Patents by Inventor Marc Joye

Marc Joye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11991266
    Abstract: Some embodiments are directed to a fully homomorphic encryption (FHE) cryptography, wherein some encrypted data items are clipped, thereby reducing a bit-size of the encrypted data item and increasing an associated noise level of the encrypted data item. An FHE operation or a decrypt operation that operates on the clipped encrypted data item as input, has noise tolerance above a noise level associated with the clipped encrypted data item.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: May 21, 2024
    Assignee: ZAMA SAS
    Inventor: Marc Joye
  • Publication number: 20240048355
    Abstract: Some embodiments are directed to a computer-implemented method (500) of determining a set of coefficients for homomorphically multiplying an encrypted value by a scalar. The encrypted value is represented by multiple respective value ciphertexts encrypting the value multiplied by respective powers of an even radix. The scalar multiplication is performed as a linear combination of the multiple respective value ciphertexts according to the set of coefficients. The set of coefficients are determined as digits of a radix decomposition of the scalar with respect to the radix. The determined digits lie between minus half the radix, inclusive, and plus half the radix, inclusive. It is ensured that no two subsequent digits are both equal in absolute value to half the radix.
    Type: Application
    Filed: February 15, 2022
    Publication date: February 8, 2024
    Inventor: Marc JOYE
  • Publication number: 20230396409
    Abstract: Some embodiments are directed to a fully homomorphic encryption (FHE) cryptography, wherein some encrypted data items are clipped, thereby reducing a bit-size of the encrypted data item and increasing an associated noise level of the encrypted data item. An FHE operation or a decrypt operation that operates on the clipped encrypted data item as input, has noise tolerance above a noise level associated with the clipped encrypted data item.
    Type: Application
    Filed: October 28, 2021
    Publication date: December 7, 2023
    Inventor: Marc JOYE
  • Publication number: 20230291540
    Abstract: The invention relates to a cryptographic method and variants thereof based on homomorphic encryption enabling the evaluation of real-valued functions on encrypted data, in order to allow carrying out homomorphic processing on encrypted data more broadly and efficiently.
    Type: Application
    Filed: May 14, 2021
    Publication date: September 14, 2023
    Inventors: Pascal Gilbert Yves PAILLIER, Marc JOYE
  • Publication number: 20230188318
    Abstract: The invention relates to a cryptographic method and variants thereof based on homomorphic encryption enabling the evaluation of univariate or multivariate real-valued functions on encrypted data, in order to allow carrying out homomorphic processing on encrypted data more broadly and efficiently.
    Type: Application
    Filed: May 14, 2021
    Publication date: June 15, 2023
    Inventors: Pascal Gilbert Yves PAILLIER, Marc JOYE
  • Patent number: 11586860
    Abstract: A method and data processing system for detecting tampering of a machine learning model is provided. The method includes training a machine learning model. During a training operating period, a plurality of input values is provided to the machine learning model. In response to a predetermined invalid input value, the machine learning model is trained that a predetermined output value will be expected. The model is verified that it has not been tampered with by inputting the predetermined invalid input value during an inference operating period. If the expected output value is provided by the machine learning model in response to the predetermined input value, then the machine learning model has not been tampered with. If the expected output value is not provided, then the machine learning model has been tampered with. The method may be implemented using the data processing system.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: February 21, 2023
    Assignee: NXP B.V.
    Inventors: Fariborz Assaderaghi, Marc Joye
  • Publication number: 20220247551
    Abstract: Methods and systems are provided for evaluating Machine Learning models in a Machine-Learning-As-A-Service context, whereby the secrecy of the parameters of the Machine Learning models and the privacy of the input data fed to the Machine Learning model are preserved as much as possible, while requiring the exchange between a client and an MLaaS server of as few messages as possible. The provided methods and systems are based on the use of additive homomorphic encryption in the context of Machine Learning models that are equivalent to models that are based on the evaluation of an inner product of on the one hand a vector that is a function of extracted client data and on the other hand a vector of model parameters. In some embodiments the client computes an inner product of extracted client data and a vector of model parameters that are encrypted with an additive homomorphic encryption algorithm.
    Type: Application
    Filed: April 23, 2020
    Publication date: August 4, 2022
    Applicant: ONESPAN NV
    Inventors: Marc JOYE, Fabien A. P. PETITCOLAS
  • Patent number: 11100222
    Abstract: A method is provided for protecting a trained machine learning model that provides prediction results with confidence levels. The confidence level is a measure of the likelihood that a prediction is correct. The method includes determining if a query input to the model is an attempted attack on the model. If the query is determined to be an attempted attack, a first prediction result having a highest confidence level is swapped with a second prediction result having a relatively lower confidence level so that the first and second prediction results and confidence levels are re-paired. Then, the second prediction result is output from the model with the highest confidence level. By swapping the confidence levels and outputting the prediction results with the swapped confidence levels, the machine learning model is more difficult for an attacker to extract.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: August 24, 2021
    Assignee: NXP B.V.
    Inventors: Marc Joye, Ahmed Ullah Qureshi
  • Patent number: 10764048
    Abstract: A method for performing a secure evaluation of a decision tree, including: receiving, by a processor of a server, an encrypted feature vector x=(x1, . . . , xn) from a client; choosing a random mask ?0; calculating m0 and sending m0 to the client, wherein m0=xi0(0)?t0(0)+?0 and t0(0) is a threshold value in the first node in the first level of a decision tree ?; performing a comparison protocol on m0 and ?0, wherein the server produces a comparison bit b0 and the client produces a comparison bit b?0; choosing a random bit s0?{0,1} and when s0=1 switching a left and right subtrees of ?; sending b0?s0 to the client; and for each level =1, 2, . . . , d?1 of the decision tree ?, where d is the number of levels in the decision tree ?, perform the following steps: receiving from the client yk where k=0, 1, . . .
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: September 1, 2020
    Assignee: NXP B.V.
    Inventors: Marc Joye, Fariborz Salehi
  • Patent number: 10680818
    Abstract: Various embodiments relate to a method of encrypting a message m using a Paillier cryptosystem, including: computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r?[1, N); computing a first verification value based upon u and N, where u is randomly chosen such that u?[1, N); computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H.
    Type: Grant
    Filed: April 12, 2018
    Date of Patent: June 9, 2020
    Assignee: NXP
    Inventors: Joppe Willem Bos, Marc Joye
  • Patent number: 10652011
    Abstract: A method for producing a white-box implementation of a cryptographic function using garbled circuits, including: producing, by a first party, a logic circuit implementing the cryptographic function using a plurality of logic gates and a plurality of wires; garbling the produced logic circuit, by the first party, including garbling the plurality of logic gates and assigning two garbled values for each of the plurality of wires; and providing a second party the garbled logic circuit and a first garbled circuit input value.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: May 12, 2020
    Assignee: NXP B.V.
    Inventors: Joppe Willem Bos, Jan Hoogerbrugge, Marc Joye, Wilhelmus Petrus Adrianus Johannus Michiels
  • Publication number: 20200143045
    Abstract: A method is provided for protecting a trained machine learning model that provides prediction results with confidence levels. The confidence level is a measure of the likelihood that a prediction is correct. The method includes determining if a query input to the model is an attempted attack on the model. If the query is determined to be an attempted attack, a first prediction result having a highest confidence level is swapped with a second prediction result having a relatively lower confidence level so that the first and second prediction results and confidence levels are re-paired. Then, the second prediction result is output from the model with the highest confidence level. By swapping the confidence levels and outputting the prediction results with the swapped confidence levels, the machine learning model is more difficult for an attacker to extract.
    Type: Application
    Filed: November 5, 2018
    Publication date: May 7, 2020
    Inventors: MARC JOYE, AHMED ULLAH QURESHI
  • Publication number: 20200134391
    Abstract: A method and data processing system for detecting tampering of a machine learning model is provided. The method includes training a machine learning model. During a training operating period, a plurality of input values is provided to the machine learning model. In response to a predetermined invalid input value, the machine learning model is trained that a predetermined output value will be expected. The model is verified that it has not been tampered with by inputting the predetermined invalid input value during an inference operating period. If the expected output value is provided by the machine learning model in response to the predetermined input value, then the machine learning model has not been tampered with. If the expected output value is not provided, then the machine learning model has been tampered with. The method may be implemented using the data processing system.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: FARIBORZ ASSADERAGHI, MARC JOYE
  • Patent number: 10616653
    Abstract: The present disclosure provides a method (1100) and apparatus (702) for inhibiting the interruption of the content being consumed by a user that is provided by an entertainment system. The method (1100) and apparatus (702) of the present disclosure may detect an interruption event and determine, based on the current state of a user, whether the interruption event matches the current state of the user. If the method (1100) and apparatus (702) of the present disclosure determine that the interruption event does not match the current state of the user, the method (1100) and apparatus (702) of the present disclosure may inhibit the interruption of the content being consumed by the user.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: April 7, 2020
    Assignee: InterDigital CE Patent Holdings
    Inventors: Marc Joye, Azin Ashkan, Jaideep Chandrashekar, Alvita Tran, Akshay Pushparaja, Swayambhoo Jain, Shi Zhi, Junyang Qian
  • Patent number: 10601579
    Abstract: A method for performing a secure comparison between a first secret data and a second secret data, including: receiving, by a processor of a first party, encrypted bits of the second secret data y from a second party, where is an integer; computing the Hamming weight h of first secret data x, wherein x has bits; computing the value of a first comparison bit ?A such that ?A=0 when h>?/2?, ?A=1 when h<?/2?, and ?A is randomly selected when h=/2; forming a set of ?/2? indexes that includes at least the indexes i where xi=?A; selecting random invertible scalars ri for each i in and computing c*i=(1+(1?2?A)xi·yi2?A?1·(xj?yj))ri wherein w denotes the homomorphic encryption of w using a cryptographic key of the second party; selecting random invertible scalars r?1 and computing c*?1=(?A·xj?yj)r?1; transmitting ciphertexts c*i in a random order to the second party.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: March 24, 2020
    Assignee: NXP B.V.
    Inventors: Marc Joye, Fariborz Salehi
  • Patent number: 10601578
    Abstract: A method for protecting against faults in a computation of a point multiplication Q=[k]P on an elliptic curve E defined over a prime field p, including: defining an integer r and a group ?={?()|?/r} represented with elements having a group law that coincides with a group law used in the representation for E(p) and isomorphic to an additive group (/r)+ through isomorphism ?; forming a combined group E(p)×?E(p)×(/r)+ which is isomorphic to a cross product of the groups E(p) and (/r)+; selecting an element in /r and defining an element P?=?() in group ?; forming a combined element {circumflex over (P)}=CRT(P,P?) in the group E(p)×?; calculating {circumflex over (Q)}=[k]{circumflex over (P)} in the combined group E(p)×?; calculating k in /r; and checking whether {circumflex over (Q)}?Q?(mod r) where Q?=?(k).
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: March 24, 2020
    Assignee: NXP B.V.
    Inventor: Marc Joye
  • Publication number: 20190332814
    Abstract: A device, including: a memory; a processor configured to implement an encrypted machine leaning model configured to: evaluate the encrypted learning model based upon received data to produce an encrypted machine learning model output; producing verification information; a tamper resistant hardware configured to: verify the encrypted machine learning model output based upon the verification information; and decrypt the encrypted machine learning model output when the encrypted machine learning model output is verified.
    Type: Application
    Filed: April 27, 2018
    Publication date: October 31, 2019
    Inventors: Joppe Willem BOS, Marc Joye
  • Publication number: 20190319791
    Abstract: Various embodiments relate to a method of encrypting a message m using a Paillier cryptosystem, including: computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r?[1, N); computing a first verification value based upon u and N, where u is randomly chosen such that u?[1, N); computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H.
    Type: Application
    Filed: April 12, 2018
    Publication date: October 17, 2019
    Inventors: Joppe Willem BOS, Marc JOYE
  • Patent number: 10411891
    Abstract: A method for computing the distance between two encrypted data vectors using elliptic curve cryptography.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: September 10, 2019
    Assignee: NXP B.V.
    Inventors: Marc Joye, Yan Michalevsky
  • Publication number: 20190190694
    Abstract: A method for performing a secure comparison between a first secret data and a second secret data, including: receiving, by a processor of a first party, encrypted bits of the second secret data y from a second party, where is an integer; computing the Hamming weight h of first secret data x, wherein x has bits; computing the value of a first comparison bit ?A such that ?A=0 when h>?/2?, ?A=1 when h<?/2?, and ?A is randomly selected when h=/2; forming a set of ?/2? indexes that includes at least the indexes i where xi=?A; selecting random invertible scalars ri for each i in and computing c*i=+(1+(1?2?A)xi·yi2?A?1·(xj?yj))ri wherein w denotes the homomorphic encryption of w using a cryptographic key of the second party; selecting random invertible scalars r?1 and computing c*?1=(?A·xj?yj)r?1; transmitting ciphertexts c*i in a random order to the second party.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Marc JOYE, Fariborz SALEHI