Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing …
S Ahmed - US Patent 10,333,696, 2019 - Google Patents
Partially homomorphic encryption systems may be transformed into fully homomorphic
encryption systems. Input plaintext data are transformed into modified plaintext data using a …
encryption systems. Input plaintext data are transformed into modified plaintext data using a …
A verifiable secret shuffle and its application to e-voting
CA Neff - Proceedings of the 8th ACM conference on Computer …, 2001 - dl.acm.org
We present a mathematical construct which provides a cryptographic protocol to verifiably
shuffle a sequence of k modular integers, and discuss its application to secure, universally …
shuffle a sequence of k modular integers, and discuss its application to secure, universally …
Secure remote electronic voting system and cryptographic protocols and computer programs employed
AR Jorba, JC Roca - US Patent 7,260,552, 2007 - Google Patents
Sako et al, Proc of Crypto'94, LNCS 839, pp. 411-424, 1994, Secure voting using partially
compatible homomorphisms. Cramer et al, Proc of Eurocrypt'96, LNCS 1070, pp. 72-83 …
compatible homomorphisms. Cramer et al, Proc of Eurocrypt'96, LNCS 1070, pp. 72-83 …
Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
CA Neff - US Patent 6,950,948, 2005 - Google Patents
(54) VERIFIABLE, SECRET SHUFFLES OF 5,878,399 A 3/1999 Peralto ENCRYPTED
DATA, SUCH AS ELGAMAL 6,021,200 A 2/2000 Fischer ENCRYPTED DATA FOR SECURE …
DATA, SUCH AS ELGAMAL 6,021,200 A 2/2000 Fischer ENCRYPTED DATA FOR SECURE …
Fully homomorphic encryption
CB Gentry - US Patent 9,083,526, 2015 - Google Patents
In one exemplary embodiment of the invention, a method and computer program include:
receiving first and second cipher texts having first and second data encrypted per an …
receiving first and second cipher texts having first and second data encrypted per an …
System and method for high-density interactive voting using a computer network
JS Huang, I Marriott, CN Von Veh - US Patent 7,921,033, 2011 - Google Patents
In the following description of the invention, reference is made to the accompanying
drawings, which form a part thereof, and in which is shown by way of illustration a specific …
drawings, which form a part thereof, and in which is shown by way of illustration a specific …
Verifiable secret shuffles and their application to electronic voting
CA Neff - US Patent 7,360,094, 2008 - Google Patents
We present a mathematical construct which provides a cryptographic protocol to (verifiably
shuffle) a sequence of (k) modular integers, and discuss its application to secure, universally …
shuffle) a sequence of (k) modular integers, and discuss its application to secure, universally …
Privacy preserving negotiation and computation
S Naor, B Pinkas - US Patent 6,834,272, 2004 - Google Patents
(56) References Cited holding of privacy-protected auctions over computer net US PATENT
DOCUMENTS works because of its high efficiency, requiring only a single round of …
DOCUMENTS works because of its high efficiency, requiring only a single round of …
Zero-knowledge proofs in large trades
C Thorpe, DC Parkes - US Patent App. 12/261,249, 2009 - Google Patents
US20090177591A1 - Zero-knowledge proofs in large trades - Google Patents US20090177591A1
- Zero-knowledge proofs in large trades - Google Patents Zero-knowledge proofs in large …
- Zero-knowledge proofs in large trades - Google Patents Zero-knowledge proofs in large …
Method and apparatus for time-lapse cryptography
MO Rabin, CA Thorpe - US Patent 8,526,621, 2013 - Google Patents
In one embodiment, a Time-Lapse Cryptography Service is provided based on a network of
parties. Senders encrypt their messages with this public key whose secret key is not known …
parties. Senders encrypt their messages with this public key whose secret key is not known …