Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2007-11-13
2007-11-13
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C713S153000, C713S165000, C380S255000
Reexamination Certificate
active
09759402
ABSTRACT:
The invention provides a method for encrypting a program for execution on a remote host computer on a network, such that correct execution by the remote host computer is ensured, and such that the remote host computer remains unaware of the computations or data associated with execution. Results from the computations at the remote host computer are transmitted to a control computer, on the network, which decodes the results to useful data representative as output from the program. In a first step of the method, the program is encoded as a unitary matrix multiplication, Uij, of i dimensions by j dimensions. Unis the set of unitary matrices of size n, forms a non-commutative group under matrix multiplication, and has a unique group-invariant Haar measure probability distribution; Uijis thus an element of Un. In a second step, an input data string to the program is encoded as a vector bjof n dimensions. The first and second steps can be performed in either order. In a third step, two independent identically distributed unitary matrices Xij, Yijare generated from the Haar distribution over Un. Preferably, Xij, Yijare randomly generated. In a fourth step, U′ is computed as XUY* and sent to the remote host over the network. In a fifth step, b′ is computed as Yb and sent to the remote host over the network. The fourth and fifth steps can be performed in either order. In a sixth step, the remote host computes the product of XUY* and Yb and sends the result to the control computer on the network. In a seventh step, the control computer computes X*XUb to determine the multiplication of Ub, the desired output of the program.
REFERENCES:
patent: 4417305 (1983-11-01), Berstis
patent: 4847902 (1989-07-01), Hampson
patent: 5007083 (1991-04-01), Constant
patent: 5572219 (1996-11-01), Silverstein et al.
patent: 5677696 (1997-10-01), Silverstein et al.
patent: 5812072 (1998-09-01), Masters
patent: 6317766 (2001-11-01), Grover
patent: 6385727 (2002-05-01), Cassagnol et al.
patent: 6578018 (2003-06-01), Ulyanov
patent: 6631347 (2003-10-01), Kim et al.
patent: 6693976 (2004-02-01), Hassibi et al.
patent: 6801579 (2004-10-01), Hassibi et al.
patent: 6836839 (2004-12-01), Master et al.
patent: 6865237 (2005-03-01), Boariu et al.
patent: 1619820 (2006-01-01), None
patent: WO9805142 (1998-02-01), None
Saner et al. Protecting Mobile Agents Against Malicious Hosts, Feb. 1998, Mobile Agent Security.
O. J. Staffans, Quadratic optimal control of stable well-posed linear systems, Trans. of Amer. Math. Soc. 349 (1997), 3679-3715.
Luo et al, A Novel Symmetric Cryptography Based on the Hybrid Haar Wavelets Encoder and Chaotic Masking Scheme, 2002, IEEE, pp. 933-944.
Delgosha et al, Public-Key Cryptography Using Paraunitary Matrices, 2006, pp. 3489-3504.
Paul R. Halmos, “Haar Measure”, Measure Theory, Chapter XI, 1950, pp. v and 250-265, Van Nostrand Reinhold Company, 450 West 33rd Street, New York, NY 10001.
G. W. Stewart, “The Efficient Generation of Random Orthogonal Matrices with an Application to Condition Estimators”, Society for Industrial and Applied Mathematics, Jun. 1980, pp. 403-409, Slam J. Numer. Anal., vol. 17, No. 3, Department of Computer Science, University of Maryland, College Park, MD 20742.
George Cybenko, article: “Encrypted Execution of Encrypted Programs”, Jan. 22, 2000, pp. 1-11, Thayer School of Engineering, Dartmouth College, Hanover, NH 03755.
Lathrop & Gage LC
Moorthy Aravind K
Sheikh Ayaz
The Trustees of Dartmouth College
LandOfFree
System and methods for encrypted execution of computer programs does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and methods for encrypted execution of computer programs, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and methods for encrypted execution of computer programs will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3806796