Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2005-09-06
2005-09-06
Smithers, Matthew (Department: 2137)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C709S201000
Reexamination Certificate
active
06941463
ABSTRACT:
A technique includes the determination of a set of arguments for an outsourced computation and preparing a group of disguised arguments corresponding to the set of arguments with a first computer. The first computer outputs the disguised arguments to a second computer. The second computer performs the outsourced computation with the disguised arguments to determine a corresponding disguised result. The second computer returns the disguised result to the first computer. The first computer recovers an actual answer from the disguised result. Before outsourcing, the first computer can classify the outsourced computation into one of a number of computation types and select one or more of a number of disguising operations based this classification.
REFERENCES:
patent: 5687191 (1997-11-01), Lee et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5822360 (1998-10-01), Lee et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6119108 (2000-09-01), Holmes et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6185683 (2001-02-01), Gintner et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6237786 (2001-05-01), Gintner et al.
Abadi et al, “On Higding Information from an Oracle”, 1989, Journal of Computer and System Sciences, 39, pp. 1-29.
Abadi et al, “Secure Circuit Evaluation”, 1990, Journal of Cryptology, 3, pp. 1-12.
Matsumoto et al, “Speeding Up Secret Computations with Insecure Auxilary Devices”, 1990, Springer-Verlag, pp. 497-506.
Kawamura et al, “Fast Server-Aided Secret Computation Protocols for Modular Exponentiation”, 1993, IEEE, pp. 778-784.
Casanova et al, “Netsolve: A Network Server for Solving Computational Science Problems”, 1996, Univ. Tennesse, pp. 1-14.
Atallah, Mikhail J., Rice, John R.; Secure Outsourcing of Scientific Computations; Dec. 7, 1998.
Atallah, Mikhail J., Pantazopoulos, Konstantinos N., Spafford, Eugene H.; Secure Outsourcing of Some Computations; date of publication unknown.
Atallah Mikhail J.
Pantazopoulos Kostas N.
Rice John R.
Spafford Eugene H.
Miller Ice
Purdue Research Foundation
Smithers Matthew
LandOfFree
Secure computational outsourcing techniques does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure computational outsourcing techniques, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure computational outsourcing techniques will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3396583