Jiahe Helen Wang - Issaquah WA, US Nikita Borisov - Urbana IL, US Qiang Huang - Princeton NJ, US David Jao - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707 5, 707 6, 707 8, 709205, 709220
Abstract:
A method and system for aggregating configuration information from friend devices is provided. The aggregation system attempts to foil attacks on the privacy of data contributed to a request by aggregating data from a cluster of friend devices in such a way that it is difficult for a device in the cluster and an attacking device outside the cluster to determine the contribution of an individual device to the data. The aggregation system of an initiator device may also determine the cardinality of a parameter so that the corresponding parameter vector can have a size large enough to support the number of possible values. The aggregation system determines the cardinality by counting nonzero hash values of the actual values that are provided by the devices.
Systems And Methods For Generation And Validation Of Isogeny-Based Signatures
David Y. Jao - Bellevue WA, US Peter L. Montgomery - Bellevue WA, US Ramarathnam Venkatesan - Redmond WA, US Victor Boyko - Brooklyn NY, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
713176, 380 30
Abstract:
Techniques are described for generating and validating signatures. In an implementation, a method includes generating a signature by utilizing a plurality of isogenies included on a private key and incorporating the signature and a public key on a product, in which the public key is configured to validate the signature.
Randomized Sparse Formats For Efficient And Secure Computation On Elliptic Curves
Ramarathnam Venkatesan - Redmond WA, US David Y. Jao - Bellevue WA, US Peter L. Montgomery - Bellevue WA, US S Ramesh Raju - Bangalore, IN
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/28 H04L 9/30
US Classification:
380 28, 713174, 713189
Abstract:
Techniques are described that facilitate cryptographic operations, such as data encryption, signing and others, encryption using a computerized method for multiplying a scalar by a point. In one implementation, a set of random integers is selected, wherein the set comprises at least one integer selected randomly. A string is configured, based in part on the set of random integers. Output in the form of a product of the scalar and the point is then calculated, based on the string.
A method and system for aggregating configuration information from friend devices is provided. The aggregation system attempts to foil attacks on the privacy of data contributed to a request by aggregating data from a cluster of friend devices in such a way that it is difficult for a device in the cluster and an attacking device outside the cluster to determine the contribution of an individual device to the data. The aggregation system of an initiator device may also determine the cardinality of a parameter so that the corresponding parameter vector can have a size large enough to support the number of possible values. The aggregation system determines the cardinality by counting nonzero hash values of the actual values that are provided by the devices.
Privacy-Preserving Data Aggregation Using Homomorphic Encryption
A method and system for collecting data from devices using a homomorphic encryption of the data is provided. A collection system of a device adds contributions to homomorphically encrypted data and forwards the requests to another device. When the device receives a reply to the request, it uncombines its contribution to the homomorphic encryption of the data. The device then forwards the reply to the previous device. The initiator device ultimately removes its contribution to the encryption and identifies the data.
David Jao - Bellevue WA, US Ramarathnam Venkatesan - Redmond WA, US
International Classification:
H04K001/00
US Classification:
380030000
Abstract:
Techniques are disclosed to provide public-key encryption systems. More particularly, isogenies of Abelian varieties (e.g., elliptic curves in one-dimensional cases) are utilized to provide public-key encryption systems. For example, the isogenies permit the use of multiple curves instead of a single curve to provide more secure encryption. The techniques may be applied to digital signatures and/or identity based encryption (IBE) solutions. Furthermore, the isogenies may be used in other applications such as blind signatures, hierarchical systems, and the like. Additionally, solutions are disclosed for generating the isogenies.
Youtube
Advanced math pre-assessment
This video introduces Coq, a computer program for writing and checking...
Duration:
27m 19s
Davido - Jowo (Official Video)
----------------... Follow Davido: ...
Duration:
2m 57s
Overview of Elliptic Curve Isogenies Based Pu...
David Jao, University of Waterloo...
Duration:
43m 22s
Absolute Beginners Band - Sue (Live) - David ...
Duration:
3m 49s
Aoo Yeshu Mera Sahara an Jao | Brother Daniel...
Aavo Yesu Mera Sahara Ban Javo, Dolle Meri Kishti Kinara Ban Javo. Dr....