Secure computational outsourcing techniques

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S201000

Reexamination Certificate

active

06941463

ABSTRACT:
A technique includes the determination of a set of arguments for an outsourced computation and preparing a group of disguised arguments corresponding to the set of arguments with a first computer. The first computer outputs the disguised arguments to a second computer. The second computer performs the outsourced computation with the disguised arguments to determine a corresponding disguised result. The second computer returns the disguised result to the first computer. The first computer recovers an actual answer from the disguised result. Before outsourcing, the first computer can classify the outsourced computation into one of a number of computation types and select one or more of a number of disguising operations based this classification.

REFERENCES:
patent: 5687191 (1997-11-01), Lee et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5822360 (1998-10-01), Lee et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6119108 (2000-09-01), Holmes et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6185683 (2001-02-01), Gintner et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6237786 (2001-05-01), Gintner et al.
Abadi et al, “On Higding Information from an Oracle”, 1989, Journal of Computer and System Sciences, 39, pp. 1-29.
Abadi et al, “Secure Circuit Evaluation”, 1990, Journal of Cryptology, 3, pp. 1-12.
Matsumoto et al, “Speeding Up Secret Computations with Insecure Auxilary Devices”, 1990, Springer-Verlag, pp. 497-506.
Kawamura et al, “Fast Server-Aided Secret Computation Protocols for Modular Exponentiation”, 1993, IEEE, pp. 778-784.
Casanova et al, “Netsolve: A Network Server for Solving Computational Science Problems”, 1996, Univ. Tennesse, pp. 1-14.
Atallah, Mikhail J., Rice, John R.; Secure Outsourcing of Scientific Computations; Dec. 7, 1998.
Atallah, Mikhail J., Pantazopoulos, Konstantinos N., Spafford, Eugene H.; Secure Outsourcing of Some Computations; date of publication unknown.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure computational outsourcing techniques does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure computational outsourcing techniques, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure computational outsourcing techniques will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3396583

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.