) in use cases where deletions of identifiers 152 is useful or necessary.
- the remote system 140 provides the client device 10 the succinct filter 400 via, for example, the network 112 .
- the client device 10 stores the succinct filter in the memory hardware 124 . Because the succinct filter 400 is smaller in size than the set of encrypted identifiers 152 E, the succinct filter 400 requires less bandwidth to receive from the remote system 140 and requires less storage space to store at the memory hardware 124 than receiving and storing the entirety of the set of encrypted identifiers 152 E.
- the client device 10 executes a membership manager 200 .
- the membership manager 200 obtains a request from the client 12 requesting that the client device 10 (i.e., the data processing hardware 122 ) to determine whether a query identifier 172 is a member of the set of identifiers 152 stored at the remote system 140 .
- the client device 10 i.e., the data processing hardware 122
- the query identifier 172 identifies a URL that the user 12 desires to check against the set of identifiers 152 to determine whether or not the URL may be malicious.
- the client 12 provides the request 170 to the membership manager 200 via, for example, interacting with an application executing on the client device 10 (e.g., a web browser).
- the membership manager 200 receives the request 170 from other sources, such as another computing device.
- a software application may refer to computer software that causes a computing device to perform a task.
- a software application may be referred to as an “application,” an “app,” or a “program.”
- Example applications include, but are not limited to, system diagnostic applications, system management applications, system maintenance applications, word processing applications, spreadsheet applications, messaging applications, media streaming applications, social networking applications, and gaming applications.
- the membership manager 200 includes a query generator 210 .
- the query generator 210 receives the request 170 from the client 12 and transmits an encryption request 212 to the remote system 140 .
- the encryption request 212 requests that the remote system 140 encrypts the query identifier 172 using the same private key 162 used to encrypt the set of encrypted identifiers 152 E. Because the client device 10 (and thus the membership manager 200 ) does not have access to the private key 162 , the client device 10 must rely on the remote system 140 to encrypt the query identifier 172 .
- the remote system 140 receives the encryption request 212 at a query processor 180 .
- the query processor 180 encrypts the identifier 152 indicated by the encryption request 212 (i.e., the query identifier 172 ) using the same private key 162 used to encrypt the set of encrypted identifier 152 E that populated the succinct filter 400 .
- the encryption request 212 may directly include or reference the query identifier 172 and the remote system 140 merely encrypts the indicated query identifier 172 and returns a result 182 to the client device 10 .
- the query generator 210 may include an oblivious pseudorandom function (OPRF).
- OPRF oblivious pseudorandom function
- An OPRF conceals information from each of two parties involved with the OPRF.
- the client device 10 cryptographically hashes the query identifier 172 and cryptographically blinds the hash to produce a message for the remote system 140 .
- the remote system 140 may in turn “mix” the message with the private key 162 and return the result 182 to the client device 10 , which may unblind the result 182 to obtain an encrypted query identifier 172 E that corresponds to the query identifier 172 encrypted by the private key 162 .
- the client device 10 and the remote system 140 may implement any appropriate algorithms to support the OPRF.
- the remote system 140 will not learn which specific identifier 152 the query identifier 172 corresponds to, nor does the client device learn the remote system's private key 162 or information regarding other identifiers 152 in the set.
- the client device 10 receives the result 182 from the remote system 140 , which includes the encrypted query identifier 172 E corresponding to the query identifier 172 encrypted by the private key 162 .
- the succinct filter 400 determines whether the encrypted query identifier 172 E is not a member of the set of encrypted identifiers 152 E (i.e., the set of encrypted identifiers 152 E that populates the succinct filter 400 ).
- the succinct filter 400 generates an output 302 for a membership reporter 220 indicating either that the encrypted query identifier 172 E is not in the set of encrypted identifiers 152 E or that the encrypted query identifier 172 may be in the set of encrypted identifier 152 E.
- the succinct filter 400 may incur false positives but does not incur false negatives, the succinct filter 400 can conclusively determine that the encrypted query identifier 172 E is not in the set of encrypted identifiers 152 E, but the succinct filter 400 cannot conclusively determine that the encrypted query identifier 172 E is in the set of encrypted identifiers 152 E. Because many common use cases will predominantly result in the encrypted query identifier 172 E not being present in the set of encrypted identifiers 152 E, such as when checking for a malicious URL, the succinct filter 400 will typically return that the encrypted query identifier 172 E is not present in the set of encrypted identifiers 152 E.
- the membership reporter 220 in the scenario when the encrypted query identifier 172 E is not in the set of encrypted identifiers 152 E, the membership reporter 220 generates a report 222 that indicates to the client 12 (e.g., via a display of the client device 10 ) or other entity that generated the request 170 , that the query identifier 172 is not in the set of identifiers 152 .
- the report 222 indicates that the URL represented by the query identifier 172 is not in the list of known malicious URLs.
- the client device 10 does not have access to the private key 162 of the remote system 140 and because the succinct filter 400 is populated only with the encrypted identifiers 152 E, the client device 10 does not learn any information from the remote system 140 regarding the set of identifiers 152 other than that the query identifier 172 does not appear in the set of identifiers 152 .
- the membership reporter 220 may provide the report 222 to the client 12 indicating that the query identifier 172 may be in the set of identifiers 152 . In some scenarios, such a report 222 may be sufficient for the client 12 .
- the client 12 may not require conclusive evidence that the query identifier 172 is present in the set of identifiers 152 , and the knowledge that the query identifier 172 may be in the set of identifiers 152 is sufficient.
- the likelihood of a false positive i.e., the succinct filter 400 indicates that the encrypted query identifier 172 E may be present in the set of encrypted identifiers 152 E, but the encrypted query identifier 172 E is not actually present in the set of encrypted identifiers 152 E
- the succinct filter 400 is larger, the chances for false positives decreases, but the storage and bandwidth requirements correspondingly increase.
- the succinct filter 400 when the succinct filter 400 is smaller, the chances for false positives increases, but the storage and bandwidth requirements correspondingly decrease.
- the size of the succinct filter 400 may be configurable (e.g., by the remote system 140 or the client device 10 ) based on the use case (e.g., the type if identifiers 152 , storage capabilities of the client device 10 , etc.).
- the membership manager 200 in the report 222 , indicates the likelihood of a false positive.
- the membership reporter 220 includes a ring learning with errors (RLWE) protocol query generator 230 .
- the RLWE protocol query generator 230 determines whether the encrypted query identifier 172 E is a member of the set of encrypted identifiers 152 E held by the remote system 140 .
- the RLWE protocol query generator 230 generates an RLWE query 232 and transmits the RLWE query 232 to the remote system 140 .
- the remote system 140 receives a RLWE result 234 that conclusively determines whether the encrypted query identifier 172 E is or is not in the set of encrypted identifiers 152 E. In either case, the membership reporter 220 generates the report 222 indicating the presence or lack of presence of the query identifier 172 in the set of identifiers 152 .
- the RLWE query 232 and RLWE result 234 may conclusively determine whether or not the encrypted query identifier 172 E is a member of the set of encrypted identifier 152 E, generally speaking, the RLWE query 232 requires significantly more resources (e.g., computing resources, bandwidth resources, latency, etc.) than testing via the succinct filter 400 .
- the succinct filter 400 will save significant resources as the RLWE protocol will rarely need to be relied upon.
- the RLWE protocol uses a fully homomorphic encryption scheme. While any appropriate RLWE protocol is within the scope of implementations described herein, FIG. 3 illustrates an exemplary RLWE protocol that the system may employ.
- the client device 10 when there are updates to the set of identifiers 152 , such as, for example, when additional known malicious URLs must be added to the list, the client device 10 requires an updated succinct filter 300 before the updated (i.e., added or deleted) identifiers 152 are accounted for.
- the filter generator 160 may generate a new or updated set of encrypted identifiers 152 E and a corresponding new or updated succinct filter 400 that reflects the updated set of identifiers 152 .
- the remote system 140 may transmit the new or updated succinct filter 400 to the client device 10 .
- the remote system 140 may generate a new succinct filter 400 any time there is a change to the set of identifiers 152 (i.e., real-time updates) or, alternatively, the remote system 140 batches multiple updates together and generates a new succinct filter 400 after a sufficient amount of time has passed since the last succinct filter 400 was generated and/or a sufficient number of changes have been made to the set of identifiers 152 since the last succinct filter 400 was generated.
- the remote system 140 may provide new succinct filters 400 to the client device 10 based on a “push” model, a “pull” model, or a hybrid model that combines elements of both the push and pull models.
- the push model the remote system 140 “pushes” or provides the new succinct filter 400 to the client device 10 automatically, such as at regular intervals or whenever a new succinct filter 400 is available.
- the pull model the client device 10 requests the remote system 140 provide the new succinct filter 400 , in which case the remote system 140 responds with an updated succinct filter 400 .
- the client device 10 may periodically poll the remote system 140 to determine whether a new or updated succinct filter 400 is available.
- the hybrid model includes the remote system 140 providing the client device 10 with a notification whenever a new succinct filter 400 is available. In this example, the client device 10 determines when to retrieve the latest succinct filter 400 from the remote system 140 .
- each generated succinct filter 400 is uniquely associated with a version identifier 402 . That is, each version identifier 402 identifies one and only one specific succinct filter 400 .
- the client device 10 and/or the remote system 140 may track the last version (via the version identifier 402 ) that the client device 10 has received.
- the filter generator 160 may provide the client device 10 with incremental updates for the succinct filter 400 .
- the remote system 140 provides the client device 10 with only the differences between the first version of the succinct filter 400 and the second version of the succinct filter 400 , which may drastically reduce the bandwidth necessary to update the client device 10 .
- the remote system 140 may track which version the client device 10 has received. Alternatively, the client device 10 notifies the remote system 140 of the most recent version that the client device 10 has received.
- the filter generator 160 may store a previous number of the succinct filters 400 so that the remote system 140 may track and provide the differences between different versions.
- the succinct filter 400 includes a plurality of portions 410 , 410 a —n. Each portion 410 of the succinct filter 400 includes a respective subset of the encrypted identifiers 152 E. In some examples, each portion 410 may be a separate succinct filter 400 .
- the remote system 140 may only update a single corresponding portion 410 of the succinct filter 400 . That is, instead of generating an entire new succinct filter 400 , the remote system 140 may update only a respective portion 410 of the succinct filter 400 .
- the client device 10 and/or remote system 140 may configure a size and/or a number of portions 410 .
- the filter generator 160 receives an update to the set of identifiers 152 , such as an addition of a new identifier 152 or deletion of an existing identifier 152 .
- the filter generator 160 updates the set of encrypted identifiers 152 E and generates a new succinct filter 400 that includes the updates to the set of encrypted identifiers 152 E.
- the filter generator 160 updates a portion 410 of the succinct filter 400 .
- the client device 10 receives, from the remote system 140 , the updated portion 410 from the remote system 140 .
- the succinct filter 400 includes four portions 410 a —d.
- the updated portion updates the portion 410 b .
- the client device 10 may replace the one of the portions 410 with the updated portion 410 (i.e., updated portion 410 b in this example). In this way, the client device 10 only updates a portion of the succinct filter 400 and bandwidth requirements are reduced.
- the client device 10 may generate a request 510 for the updated portion 410 .
- the filter generator 160 may provide a filter update 520 including the updated portion 410 to the client device 10 without prompting from the client device 10 .
- the system provides a device the capability of providing a private membership query to a server without revealing the identity of the queried element to the server.
- the server can provide a response without revealing any identifiers except for whether the queried identifier is a member of the set.
- a query rate-limiter i.e., a technique limiting the frequency the server will respond to queries
- the server can avoid users and/or devices from brute forcing the identifier space to determine database contents.
- the system may provide significant bandwidth and storage savings versus implementations that require the client device store the entirety of set of encrypted identifiers.
- While examples herein include using a set of encrypted identifiers 152 E to conceal information regarding the set of identifiers 152 from the client device 10 , in some examples, this concealment may not be necessary or desirable.
- the system 100 may operate as described above, except the succinct filter 400 is populated with the set of identifiers 152 directly instead of the set of encrypted identifiers 152 E. Then, the client device 10 may query the succinct filter 400 directly using the query identifier 172 without the need to acquire the encrypted query identifier 172 E from the remote system 140 .
- the client device 10 may then query the remote system 140 to determine whether the query identifier 172 is present in the set of identifiers 152 .
- FIG. 6 is a flowchart of an exemplary arrangement of operations for a method 600 of determining private set membership using a filter.
- the method 600 includes, at operation 602 , obtaining, from a server 140 (i.e., a remote computing system 140 ), a filter 400 that includes a set of encrypted identifiers 152 E. Each encrypted identifier 152 E of the set of encrypted identifiers 152 E is encrypted with a server key 162 (i.e., a private key) controlled by the server 140 .
- the method 600 includes obtaining a request 170 from a user 12 .
- the request 170 requests data processing hardware 122 (e.g., of a client device 10 ) to determine whether a query identifier 172 is a member of a set of identifiers 152 .
- the set of identifiers 152 correspond to the set of encrypted identifiers 152 E.
- the method 600 includes transmitting an encryption request 212 to the server 140 .
- the encryption request requests the server 140 to encrypt the query identifier 172 .
- the method 600 includes receiving, from the server 140 , an encrypted query identifier 172 E that includes the query identifier 172 encrypted by the server key 162 .
- the method 600 includes determining, using the filter 400 , whether the encrypted query identifier 172 E is not a member of the set of encrypted identifiers 152 E.
- the method 600 includes, when the encrypted query identifier 172 E is not a member of the set of encrypted identifiers 152 E, reporting, to the user 12 , that the query identifier 172 is not a member of the set of identifiers 152 .
- FIG. 7 is schematic view of an example computing device 700 that may be used to implement the systems and methods described in this document.
- the computing device 700 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers.
- the components shown here, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed in this document.
- the computing device 700 includes a processor 710 , memory 720 , a storage device 730 , a high-speed interface/controller 740 connecting to the memory 720 and high-speed expansion ports 750 , and a low speed interface/controller 760 connecting to a low speed bus 770 and a storage device 730 .
- Each of the components 710 , 720 , 730 , 740 , 750 , and 760 are interconnected using various busses, and may be mounted on a common motherboard or in other manners as appropriate.
- the processor 710 can process instructions for execution within the computing device 700 , including instructions stored in the memory 720 or on the storage device 730 to display graphical information for a graphical user interface (GUI) on an external input/output device, such as display 780 coupled to high speed interface 740 .
- GUI graphical user interface
- multiple processors and/or multiple buses may be used, as appropriate, along with multiple memories and types of memory.
- multiple computing devices 700 may be connected, with each device providing portions of the necessary operations (e.g., as a server bank, a group of blade servers, or a multi-processor system).
- the memory 720 stores information non-transitorily within the computing device 700 .
- the memory 720 may be a computer-readable medium, a volatile memory unit(s), or non-volatile memory unit(s).
- the non-transitory memory 720 may be physical devices used to store programs (e.g., sequences of instructions) or data (e.g., program state information) on a temporary or permanent basis for use by the computing device 700 .
- non-volatile memory examples include, but are not limited to, flash memory and read-only memory (ROM)/programmable read-only memory (PROM)/erasable programmable read-only memory (EPROM)/electronically erasable programmable read-only memory (EEPROM) (e.g., typically used for firmware, such as boot programs).
- volatile memory examples include, but are not limited to, random access memory (RAM), dynamic random access memory (DRAM), static random access memory (SRAM), phase change memory (PCM) as well as disks or tapes.
- the storage device 730 is capable of providing mass storage for the computing device 700 .
- the storage device 730 is a computer-readable medium.
- the storage device 730 may be a floppy disk device, a hard disk device, an optical disk device, or a tape device, a flash memory or other similar solid state memory device, or an array of devices, including devices in a storage area network or other configurations.
- a computer program product is tangibly embodied in an information carrier.
- the computer program product contains instructions that, when executed, perform one or more methods, such as those described above.
- the information carrier is a computer- or machine-readable medium, such as the memory 720 , the storage device 730 , or memory on processor 710 .
- the high speed controller 740 manages bandwidth-intensive operations for the computing device 700 , while the low speed controller 760 manages lower bandwidth-intensive operations. Such allocation of duties is exemplary only.
- the high-speed controller 740 is coupled to the memory 720 , the display 780 (e.g., through a graphics processor or accelerator), and to the high-speed expansion ports 750 , which may accept various expansion cards (not shown).
- the low-speed controller 760 is coupled to the storage device 730 and a low-speed expansion port 790 .
- the low-speed expansion port 790 which may include various communication ports (e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled to one or more input/output devices, such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter.
- input/output devices such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter.
- the computing device 700 may be implemented in a number of different forms, as shown in the figure. For example, it may be implemented as a standard server 700 a or multiple times in a group of such servers 700 a , as a laptop computer 700 b , or as part of a rack server system 700 c.
- implementations of the systems and techniques described herein can be realized in digital electronic and/or optical circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof.
- ASICs application specific integrated circuits
- These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
- the processes and logic flows described in this specification can be performed by one or more programmable processors, also referred to as data processing hardware, executing one or more computer programs to perform functions by operating on input data and generating output.
- the processes and logic flows can also be performed by special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read only memory or a random access memory or both.
- the essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data.
- a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
- mass storage devices for storing data
- a computer need not have such devices.
- Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks.
- the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
- one or more aspects of the disclosure can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube), LCD (liquid crystal display) monitor, or touch screen for displaying information to the user and optionally a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
- a display device e.g., a CRT (cathode ray tube), LCD (liquid crystal display) monitor, or touch screen for displaying information to the user and optionally a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
- Other kinds of devices can be used to provide interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This disclosure relates to determining private set membership using succinct filters.
- Private set membership is a cryptographic problem where a server or other device maintains a set of identifiers and a client desires to query whether a query identifier is a member of the server-held set in a privacy-preserving manner. For example, the client may desire to keep the query identifier secret from the server and/or the server may desire to keep the set of identifiers secret from the client.
- One aspect of the disclosure provides a computer-implemented method that, when executed by data processing hardware, causes the data processing hardware to perform operations. The operations include obtaining, from a server, a filter including a set of encrypted identifiers. Each encrypted identifier of the set of encrypted identifiers is encrypted with a server key controlled by the server. The operations also include obtaining a request from a user. The request requests the data processing hardware to determine whether a query identifier is a member of a set of identifiers. The set of identifiers correspond to the set of encrypted identifiers. The operations also include transmitting an encryption request to the server. The encryption request requests the server to encrypt the query identifier. The operations include receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key. The operations also include determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers and when the encrypted query identifier is not a member of the set of encrypted identifiers, reporting, to the user, that the query identifier is not a member of the set of identifiers.
- Implementations of the disclosure may include one or more of the following optional features. In some implementations, the operations further include, when the encrypted query identifier is a member of the set of encrypted identifiers, reporting, to the user, that the query identifier may be a member of the set of identifiers.
- Optionally, the operations further include, when using the filter determines that the encrypted query identifier may be a member of the set of encrypted identifiers, determining, using a cryptographic protocol based on ring learning with errors, whether the encrypted query identifier is a member of the set of encrypted identifiers. When using the cryptographic protocol determines that the encrypted query identifier is a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is a member of the set of identifiers and when using the cryptographic protocol determines that the encrypted query identifier is not a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is not a member of the set of identifiers.
- In some implementations, the filter includes a cuckoo filter or a bloom filter. In some examples, the filter includes a plurality of portions and each portion of the plurality of portions includes a respective subset of encrypted identifiers. In these examples, the operations further includes receiving, from the server, an update to one of the plurality of portions and replacing the one of the plurality of portions with the updated portion.
- The operations may further include, prior to receiving the update to the one of the plurality of portions, requesting the update from the server. In some implementations, the encryption request includes an oblivious pseudorandom function and the oblivious pseudorandom function conceals an identity of the query identifier from the server. In some examples, a storage size of the filter is less than a storage size of the set of encrypted identifiers. The set of identifiers may include a set of Uniform Resource Locators (URLs) and the set of encrypted identifiers includes the set of URLs encrypted with the server key.
- Another aspect of the disclosure provides data processing hardware and memory hardware in communication with the data processing hardware. The memory hardware stores instructions that when executed on the data processing hardware cause the data processing hardware to perform operations. The operations include obtaining, from a server, a filter including a set of encrypted identifiers. Each encrypted identifier of the set of encrypted identifiers is encrypted with a server key controlled by the server. The operations also include obtaining a request from a user. The request requests the data processing hardware to determine whether a query identifier is a member of a set of identifiers. The set of identifiers correspond to the set of encrypted identifiers. The operations also include transmitting an encryption request to the server. The encryption request requests the server to encrypt the query identifier. The operations include receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key. The operations also include determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers and when the encrypted query identifier is not a member of the set of encrypted identifiers, reporting, to the user, that the query identifier is not a member of the set of identifiers.
- This aspect may include one or more of the following optional features. In some implementations, the operations further include, when the encrypted query identifier is a member of the set of encrypted identifiers, reporting, to the user, that the query identifier may be a member of the set of identifiers.
- Optionally, the operations further include, when using the filter determines that the encrypted query identifier may be a member of the set of encrypted identifiers, determining, using a cryptographic protocol based on ring learning with errors, whether the encrypted query identifier is a member of the set of encrypted identifiers. When using the cryptographic protocol determines that the encrypted query identifier is a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is a member of the set of identifiers and when using the cryptographic protocol determines that the encrypted query identifier is not a member of the set of encrypted identifiers, the operations include reporting, to the user, that the query identifier is not a member of the set of identifiers.
- In some implementations, the filter includes a cuckoo filter or a bloom filter. In some examples, the filter includes a plurality of portions and each portion of the plurality of portions includes a respective subset of encrypted identifiers. In these examples, the operations further includes receiving, from the server, an update to one of the plurality of portions and replacing the one of the plurality of portions with the updated portion.
- The operations may further include, prior to receiving the update to the one of the plurality of portions, requesting the update from the server. In some implementations, the encryption request includes an oblivious pseudorandom function and the oblivious pseudorandom function conceals an identity of the query identifier from the server. In some examples, a storage size of the filter is less than a storage size of the set of encrypted identifiers. The set of identifiers may include a set of Uniform Resource Locators (URLs) and the set of encrypted identifiers includes the set of URLs encrypted with the server key.
- The details of one or more implementations of the disclosure are set forth in the accompanying drawings and the description below. Other aspects, features, and advantages will be apparent from the description and drawings, and from the claims.
-
FIG. 1 is a schematic view of an example system that provides private set membership capabilities using a succinct filter. -
FIGS. 2A and 2B are schematic views of exemplary outputs of the succinct filter ofFIG. 1 . -
FIG. 3 is a schematic view of a ring learning with errors algorithm. -
FIG. 4 is a schematic view of a succinct filter divided into a number of portions. -
FIG. 5 is a schematic view of updating one of the portions of the succinct filter ofFIG. 3 . -
FIG. 6 is a flowchart of an example arrangement of operations for a method of providing private set membership using a succinct filter. -
FIG. 7 is a schematic view of an example computing device that may be used to implement the systems and methods described herein. - Like reference symbols in the various drawings indicate like elements.
- Private set membership refers to a cryptographic problem where a server maintains a set of identifiers and a client queries the server to determine whether a specific identifier is present in the set of identifiers in a privacy-preserving manner. For example, the client may keep the queried identifier secret from the server and/or the server may keep the set of identifiers secret from the client. Such features are desirable in, for example, a URL verification system, where a client wants to determine if a URL is included in a list of known malicious URLs without revealing to the server the specific URL the client is requesting. As another example, a password leak check system may involves a client verifying if their password has been compromised (i.e., via a list of known compromised passwords) without the client revealing the password to the server or without the server revealing the entire list of compromised passwords to the client.
- One possibility for a private set membership system involves the server encrypting the entire set of identifiers with a private key and transmitting the entire encrypted set to the client. The client may then request the server encrypt (using the same private key) a query identifier (i.e., an identifier the client wishes to check against the server's set), and when the server returns the encrypted identifier, the client can determine if the encrypted identifier appears in the list of stored encrypted identifiers. While this method is relatively fast and efficient once established, it unfortunately requires the client to have sufficient bandwidth and storage to receive and store the entirety of the set of encrypted identifiers. In many scenarios, the client device will not have sufficient bandwidth and/or storage capabilities to make such a system feasible.
- Succinct filters are space-efficient probabilistic data structures that may be used to determine whether an element is a member of a set. Generally, false positive matches are possible while false negatives are not. That is, a succinct filter returns that either the element is not a member of the set or that the element may be a member of the set (i.e., definitely not in the set or possibly in the set). Common examples of succinct filters are bloom filters and cuckoo filters.
- Implementations herein are directed toward a private set membership system that uses a succinct filter to maintain privacy between a client device and a server while drastically reducing the bandwidth and storage requirements of the client device. The server (or other computing device) generates a succinct filter that includes a set of encrypted identifiers and provides the succinct filter to the client device. Using the succinct filter, the system performs approximate membership queries that may incur false positives but not false negatives. The client sends a request to the server requesting the server to encrypt a query identifier using the same key used to encrypt the set of encrypted identifiers. The client, after receiving the encrypted query identifier from the server, determines, using the succinct filter, whether the encrypted query identifier is not present in the set of encrypted identifiers. When the encrypted query identifier is not present, the client may generate a report or alert for a user indicating that the query identifier is not present in the set of identifiers that corresponds to the set of encrypted identifiers.
- Referring now to
FIG. 1 , in some implementations, anexample system 100 includes a client device 10 (e.g., a user device) associated with a respective user orclient 12 and in communication with aremote system 140 via anetwork 112. The client device may correspond to any computing device, such as a desktop workstation, a laptop workstation, a server, or a mobile device (i.e., a smart phone). Theclient device 10 includes computing resources 122 (e.g., data processing hardware) and/or storage resources 124 (e.g., memory hardware). - The
remote system 140 may be a single computer, multiple computers, or a distributed system (e.g., a cloud environment) having scalable/elastic computing resources 142 (e.g., data processing hardware) and/or storage resources 144 (e.g., memory hardware). A data store 150 (i.e., a remote storage device 150) may be overlain on thestorage resources 144 to allow scalable use of thestorage resources 144 by one or more of the client or computingresources 142. The data store 150 is configured to store a set of 152, 152 a-n. Eachidentifiers identifier 152 uniquely identifies a piece of information (e.g., an email, a URL, a password, an image, etc.). For example, the set ofidentifiers 152 identifies a set of known malicious URLs or a set of compromised passwords. The remote system executes afilter generator 160. - The
filter generator 160 encrypts eachidentifier 152 in the set to generate a set ofencrypted identifiers 152E, 152Ea-n. Eachidentifier 152 is encrypted using the sameprivate key 162. Theprivate key 162 is kept secret from theclient device 10 andclient 12. Thefilter generator 160 populates a filter 400 (i.e., a succinct filter) with theencrypted identifiers 152E using any conventional means appropriate for the specificsuccinct filter 400. In some examples, thesuccinct filter 400 is a cuckoo filter using hash tables based on cuckoo hashing to store fingerprints of eachencrypted identifier 152E. In other examples, thesuccinct filter 400 is a bloom filter using a bit array and hash functions to map hashes of theencrypted identifiers 152E to the array positions. Because cuckoo filters enable element insertion and element deletion, a cuckoo filter may be desirable over a bloom filter (which only enables element insertions) in use cases where deletions ofidentifiers 152 is useful or necessary. - The
remote system 140 provides theclient device 10 thesuccinct filter 400 via, for example, thenetwork 112. Theclient device 10 stores the succinct filter in thememory hardware 124. Because thesuccinct filter 400 is smaller in size than the set ofencrypted identifiers 152E, thesuccinct filter 400 requires less bandwidth to receive from theremote system 140 and requires less storage space to store at thememory hardware 124 than receiving and storing the entirety of the set ofencrypted identifiers 152E. - The
client device 10 executes amembership manager 200. In some examples, themembership manager 200 obtains a request from theclient 12 requesting that the client device 10 (i.e., the data processing hardware 122) to determine whether a query identifier 172 is a member of the set ofidentifiers 152 stored at theremote system 140. For example, when the set ofidentifiers 152 represents a list of known malicious URLs, the query identifier 172 identifies a URL that theuser 12 desires to check against the set ofidentifiers 152 to determine whether or not the URL may be malicious. Theclient 12 provides therequest 170 to themembership manager 200 via, for example, interacting with an application executing on the client device 10 (e.g., a web browser). In other examples, themembership manager 200 receives therequest 170 from other sources, such as another computing device. - A software application (i.e., a software resource) may refer to computer software that causes a computing device to perform a task. In some examples, a software application may be referred to as an “application,” an “app,” or a “program.” Example applications include, but are not limited to, system diagnostic applications, system management applications, system maintenance applications, word processing applications, spreadsheet applications, messaging applications, media streaming applications, social networking applications, and gaming applications.
- The
membership manager 200, in some implementations, includes aquery generator 210. Thequery generator 210 receives therequest 170 from theclient 12 and transmits anencryption request 212 to theremote system 140. Theencryption request 212 requests that theremote system 140 encrypts the query identifier 172 using the sameprivate key 162 used to encrypt the set ofencrypted identifiers 152E. Because the client device 10 (and thus the membership manager 200) does not have access to theprivate key 162, theclient device 10 must rely on theremote system 140 to encrypt the query identifier 172. - The
remote system 140 receives theencryption request 212 at aquery processor 180. Thequery processor 180 encrypts theidentifier 152 indicated by the encryption request 212 (i.e., the query identifier 172) using the sameprivate key 162 used to encrypt the set ofencrypted identifier 152E that populated thesuccinct filter 400. When, for example, theclient 12 does not wish to keep the query identifier 172 secret from theremote system 140, theencryption request 212 may directly include or reference the query identifier 172 and theremote system 140 merely encrypts the indicated query identifier 172 and returns aresult 182 to theclient device 10. When, however, theclient 12 desires to keep the query identifier 172 secret from the remote system 140 (i.e., theclient 12 desires for theremote system 140 to encrypt the query identifier 172 without learning the identity of the query identifier 172), thequery generator 210 may include an oblivious pseudorandom function (OPRF). An OPRF conceals information from each of two parties involved with the OPRF. For example, theclient device 10 cryptographically hashes the query identifier 172 and cryptographically blinds the hash to produce a message for theremote system 140. Theremote system 140 may in turn “mix” the message with theprivate key 162 and return theresult 182 to theclient device 10, which may unblind theresult 182 to obtain anencrypted query identifier 172E that corresponds to the query identifier 172 encrypted by theprivate key 162. - The
client device 10 and theremote system 140 may implement any appropriate algorithms to support the OPRF. For example, the client device may generate a random key R, and compute an encrypted input e=H(x)R which theclient device 10 transmits to theremote system 140. Theremote system 140 may compute a doubly encrypted input de=eK=H(x)RK. The remote system may then send de to theclient device 10, and theclient device 10 may compute de1/R=H(x)RK(1/R)=H(k)K which results in OPRF(K, x). Using this exchange, theremote system 140 will not learn whichspecific identifier 152 the query identifier 172 corresponds to, nor does the client device learn the remote system'sprivate key 162 or information regardingother identifiers 152 in the set. - The
client device 10 receives theresult 182 from theremote system 140, which includes theencrypted query identifier 172E corresponding to the query identifier 172 encrypted by theprivate key 162. Thesuccinct filter 400 determines whether theencrypted query identifier 172E is not a member of the set ofencrypted identifiers 152E (i.e., the set ofencrypted identifiers 152E that populates the succinct filter 400). Thesuccinct filter 400 generates anoutput 302 for amembership reporter 220 indicating either that theencrypted query identifier 172E is not in the set ofencrypted identifiers 152E or that the encrypted query identifier 172 may be in the set ofencrypted identifier 152E. - Because the
succinct filter 400 may incur false positives but does not incur false negatives, thesuccinct filter 400 can conclusively determine that theencrypted query identifier 172E is not in the set ofencrypted identifiers 152E, but thesuccinct filter 400 cannot conclusively determine that theencrypted query identifier 172E is in the set ofencrypted identifiers 152E. Because many common use cases will predominantly result in theencrypted query identifier 172E not being present in the set ofencrypted identifiers 152E, such as when checking for a malicious URL, thesuccinct filter 400 will typically return that theencrypted query identifier 172E is not present in the set ofencrypted identifiers 152E. - Referring now to
FIG. 2A , in the scenario when theencrypted query identifier 172E is not in the set ofencrypted identifiers 152E, themembership reporter 220 generates areport 222 that indicates to the client 12 (e.g., via a display of the client device 10) or other entity that generated therequest 170, that the query identifier 172 is not in the set ofidentifiers 152. In the example when the set ofidentifiers 152 identifies a set of known malicious URLs, thereport 222 indicates that the URL represented by the query identifier 172 is not in the list of known malicious URLs. Because theclient device 10 does not have access to theprivate key 162 of theremote system 140 and because thesuccinct filter 400 is populated only with theencrypted identifiers 152E, theclient device 10 does not learn any information from theremote system 140 regarding the set ofidentifiers 152 other than that the query identifier 172 does not appear in the set ofidentifiers 152. - Referring now to
FIG. 2B , in the scenario when theencrypted query identifier 172E may be in the set ofencrypted identifiers 152E (i.e., thesuccinct filter 400 was not able to conclusively determine that theencrypted query identifier 172E is not in the set ofencrypted identifiers 152E), themembership reporter 220 may provide thereport 222 to theclient 12 indicating that the query identifier 172 may be in the set ofidentifiers 152. In some scenarios, such areport 222 may be sufficient for theclient 12. That is, in some instances, theclient 12 may not require conclusive evidence that the query identifier 172 is present in the set ofidentifiers 152, and the knowledge that the query identifier 172 may be in the set ofidentifiers 152 is sufficient. The likelihood of a false positive (i.e., thesuccinct filter 400 indicates that theencrypted query identifier 172E may be present in the set ofencrypted identifiers 152E, but theencrypted query identifier 172E is not actually present in the set ofencrypted identifiers 152E) is based on the size of thesuccinct filter 400. When thesuccinct filter 400 is larger, the chances for false positives decreases, but the storage and bandwidth requirements correspondingly increase. Likewise, when thesuccinct filter 400 is smaller, the chances for false positives increases, but the storage and bandwidth requirements correspondingly decrease. The size of thesuccinct filter 400 may be configurable (e.g., by theremote system 140 or the client device 10) based on the use case (e.g., the type ifidentifiers 152, storage capabilities of theclient device 10, etc.). In some examples, themembership manager 200, in thereport 222, indicates the likelihood of a false positive. - In some implementations, the
membership reporter 220 includes a ring learning with errors (RLWE)protocol query generator 230. Optionally (e.g., in response to a client request when theclient 12 determines that the chance of a false positive is too great, automatically without any user intervention), the RLWEprotocol query generator 230 determines whether theencrypted query identifier 172E is a member of the set ofencrypted identifiers 152E held by theremote system 140. For example, the RLWEprotocol query generator 230 generates anRLWE query 232 and transmits theRLWE query 232 to theremote system 140. Theremote system 140 receives aRLWE result 234 that conclusively determines whether theencrypted query identifier 172E is or is not in the set ofencrypted identifiers 152E. In either case, themembership reporter 220 generates thereport 222 indicating the presence or lack of presence of the query identifier 172 in the set ofidentifiers 152. - While the
RLWE query 232 andRLWE result 234 may conclusively determine whether or not theencrypted query identifier 172E is a member of the set ofencrypted identifier 152E, generally speaking, theRLWE query 232 requires significantly more resources (e.g., computing resources, bandwidth resources, latency, etc.) than testing via thesuccinct filter 400. When the use case of the system involves theencrypted query identifier 172E typically not being present in the set ofencrypted identifiers 152E, thesuccinct filter 400 will save significant resources as the RLWE protocol will rarely need to be relied upon. In some examples, the RLWE protocol uses a fully homomorphic encryption scheme. While any appropriate RLWE protocol is within the scope of implementations described herein,FIG. 3 illustrates an exemplary RLWE protocol that the system may employ. - Referring back to
FIG. 1 , when there are updates to the set ofidentifiers 152, such as, for example, when additional known malicious URLs must be added to the list, theclient device 10 requires an updatedsuccinct filter 300 before the updated (i.e., added or deleted)identifiers 152 are accounted for. When there is a change to the set of identifiers 152 (i.e., one ormore identifiers 152 have been added and/or one ormore identifiers 152 have been deleted), thefilter generator 160 may generate a new or updated set ofencrypted identifiers 152E and a corresponding new or updatedsuccinct filter 400 that reflects the updated set ofidentifiers 152. Theremote system 140 may transmit the new or updatedsuccinct filter 400 to theclient device 10. Theremote system 140 may generate a newsuccinct filter 400 any time there is a change to the set of identifiers 152 (i.e., real-time updates) or, alternatively, theremote system 140 batches multiple updates together and generates a newsuccinct filter 400 after a sufficient amount of time has passed since the lastsuccinct filter 400 was generated and/or a sufficient number of changes have been made to the set ofidentifiers 152 since the lastsuccinct filter 400 was generated. - The
remote system 140 may provide newsuccinct filters 400 to theclient device 10 based on a “push” model, a “pull” model, or a hybrid model that combines elements of both the push and pull models. In the push model, theremote system 140 “pushes” or provides the newsuccinct filter 400 to theclient device 10 automatically, such as at regular intervals or whenever a newsuccinct filter 400 is available. In the pull model, theclient device 10 requests theremote system 140 provide the newsuccinct filter 400, in which case theremote system 140 responds with an updatedsuccinct filter 400. In this model, theclient device 10 may periodically poll theremote system 140 to determine whether a new or updatedsuccinct filter 400 is available. The hybrid model, in some examples, includes theremote system 140 providing theclient device 10 with a notification whenever a newsuccinct filter 400 is available. In this example, theclient device 10 determines when to retrieve the latestsuccinct filter 400 from theremote system 140. - In some examples, each generated
succinct filter 400 is uniquely associated with aversion identifier 402. That is, eachversion identifier 402 identifies one and only one specificsuccinct filter 400. Theclient device 10 and/or theremote system 140 may track the last version (via the version identifier 402) that theclient device 10 has received. Using theversion identifier 402, thefilter generator 160 may provide theclient device 10 with incremental updates for thesuccinct filter 400. For example, when theclient device 10 currently has a first version of a succinct filter (based on a first version identifier 402) and theremote system 140 has a second version of the succinct filter 400 (based on a second version identifier 402), theremote system 140 provides theclient device 10 with only the differences between the first version of thesuccinct filter 400 and the second version of thesuccinct filter 400, which may drastically reduce the bandwidth necessary to update theclient device 10. Theremote system 140 may track which version theclient device 10 has received. Alternatively, theclient device 10 notifies theremote system 140 of the most recent version that theclient device 10 has received. To support incremental updates, thefilter generator 160 may store a previous number of thesuccinct filters 400 so that theremote system 140 may track and provide the differences between different versions. - Referring now to
FIG. 4 , in some examples, thesuccinct filter 400 includes a plurality of 410, 410 a—n. Eachportions portion 410 of thesuccinct filter 400 includes a respective subset of theencrypted identifiers 152E. In some examples, eachportion 410 may be a separatesuccinct filter 400. When theremote system 140 receives an update to the set ofidentifiers 152, theremote system 140 may only update a singlecorresponding portion 410 of thesuccinct filter 400. That is, instead of generating an entire newsuccinct filter 400, theremote system 140 may update only arespective portion 410 of thesuccinct filter 400. Theclient device 10 and/orremote system 140 may configure a size and/or a number ofportions 410. - Referring now to the
schematic view 500 ofFIG. 5 , in some implementations, thefilter generator 160 receives an update to the set ofidentifiers 152, such as an addition of anew identifier 152 or deletion of an existingidentifier 152. Thefilter generator 160 updates the set ofencrypted identifiers 152E and generates a newsuccinct filter 400 that includes the updates to the set ofencrypted identifiers 152E. In some examples, thefilter generator 160 updates aportion 410 of thesuccinct filter 400. Theclient device 10, in some examples, receives, from theremote system 140, the updatedportion 410 from theremote system 140. Here, thesuccinct filter 400 includes fourportions 410 a—d. The updated portion updates theportion 410 b. Theclient device 10 may replace the one of theportions 410 with the updated portion 410 (i.e., updatedportion 410 b in this example). In this way, theclient device 10 only updates a portion of thesuccinct filter 400 and bandwidth requirements are reduced. Theclient device 10 may generate arequest 510 for the updatedportion 410. Alternatively, thefilter generator 160 may provide afilter update 520 including the updatedportion 410 to theclient device 10 without prompting from theclient device 10. - Thus, the system provides a device the capability of providing a private membership query to a server without revealing the identity of the queried element to the server. Moreover, the server can provide a response without revealing any identifiers except for whether the queried identifier is a member of the set. Combined with a query rate-limiter (i.e., a technique limiting the frequency the server will respond to queries), the server can avoid users and/or devices from brute forcing the identifier space to determine database contents. Using one or more succinct filters, the system may provide significant bandwidth and storage savings versus implementations that require the client device store the entirety of set of encrypted identifiers.
- While examples herein include using a set of
encrypted identifiers 152E to conceal information regarding the set ofidentifiers 152 from theclient device 10, in some examples, this concealment may not be necessary or desirable. In these examples, thesystem 100 may operate as described above, except thesuccinct filter 400 is populated with the set ofidentifiers 152 directly instead of the set ofencrypted identifiers 152E. Then, theclient device 10 may query thesuccinct filter 400 directly using the query identifier 172 without the need to acquire theencrypted query identifier 172E from theremote system 140. When thesuccinct filter 400 is unable to definitively confirm that the query identifier 172 is not present in the set ofidentifiers 152, theclient device 10 may then query theremote system 140 to determine whether the query identifier 172 is present in the set ofidentifiers 152. -
FIG. 6 is a flowchart of an exemplary arrangement of operations for amethod 600 of determining private set membership using a filter. Themethod 600 includes, atoperation 602, obtaining, from a server 140 (i.e., a remote computing system 140), afilter 400 that includes a set ofencrypted identifiers 152E. Eachencrypted identifier 152E of the set ofencrypted identifiers 152E is encrypted with a server key 162 (i.e., a private key) controlled by theserver 140. Atoperation 604, themethod 600 includes obtaining arequest 170 from auser 12. Therequest 170 requests data processing hardware 122 (e.g., of a client device 10) to determine whether a query identifier 172 is a member of a set ofidentifiers 152. The set ofidentifiers 152 correspond to the set ofencrypted identifiers 152E. - The
method 600, atoperation 606, includes transmitting anencryption request 212 to theserver 140. The encryption request requests theserver 140 to encrypt the query identifier 172. Atoperation 608, themethod 600 includes receiving, from theserver 140, anencrypted query identifier 172E that includes the query identifier 172 encrypted by theserver key 162. - The
method 600, atoperation 610, includes determining, using thefilter 400, whether theencrypted query identifier 172E is not a member of the set ofencrypted identifiers 152E. Atstep 612, themethod 600 includes, when theencrypted query identifier 172E is not a member of the set ofencrypted identifiers 152E, reporting, to theuser 12, that the query identifier 172 is not a member of the set ofidentifiers 152. -
FIG. 7 is schematic view of anexample computing device 700 that may be used to implement the systems and methods described in this document. Thecomputing device 700 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The components shown here, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed in this document. - The
computing device 700 includes aprocessor 710,memory 720, astorage device 730, a high-speed interface/controller 740 connecting to thememory 720 and high-speed expansion ports 750, and a low speed interface/controller 760 connecting to a low speed bus 770 and astorage device 730. Each of the 710, 720, 730, 740, 750, and 760, are interconnected using various busses, and may be mounted on a common motherboard or in other manners as appropriate. Thecomponents processor 710 can process instructions for execution within thecomputing device 700, including instructions stored in thememory 720 or on thestorage device 730 to display graphical information for a graphical user interface (GUI) on an external input/output device, such asdisplay 780 coupled tohigh speed interface 740. In other implementations, multiple processors and/or multiple buses may be used, as appropriate, along with multiple memories and types of memory. Also,multiple computing devices 700 may be connected, with each device providing portions of the necessary operations (e.g., as a server bank, a group of blade servers, or a multi-processor system). - The
memory 720 stores information non-transitorily within thecomputing device 700. Thememory 720 may be a computer-readable medium, a volatile memory unit(s), or non-volatile memory unit(s). Thenon-transitory memory 720 may be physical devices used to store programs (e.g., sequences of instructions) or data (e.g., program state information) on a temporary or permanent basis for use by thecomputing device 700. Examples of non-volatile memory include, but are not limited to, flash memory and read-only memory (ROM)/programmable read-only memory (PROM)/erasable programmable read-only memory (EPROM)/electronically erasable programmable read-only memory (EEPROM) (e.g., typically used for firmware, such as boot programs). Examples of volatile memory include, but are not limited to, random access memory (RAM), dynamic random access memory (DRAM), static random access memory (SRAM), phase change memory (PCM) as well as disks or tapes. - The
storage device 730 is capable of providing mass storage for thecomputing device 700. In some implementations, thestorage device 730 is a computer-readable medium. In various different implementations, thestorage device 730 may be a floppy disk device, a hard disk device, an optical disk device, or a tape device, a flash memory or other similar solid state memory device, or an array of devices, including devices in a storage area network or other configurations. In additional implementations, a computer program product is tangibly embodied in an information carrier. The computer program product contains instructions that, when executed, perform one or more methods, such as those described above. The information carrier is a computer- or machine-readable medium, such as thememory 720, thestorage device 730, or memory onprocessor 710. - The
high speed controller 740 manages bandwidth-intensive operations for thecomputing device 700, while thelow speed controller 760 manages lower bandwidth-intensive operations. Such allocation of duties is exemplary only. In some implementations, the high-speed controller 740 is coupled to thememory 720, the display 780 (e.g., through a graphics processor or accelerator), and to the high-speed expansion ports 750, which may accept various expansion cards (not shown). In some implementations, the low-speed controller 760 is coupled to thestorage device 730 and a low-speed expansion port 790. The low-speed expansion port 790, which may include various communication ports (e.g., USB, Bluetooth, Ethernet, wireless Ethernet), may be coupled to one or more input/output devices, such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter. - The
computing device 700 may be implemented in a number of different forms, as shown in the figure. For example, it may be implemented as astandard server 700 a or multiple times in a group ofsuch servers 700 a, as alaptop computer 700 b, or as part of arack server system 700 c. - Various implementations of the systems and techniques described herein can be realized in digital electronic and/or optical circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
- These computer programs (also known as programs, software, software applications or code) include machine instructions for a programmable processor, and can be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the terms “machine-readable medium” and “computer-readable medium” refer to any computer program product, non-transitory computer readable medium, apparatus and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal” refers to any signal used to provide machine instructions and/or data to a programmable processor.
- The processes and logic flows described in this specification can be performed by one or more programmable processors, also referred to as data processing hardware, executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit). Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
- To provide for interaction with a user, one or more aspects of the disclosure can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube), LCD (liquid crystal display) monitor, or touch screen for displaying information to the user and optionally a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
- A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the disclosure. Accordingly, other implementations are within the scope of the following claims.
Claims (20)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/448,565 US11621828B1 (en) | 2021-09-23 | 2021-09-23 | Privately querying a database with private set membership using succinct filters |
| EP22786697.7A EP4406195A1 (en) | 2021-09-23 | 2022-09-13 | Private set membership using succinct filters |
| PCT/US2022/076379 WO2023049644A1 (en) | 2021-09-23 | 2022-09-13 | Private set membership using succinct filters |
| CN202280064219.0A CN117999764A (en) | 2021-09-23 | 2022-09-13 | Private collection membership using succinct filter |
| US18/189,187 US11909861B2 (en) | 2021-09-23 | 2023-03-23 | Privately querying a database with private set membership using succinct filters |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/448,565 US11621828B1 (en) | 2021-09-23 | 2021-09-23 | Privately querying a database with private set membership using succinct filters |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/189,187 Continuation US11909861B2 (en) | 2021-09-23 | 2023-03-23 | Privately querying a database with private set membership using succinct filters |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20230091538A1 true US20230091538A1 (en) | 2023-03-23 |
| US11621828B1 US11621828B1 (en) | 2023-04-04 |
Family
ID=83689075
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/448,565 Active US11621828B1 (en) | 2021-09-23 | 2021-09-23 | Privately querying a database with private set membership using succinct filters |
| US18/189,187 Active US11909861B2 (en) | 2021-09-23 | 2023-03-23 | Privately querying a database with private set membership using succinct filters |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/189,187 Active US11909861B2 (en) | 2021-09-23 | 2023-03-23 | Privately querying a database with private set membership using succinct filters |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US11621828B1 (en) |
| EP (1) | EP4406195A1 (en) |
| CN (1) | CN117999764A (en) |
| WO (1) | WO2023049644A1 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11621828B1 (en) * | 2021-09-23 | 2023-04-04 | Google Llc | Privately querying a database with private set membership using succinct filters |
| US12192205B2 (en) * | 2022-06-24 | 2025-01-07 | Microsoft Technology Licensing, Llc | Utilizing probability data structures to improve access control of documents across geographic regions |
| US20250078196A1 (en) * | 2023-09-05 | 2025-03-06 | Qualcomm Incorporated | Dynamic switching of fields based on head pose |
| KR20250077256A (en) | 2023-11-23 | 2025-05-30 | 삼성전자주식회사 | Security device and operation method |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100070514A1 (en) * | 2008-09-15 | 2010-03-18 | Coremetrics,Inc. | System and method of using a bloom filter in a web analytics application |
| US20150106411A1 (en) * | 2013-10-14 | 2015-04-16 | Red Hat, Inc. | Migrating file locks in distributed file systems |
| US20150358234A1 (en) * | 2014-06-10 | 2015-12-10 | Google Inc. | Probabilistic Message Filtering and Grouping |
| US10182463B1 (en) * | 2016-03-07 | 2019-01-15 | Microsoft Technology Licensing, Llc | Transmitting data among mobile devices |
| US20190121813A1 (en) * | 2017-10-20 | 2019-04-25 | Social Patent LLC | System and Method of Sovereign Digital Identity Search and Bidirectional Matching |
| US10282373B2 (en) * | 2009-04-17 | 2019-05-07 | Excalibur Ip, Llc | Subject-based vitality |
| US20190273617A1 (en) * | 2018-03-02 | 2019-09-05 | Intertrust Technologies Corporation | Trust and identity management systems and methods |
| US20200153765A1 (en) * | 2018-11-12 | 2020-05-14 | Salesforce.Com, Inc. | Contact information extraction and identification |
| US20210123761A1 (en) * | 2019-10-25 | 2021-04-29 | Here Global B.V. | Apparatus, method, and computer program product for generating map data of categorized links |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10635824B1 (en) * | 2015-03-20 | 2020-04-28 | EMC IP Holding Company LLC | Methods and apparatus for private set membership using aggregation for reduced communications |
| US11621828B1 (en) * | 2021-09-23 | 2023-04-04 | Google Llc | Privately querying a database with private set membership using succinct filters |
-
2021
- 2021-09-23 US US17/448,565 patent/US11621828B1/en active Active
-
2022
- 2022-09-13 EP EP22786697.7A patent/EP4406195A1/en active Pending
- 2022-09-13 CN CN202280064219.0A patent/CN117999764A/en active Pending
- 2022-09-13 WO PCT/US2022/076379 patent/WO2023049644A1/en not_active Ceased
-
2023
- 2023-03-23 US US18/189,187 patent/US11909861B2/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100070514A1 (en) * | 2008-09-15 | 2010-03-18 | Coremetrics,Inc. | System and method of using a bloom filter in a web analytics application |
| US10282373B2 (en) * | 2009-04-17 | 2019-05-07 | Excalibur Ip, Llc | Subject-based vitality |
| US20150106411A1 (en) * | 2013-10-14 | 2015-04-16 | Red Hat, Inc. | Migrating file locks in distributed file systems |
| US20150358234A1 (en) * | 2014-06-10 | 2015-12-10 | Google Inc. | Probabilistic Message Filtering and Grouping |
| US10182463B1 (en) * | 2016-03-07 | 2019-01-15 | Microsoft Technology Licensing, Llc | Transmitting data among mobile devices |
| US20190121813A1 (en) * | 2017-10-20 | 2019-04-25 | Social Patent LLC | System and Method of Sovereign Digital Identity Search and Bidirectional Matching |
| US20190273617A1 (en) * | 2018-03-02 | 2019-09-05 | Intertrust Technologies Corporation | Trust and identity management systems and methods |
| US20200153765A1 (en) * | 2018-11-12 | 2020-05-14 | Salesforce.Com, Inc. | Contact information extraction and identification |
| US20210123761A1 (en) * | 2019-10-25 | 2021-04-29 | Here Global B.V. | Apparatus, method, and computer program product for generating map data of categorized links |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2023049644A1 (en) | 2023-03-30 |
| US11621828B1 (en) | 2023-04-04 |
| EP4406195A1 (en) | 2024-07-31 |
| CN117999764A (en) | 2024-05-07 |
| US11909861B2 (en) | 2024-02-20 |
| US20230231698A1 (en) | 2023-07-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11909861B2 (en) | Privately querying a database with private set membership using succinct filters | |
| US11509709B1 (en) | Providing access to encrypted insights using anonymous insight records | |
| US12282582B2 (en) | Compromise free cloud data encryption and security | |
| US10771261B1 (en) | Extensible unified multi-service certificate and certificate revocation list management | |
| US10083311B2 (en) | Cryptographic key | |
| US20230254126A1 (en) | Encrypted search with a public key | |
| US10990584B1 (en) | Establishing decentralized identifiers for algorithms, data schemas, data sets, and algorithm execution requests | |
| US11849026B2 (en) | Database integration with an external key management system | |
| US8769302B2 (en) | Encrypting data and characterization data that describes valid contents of a column | |
| CN115053224B (en) | Encryption search without zero day leakage | |
| CN113890726A (en) | Encryption key management for international data residency | |
| WO2020253380A1 (en) | Data encryption method and apparatus, and terminal device | |
| CN116346822A (en) | A data sharing method, device and storage medium | |
| US12432050B2 (en) | Managing data availability on encryption key status changes in replicated storage systems | |
| AU2015413372B2 (en) | Selective encryption of profile fields for multiple consumers | |
| CN119622760B (en) | Method, apparatus, device and storage medium for data processing | |
| Yan et al. | Research on database encryption technology of industrial network monitoring system | |
| CN116708163A (en) | Configuration information synchronization method, system, equipment and storage medium | |
| CN116881215A (en) | File sharing method, device, equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YEO, KEVIN;SEO, JOON YOUNG;PATEL, SARVAR;REEL/FRAME:057574/0689 Effective date: 20210923 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YEO, KEVIN;SEO, JOON YOUNG;PATEL, SARVAR;REEL/FRAME:058407/0254 Effective date: 20210923 |
|
| AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE APPLICATION NUMBER 17448566 PREVIOUSLY RECORDED AT REEL: 057574 FRAME: 0689. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:YEO, KEVIN;SEO, JOON YOUNG;PATEL, SARVAR;REEL/FRAME:059471/0122 Effective date: 20210923 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |