Patents by Inventor Mirko Schaefer
Mirko Schaefer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11631117Abstract: Disclosed herein are system, method, and computer program product embodiments for pooling requirements, such as placing of multiple purchase orders, while preserving the privacy of the requirements provided by requesters placing the orders. The approach involves receiving first encrypted information comprising a first request from a first client and second encrypted information comprising a second request from a second client. An encrypted intersection result of the first request and the second request can then be calculated using the first encrypted information and the second encrypted information, in their encrypted form without the need to decrypt either.Type: GrantFiled: May 10, 2019Date of Patent: April 18, 2023Assignee: SAP SEInventors: Axel Schroepfer, Kilian Becher, Marcel Muth, Mirko Schaefer
-
Patent number: 11411725Abstract: The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers. Each of multiple data providers provides an encrypted secret input value. A set of shuffling clients, independent of the data providers, participate with a service provider in a secret shuffling of the encrypted secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a rerandomized encrypted secret input value. As a result, the rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: GrantFiled: April 15, 2020Date of Patent: August 9, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11368281Abstract: The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers. Each of multiple clients provides an encrypted client-specific secret input value. A subset of clients are shuffling clients who participate with a service provider in a secret shuffling of the encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value.Type: GrantFiled: April 15, 2020Date of Patent: June 21, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11368296Abstract: The present disclosure involves systems, software, and computer implemented methods for a communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption and oblivious transfer. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values, including use of an oblivious transfer mechanism. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: GrantFiled: April 15, 2020Date of Patent: June 21, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11367148Abstract: A producer may supply amounts xi of a good to a plurality of consumers Ci in a series of transactions and be subject to a mass balancing verification protocol after every K transactions. A producer platform may compute K random shares (r1 through rK) of a random value r, publish blinded amounts ti representing xi+ri to a secure, distributed transaction ledger, and transmit an encrypted ri to consumer Ci using an asymmetric cryptosystem. A consumer platform may receive and decrypt ri (while the consumer Ci actually receives an amount {circumflex over (x)}i of the good from the producer), compute {circumflex over (x)}i+ri and generate a fraud alert signal if it differs from the published ti. The consumer platform may also transmit an encrypted rolling sum value to a next consumer Ci+1. A verifier platform may, after K transactions, execute the mass balance verification protocol to determine a total amount of the good that the producer had collectively supplied to the consumers Ci.Type: GrantFiled: April 16, 2020Date of Patent: June 21, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11356241Abstract: The present disclosure involves systems, software, and computer implemented methods for a verifiable communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations, different blinding values, and use of random secret-shares. A protocol step includes homomorphic operations to shuffle encrypted secret input values so that resulting encrypted secret input values are rerandomized and in a shuffled sequence that is unmapped to an order of receipt by the service provider of the encrypted secret input values.Type: GrantFiled: April 15, 2020Date of Patent: June 7, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11265153Abstract: The present disclosure involves systems, software, and computer implemented methods for verifying encrypted data provider data on a public storage medium. One example method includes receiving a verification request to verify encrypted data provider data stored on a public storage medium. Public storage medium entries relevant to the verification request are identified and retrieved. A homomorphic cryptosystem is used to homomorphically calculate a first encrypted target function result based on encrypted data provider data. The homomorphic cryptosystem and a verifying entity cryptosystem are used to re-encrypt the first encrypted target function result to generate a second encrypted target function result that is encrypted under the verifying entity cryptosystem and not encrypted under the homomorphic cryptosystem.Type: GrantFiled: April 15, 2020Date of Patent: March 1, 2022Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210344489Abstract: The present disclosure involves systems, software, and computer implemented methods for a communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption and oblivious transfer. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values, including use of an oblivious transfer mechanism. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: ApplicationFiled: April 15, 2020Publication date: November 4, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210336764Abstract: The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers. Each of multiple clients provides an encrypted client-specific secret input value. A subset of clients are shuffling clients who participate with a service provider in a secret shuffling of the encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value.Type: ApplicationFiled: April 15, 2020Publication date: October 28, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210336778Abstract: The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers. Each of multiple data providers provides an encrypted secret input value. A set of shuffling clients, independent of the data providers, participate with a service provider in a secret shuffling of the encrypted secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a rerandomized encrypted secret input value. As a result, the rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: ApplicationFiled: April 15, 2020Publication date: October 28, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210328762Abstract: The present disclosure involves systems, software, and computer implemented methods for a verifiable communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations, different blinding values, and use of random secret-shares. A protocol step includes homomorphic operations to shuffle encrypted secret input values so that resulting encrypted secret input values are rerandomized and in a shuffled sequence that is unmapped to an order of receipt by the service provider of the encrypted secret input values.Type: ApplicationFiled: April 15, 2020Publication date: October 21, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210327002Abstract: A producer may supply amounts xi of a good to a plurality of consumers Ci in a series of transactions and be subject to a mass balancing verification protocol after every K transactions. A producer platform may compute K random shares (r1 through rK) of a random value r, publish blinded amounts ti representing xi+ri to a secure, distributed transaction ledger, and transmit an encrypted ri to consumer Ci using an asymmetric cryptosystem. A consumer platform may receive and decrypt ri (while the consumer Ci actually receives an amount {circumflex over (x)}i of the good from the producer), compute {circumflex over (x)}i+ri and generate a fraud alert signal if it differs from the published ti. The consumer platform may also transmit an encrypted rolling sum value to a next consumer Ci+1. A verifier platform may, after K transactions, execute the mass balance verification protocol to determine a total amount of the good that the producer had collectively supplied to the consumers Ci.Type: ApplicationFiled: April 16, 2020Publication date: October 21, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210328778Abstract: The present disclosure involves systems, software, and computer implemented methods for verifying encrypted data provider data on a public storage medium. One example method includes receiving a verification request to verify encrypted data provider data stored on a public storage medium. Public storage medium entries relevant to the verification request are identified and retrieved. A homomorphic cryptosystem is used to homomorphically calculate a first encrypted target function result based on encrypted data provider data. The homomorphic cryptosystem and a verifying entity cryptosystem are used to re-encrypt the first encrypted target function result to generate a second encrypted target function result that is encrypted under the verifying entity cryptosystem and not encrypted under the homomorphic cryptosystem.Type: ApplicationFiled: April 15, 2020Publication date: October 21, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20210328763Abstract: The present disclosure involves systems, software, and computer implemented methods for a communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: ApplicationFiled: April 15, 2020Publication date: October 21, 2021Inventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Patent number: 11133922Abstract: The present disclosure involves systems, software, and computer implemented methods for a communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.Type: GrantFiled: April 15, 2020Date of Patent: September 28, 2021Assignee: SAP SEInventors: Kilian Becher, Axel Schroepfer, Mirko Schaefer
-
Publication number: 20200357031Abstract: Disclosed herein are system, method, and computer program product embodiments for pooling requirements, such as placing of multiple purchase orders, while preserving the privacy of the requirements provided by requesters placing the orders. The approach involves receiving first encrypted information comprising a first request from a first client and second encrypted information comprising a second request from a second client. An encrypted intersection result of the first request and the second request can then be calculated using the first encrypted information and the second encrypted information, in their encrypted form without the need to decrypt either.Type: ApplicationFiled: May 10, 2019Publication date: November 12, 2020Inventors: Axel Schroepfer, Kilian Becher, Marcel Muth, Mirko Schaefer