Network system, server and information terminal for list...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S698000, C707S747000, C708S603000, C708S605000

Reexamination Certificate

active

07979712

ABSTRACT:
A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item.

REFERENCES:
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5369705 (1994-11-01), Bird et al.
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 6076163 (2000-06-01), Hoffstein et al.
patent: 6092233 (2000-07-01), Yang
patent: 6285774 (2001-09-01), Schumann et al.
patent: 6287774 (2001-09-01), Nikiforov
patent: 6442553 (2002-08-01), Take
patent: 6560747 (2003-05-01), Weng
patent: 6574774 (2003-06-01), Vasiliev
patent: 6634007 (2003-10-01), Koetter et al.
patent: 6654701 (2003-11-01), Hatley
patent: 6738779 (2004-05-01), Shapira
patent: 6904558 (2005-06-01), Cavanna et al.
patent: 6950875 (2005-09-01), Slaughter et al.
patent: 6957341 (2005-10-01), Rice et al.
patent: 7006999 (2006-02-01), Huberman et al.
patent: 7168025 (2007-01-01), Berkovich
patent: 2002/0010679 (2002-01-01), Felsher
Matsuo, Shin'ichiro. Ogata, Wakaha. “A Method for Exchanging Valuable Data: How to Realize Oblvious Transfer”. Annual ACM Symposium on Principles of Distributed Computing. Pub Date: 2003. Relevant pp. 201. Found on the World Wide Web at: http://doi.acm.org/10.1145/872035.872064.
Schmidt, Jeanette. Siegel, Alan. “On Aspects of Universality and Performance for Closed Hashing”. Annual ACM Symposium on Theory of Computing. Pub Date: 1989. Relevant pp. 355-366. Found on the World Wide Web at: http://doi.acm.org/10.1145/73007.73041.
Smith, James. De Micheli, Giovanni. “Polynomial Methods for Component Matching and Verification”. 1998 IEEE/ACM International Conference on Computer-Aided Design. Pub. Date: Nov. 1998. Relevant pp. 678-685. Found on the World Wide Web at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=743096.
Lindell et al.,Privacy Preserving Data Mining, Advances in Cryptology—CRYPTO 2000, vol. 1880, pp. 38-54 (Aug. 2000).
Naor, Moni et al., “Oblivious Transfer and Polynomial Evaluation,” STOC'99 Atlanta GA, pp. 245-254 (1999).
Ben-Or, Goldwasser et al., “Completeness theorems for non-cryptographic fault-tolerant distributed computation,” ACM-0-89791-264-0/88/0005/001, pp. 1-10 (1988).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network system, server and information terminal for list... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network system, server and information terminal for list..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network system, server and information terminal for list... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2625019

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.