AsiaIPEX is a one-stop-shop for players in the IP industry, facilitating IP trade and connection to the IP world. Whether you are a patent owner interested in selling your IP, or a manufacturer looking to buy technologies to upgrade your operation, you will find the portal a useful resource.

Processing encrypted data without decryption or encryption

Technology Benefits
Confidential data can be processed by a third party without decryption thus maintaining security. Impervious to examination by a hostile adversary.
Detailed Technology Description
Processor s configured in this manner will be bespoke configurable for each encryption. The arithmetic tables particular to the encryption are be loaded into fast static memory on the processor in order to service a client who uses a particular private encryption. The client does not reveal the encryption by posting the tables. A processor of this kind can also be run in emulation, as a piece of software, and the same desirable properties accrue. Working in this way, it appears to be a suitably secure means for executing private processes in a cloud computing context. It is envisaged that an encrypted program and encrypted data and the encrypted arithmetic tables are process by the cloud, and encrypted results are returned.
*Abstract
Currently encrypted data needs to be decrypted before data processing such as arithmetic calculations can be carried out. If the data owner is relying on a third party to carry out this processing the potential exists for a breach of data security.
*Principal Investigator

Name: Dr. Peter Breuer

Department:

Country/Region
USA

For more information, please click Here
Mobile Device