会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • METHOD FOR PROCESSING A GENERALIZED GOLDWASSER-MICALI CIPHERTEXT, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT
    • 用于处理通用金手指芯片的方法,相应的电子设备和计算机程序产品
    • WO2015101606A1
    • 2015-07-09
    • PCT/EP2014/079383
    • 2014-12-29
    • THOMSON LICENSING
    • JOYE, MarcLIBERT, Benoit
    • H04L9/30
    • H04L9/302H04L9/008
    • In one embodiment, it is proposed a method for processing a generalized Goldwasser-Micali ciphertext, said ciphertext being obtained through a use of a public key, said method being executed on an electronic device and being remarkable in that it comprises: ‐ determining at least one bit of a binary representation of a plaintext associated with said ciphertext, said at least one bit corresponding to a bit positioned at j -th position of said binary representation of said plaintext, j being an integer greater or equal to one, and position zero of said binary representation corresponding to the least significant bit of said binary representation, said determining being a function of ‐ said ciphertext, ‐ an element of said public key, ‐ a private key associated to said public key, ‐ an element defined as a function of said private key, and ‐ least significant bits of said plaintext from position zero to position j -1 in said binary representation.
    • 在一个实施例中,提出了一种用于处理广义Goldwasser-Micali密文的方法,所述密文通过使用公钥获得,所述方法在电子设备上执行,并且显着,其包括:至少确定 与所述密文相关联的明文的二进制表示的一位,所述至少一个位对应于位于所述明文的所述二进制表示的第j位的位,j是大于或等于1的整数,位置零 所述二进制表示对应于所述二进制表示的最低有效位,所述确定是所述密文的函数, - 所述公开密钥的元素, - 与所述公共密钥相关联的私钥, - 定义为函数的元素 以及所述二进制表示中的从位置零到位置j -1的所述明文的最低有效位。
    • 53. 发明申请
    • METHOD AND SYSTEM FOR PRIVACY-PRESERVING RECOMMENDATIONS
    • 用于隐私保护建议的方法和系统
    • WO2015191919A1
    • 2015-12-17
    • PCT/US2015/035422
    • 2015-06-11
    • THOMSON LICENSING
    • WEINSBERG, EhudJOYE, MarcIOANNIDIS, Efstratios
    • G06F21/62G06Q30/06H04L9/00
    • G06F21/6245G06Q30/0282G06Q30/0631H04L9/008
    • Various examples of systems and methods for providing recommendations that can be tailored to a user while preserving the privacy of the user's personal information are disclosed. In various embodiments, user information can be encrypted such that the recommendation service cannot decrypt the user information, yet the recommendation service can analyze the user information to predict user ratings for content items. The predicted user ratings can remain obscured from the recommendation service by encryption, yet can provide the basis for recommendations tailored to the user. In particular, the encrypted predicted user ratings can be sent to a third party (i.e., not the recommendation service or the user), and the third party can decrypt the predicted user ratings and determine recommendations based on the predicted user ratings.
    • 公开了用于提供可以针对用户定制的建议的系统和方法的各种示例,同时保持用户的个人信息的隐私。 在各种实施例中,可以加密用户信息,使得推荐服务不能解密用户信息,但是推荐服务可以分析用户信息以预测内容项目的用户评级。 预测的用户评分可以通过加密仍然可以从推荐服务中遮蔽,但可以为用户定制的推荐提供基础。 特别地,加密的预测用户评级可以被发送到第三方(即,不是推荐服务或用户),并且第三方可以解密预测的用户评级并且基于预测的用户评级来确定推荐。
    • 54. 发明申请
    • METHOD AND APPARATUS FOR GENERATING SHORTER SIGNATURES ALMOST TIGHTLY RELATED TO STANDARD ASSUMPTIONS
    • 用于产生与标准假设相关的短信签名的方法和装置
    • WO2015175365A1
    • 2015-11-19
    • PCT/US2015/030065
    • 2015-05-11
    • THOMSON LICENSING
    • JOYE, MarcLIBERT, Benoit
    • H04L9/00H04L9/30H04L9/32
    • H04L9/008H04L9/3073H04L9/3247
    • The present principles use the message to be signed as a label - of the private key augmented with a QA-NIZK proof that the encrypted value is a persistent hidden secret. One-time homomorphic signatures are used to generate the signature and the public key. The private key for the one-time homomorphic signatures is included in the private key for signing the message, and the public key for the one-time homomorphic signatures is included in the public key for verifying the signature. Consequently, we obtain DLIN-based signatures comprised of only 6 group elements. The security proof uses a sequence of hybrid games, gradually moves to a game where all signatures contain an encryption of a random value while the QA-NIZK proofs are simulated proofs for false statements.
    • 本原则使用该消息作为标签,该私钥增加了QA-NIZK证明加密值是持久的隐藏秘密的标签。 一次性同态特征用于生成签名和公钥。 用于一次同态特征的私钥包括在用于签署消息的私钥中,并且用于一次性同态特征的公钥被包括在用于验证签名的公钥中。 因此,我们获得了仅由6个组元素组成的基于DLIN的签名。 安全证明使用一系列混合游戏,逐渐移动到游戏,其中所有签名都包含随机值的加密,而QA-NIZK证明是虚假陈述的模拟证明。
    • 55. 发明申请
    • MULTI-HOP PROXY RE-ENCRYPTION METHODS AND DEVICES
    • 多重代码重新加密方法和设备
    • WO2015101533A1
    • 2015-07-09
    • PCT/EP2014/078872
    • 2014-12-19
    • THOMSON LICENSING
    • HEEN, OlivierJOYE, MarcLIBERT, Benoît
    • H04L9/08H04L9/30H04L29/06
    • H04L9/30H04L9/0825H04L63/0464H04L63/0478H04L2209/76
    • The disclosure is directed to a proxy re-encryption scheme with limited delegations. To generate a formula (I) ciphertext for a message, wherein formula (II) is an integer, a (I) ciphertext enabling formula (IV) levels of re-encryption and L-1 is a maximum number of possible re-encryption levels, a processor (112) generates, in a (I) group of prime order p, a (I) encryption key for the (I) ciphertext from a public key and a (I) generator for the (I) group; obtains a first ciphertext component by multiplying the message with a generator of a final group formula (III) of a multi-linear configuration with L levels, the generator being raised to the power of an integer exponent; obtains a second ciphertext component by taking the (I) encryption key to the power of the integer exponent; and outputs the (I) ciphertext comprising the integer (II), the first ciphertext component and the second ciphertext component. In a preferred embodiment, the processor (112) includes an indicator of a time period in the (I) ciphertext; and, if the integer (IV), obtains a third ciphertext component by taking a hash value over the time period to the power of the integer exponent and includes the third ciphertext component in the (I) ciphertext that is output. Also provided are the re-encryption and decryption counterparts.
    • 本公开涉及具有有限授权的代理重新加密方案。 为了生成消息的公式(I)密文,其中公式(II)是整数,(I)密文使能公式(IV)再加密和L-1的级别是可能的重新加密级别的最大数量 处理器(112)以(I)素数阶组p生成来自公钥的(I)密文和(I)组的(I)生成器的(I)加密密钥; 通过将消息与具有L个级别的多线性配置的最终组公式(III)的生成器相乘来获得第一密文分量,生成器被提升为整数指数的幂; 通过将(I)加密密钥乘以整数指数的幂来获得第二密文分量; 并输出包含整数(II),第一密文分量和第二密文分量的(I)密文。 在优选实施例中,处理器(112)包括(I)密文中的时间段的指示符; 并且如果整数(IV)通过将该时间周期的散列值取为整数指数的幂来获得第三密文分量,并且包括输出的(I)密文中的第三密文分量。 还提供了重新加密和解密对手。
    • 56. 发明申请
    • METHOD FOR GENERATING A QUASI-ADAPTIVE NON-INTERACTIVE ZERO-KNOWLEDGE PROOF AND CORRESPONDING ELECTRONIC DEVICE
    • 用于生成适应性非互动零点知识证明和相应电子设备的方法
    • WO2015055765A1
    • 2015-04-23
    • PCT/EP2014/072222
    • 2014-10-16
    • THOMSON LICENSING
    • JOYE, MarcLIBERT, Benoît
    • H04L9/32
    • H04L9/3218
    • In one embodiment, it is proposed a method for generating a quasi-adaptive non- interactive zero-knowledge proof, said proof assessing a membership of a first vector to a hard language, which is a subspace of G n , where G is a group and n is an integer. The method is executed by an electronic device, and is remarkable in that it comprises: generating a derived linearly homomorphic signature on a second vector, said second vector being defined as a function of said first vector, from a linearly homomorphic signatures comprised in a common reference string and a witness associated with said first vector; and generating a non-malleable element by using a public evaluation function of a smooth projective hash function, in combination with a hash function, said first vector, said witness and elements comprised in said common reference string, said proof being a combination of said derived linearly homomorphic signature and said non-malleable element.
    • 在一个实施例中,提出了一种用于生成准自适应非交互式零知识证明的方法,所述证明将第一向量的隶属度评估为硬语言,该硬语言是G n的子空间,其中G是组 并且n是整数。 该方法由电子设备执行,并且显着的是其包括:在第二矢量上生成衍生的线性同态特征,所述第二矢量被定义为所述第一矢量的函数,来自包含在共同的线性同态特征 参考字符串和与所述第一向量相关联的证人; 以及通过使用平滑投影散列函数的公共评估函数,与散列函数,所述第一向量,所述证人和包含在所述公共参考串中的元素组合来生成非可延展元素,所述证明是所述派生的 线性同态特征和所述不可塑性元素。
    • 58. 发明申请
    • PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH
    • 公共密钥加密与关键字搜索
    • WO2016073059A2
    • 2016-05-12
    • PCT/US2015/045860
    • 2015-08-19
    • THOMSON LICENSING
    • JOYE, Marc
    • H04L9/00
    • H04L9/302H04L2209/76
    • The present principle relate to new public-key cryptosystems with searchable encryption, in particular, public key encryption with keyword search. Public key encryption with keyword search is a form of encryption that allows searching on data that is encrypted using a public key system. Notably, these new public key cryptosystems rely on standard security assumptions. Namely, their semantic security follows from the standard quadratic residuosity assumption (in the random oracle model). The resulting ciphertexts are also much shorter than the concurrent scheme of Di Crescenzo and Saraswat.
    • 本原理涉及具有可搜索加密的新的公钥密码系统,特别是具有关键字搜索的公开密钥加密。 使用关键词搜索的公钥加密是一种加密形式,允许搜索使用公共密钥系统加密的数据。 值得注意的是,这些新的公钥密码系统依赖于标准的安全假设。 也就是说,它们的语义安全性遵循标准二次残差假设(在随机的oracle模型中)。 得到的密文也比Di Crescenzo和Saraswat的并行方案短得多。
    • 60. 发明申请
    • METHOD AND SYSTEM FOR PRIVACY-PRESERVING RECOMMENDATIONS
    • 用于隐私保护建议的方法和系统
    • WO2016044129A1
    • 2016-03-24
    • PCT/US2015/049907
    • 2015-09-14
    • THOMSON LICENSING
    • JOYE, MarcWEINSBERG, EhudIOANNIDIS, Efstratios
    • H04N21/466
    • H04N21/25891H04N21/2351H04N21/251H04N21/2668H04N21/435H04N21/4668H04N21/4826
    • Various examples of systems and methods for providing recommendations that can be tailored to a user while preserving the privacy of the user's personal information are disclosed. In various embodiments, user information can be encrypted such that the recommendation service cannot decrypt the user information, yet the recommendation service can analyze the user information to predict user ratings for content items. The predicted user ratings can remain obscured from the recommendation service by encryption, yet can provide the basis for recommendations tailored to the user. In particular, encrypted comparison information of predicted user ratings can be sent to the user, and the user can decrypt the comparison and send result information to the recommender to determine recommendations.
    • 公开了用于提供可以针对用户定制的建议的系统和方法的各种示例,同时保持用户的个人信息的隐私。 在各种实施例中,可以加密用户信息,使得推荐服务不能解密用户信息,但是推荐服务可以分析用户信息以预测内容项目的用户评级。 预测的用户评分可以通过加密仍然可以从推荐服务中遮蔽,但可以为用户定制的推荐提供基础。 特别地,可以向用户发送预测用户等级的加密比较信息,并且用户可以解密比较并将结果信息发送给推荐者以确定推荐。