Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2005-10-18
2005-10-18
Smithers, Matthew (Department: 2137)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C708S200000, C708S446000
Reexamination Certificate
active
06957341
ABSTRACT:
A method and system for secure computational outsourcing and disguise. According to an embodiment, a first set of actual arguments and a second set of actual arguments for an outsourced computation are determined. A first group of disguised arguments corresponding to the first set of actual arguments is prepared with a first computer. A second group of disguised arguments corresponding to the second set of actual arguments is prepared with a second computer. The first and second groups of disguised arguments are output from the first and second computers, respectively, for performance of the outsourced computation. A third computer performs the outsourced computation and returns a disguised result to the first and/or second computers. The first and/or second computers then unveil the actual result from the disguised result.
REFERENCES:
patent: 5687191 (1997-11-01), Lee et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5822360 (1998-10-01), Lee et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6119108 (2000-09-01), Holmes et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6237786 (2001-05-01), Ginter et al.
Matsumoto et al., Speeding Up Secret Computations with Insecure Auxiliary Devices.
Shin-Ichi Kawamura, Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
H. Casanova and J. Dongarra, Netsolve: A Network Server for Solving Computational Science Problems.
Abadi et al., On Hiding Information from an Oracle.
M. Abadi and J. Feigenbaum, Secure Circuit Evaluations.
Atallah, Mikhail J.; Pantazopolous, Konstatinos N.; and Spafford, Eugene H.; Secure Outsourcing of Some Computations; pp. 1-23 (cited in International Search Report dated Aug. 2, 2002).
Atallah, Mikhail J. and Rice, John R.; Secure Outsourcing of Scientific Computations; pp. 1-8 (cited in International Search Report dated Aug. 2, 2002).
Atallah, Mikhail J.; Pantazopolous, K.N.; Rice, John R.; and Spafford, Eugene H.; “Secure Outsourcing of Scientific Computations;” Advances in Computers, vol. 54, Chapter 6; published 2001; pp. 215-272 (copy provided herein is pp 1-56).
Atallah, M.J. and Rice, J.R.; Outsourcing Scientific Computations Securely; Proc. Information Sciences Innovations-2001 (E-Business and Beyond); published Mar. 18, 2001; No. 1621-021, 7 pages.
Atallah Mikhail J.
Rice John R.
Purdue Research Foundation
Rose McKinney & Evans LLP
Smithers Matthew
LandOfFree
Method and system for secure computational outsourcing and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for secure computational outsourcing and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for secure computational outsourcing and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3465867