Patents by Inventor Yee Yeo

Yee Yeo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250094791
    Abstract: A computing system determines a maximum field size for a field containing values of quantized versions of a weight matrix, an input data matrix, and a bias matrix and determines a weight upper bound of scaling factors for the weight matrix based on values of the weight matrix, an input data upper bound of scaling factors for the input data matrix based on values of the input data matrix, and a bias upper bound of scaling factors for the bias matrix based on values of the bias matrix. The computing system also sets a weight scaling factor of the weight matrix, an input data scaling factor of the input data matrix, and a bias scaling factor for the bias matrix in two different cases: when the sum is less than or equal to the bias upper bound and when the sum is greater than the bias upper bound.
    Type: Application
    Filed: June 28, 2024
    Publication date: March 20, 2025
    Inventors: Foo Yee YEO, Yasaman KESHTKARJAHROMI, Paul Roger HEATH
  • Publication number: 20250097028
    Abstract: A computing system cryptographically generates an intermediate message authentication code as a function of the message and a cryptographic key assigned to a first party. The computing system also generates a first instance of an aggregate message authentication code corresponding to the message by combining the intermediate message authentication code with one or more other intermediate message authentication codes of one or more second parties. Each code of the one or more other intermediate message authentication codes is cryptographically generated as a function of the message and individual cryptographic key assigned to each of the one or more second parties.
    Type: Application
    Filed: June 28, 2024
    Publication date: March 20, 2025
    Inventors: Nolan Ashvin MIRANDA, Foo Yee YEO, Hwei Ming Jason YING
  • Publication number: 20240421983
    Abstract: Evolving function secret sharing is performed on a given function by multiple share parties, A dealer selects a random vector for each share party corresponding to an arrival order. The dealer generates an array of function shares for each share party of the set, each array including a function share based on the random vector corresponding to the share party and one or more function shares cryptographically generated based on the random vector corresponding to each previously-arrived share party. The dealer distributes an array of the function shares to each share party, wherein a first function share result resulting from a computation of a first function share on given input data and at least a second function share result resulting from a computation of a second function share on the given input data are combinable to yield a result of the given function executed on the given input data.
    Type: Application
    Filed: June 13, 2024
    Publication date: December 19, 2024
    Inventors: Foo Yee YEO, Hwei Ming Jason YING, Nolan Ashvin MIRANDA
  • Publication number: 20240330485
    Abstract: A private set intersection protocol in which a third party may determine intersections of a first set of a first party and a second set of a second party. The third party may not obtain any information regarding the first set or the second set other than the intersection result. The protocol may be communicatively efficient and computationally efficient to allow for secure private set intersection to be performed.
    Type: Application
    Filed: March 27, 2024
    Publication date: October 3, 2024
    Inventors: Foo Yee YEO, Jason Hwei Ming YING
  • Publication number: 20240223359
    Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
    Type: Application
    Filed: March 19, 2024
    Publication date: July 4, 2024
    Inventors: Foo Yee YEO, Vipin Singh SEHRAWAT
  • Patent number: 11956350
    Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: April 9, 2024
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Foo Yee Yeo, Vipin Singh Sehrawat
  • Patent number: 11907392
    Abstract: A function is decomposed into a plurality of function shares. The function returns a Boolean result based on whether an input y satisfies a query on a data set. The function shares hide the function from non-collaborating entities that separately execute the function shares. Each of the functions shares are sent to one of a plurality of servers having a same data set. The function shares are executed on the data set at the servers to obtain a respective plurality of shares. A conditional disclosure of secrets operation is simulated on the shares and the input y. The conditional disclosure of secrets operation uses a secret known to at least one of the servers, and further uses a source of randomness shared between the servers. A Boolean value corresponding to the Boolean result is returned based on the conditional disclosure of secrets operation returning the secret.
    Type: Grant
    Filed: May 12, 2021
    Date of Patent: February 20, 2024
    Assignee: Seagate Technology LLC
    Inventors: Nolan Miranda, Vipin Singh Sehrawat, Foo Yee Yeo
  • Patent number: 11882211
    Abstract: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: January 23, 2024
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Foo Yee Yeo, Nolan Miranda, Vipin Singh Sehrawat
  • Publication number: 20230379144
    Abstract: Cryptographic sharing of a cryptographic secret among multiple parties provides a share of the cryptographic secret is generated for each party. Multiple threshold access structure tokens are generated for each party of the multiple parties. The threshold access structure tokens are generated for a party from one or more random token polynomials selected from a finite field based on the numbers of the multiple parties capable of attempting to reconstruct the cryptographic secret. The share of the cryptographic secret and the multiple threshold access structure tokens generated for each party are distributed to the corresponding party. At least a threshold number of the parties can reconstruct the cryptographic secret using the shares of the cryptographic secret and threshold access structure tokens corresponding to at least a threshold number of the parties attempting to reconstruct the cryptographic secret while less than the threshold number of parties cannot reconstruct the cryptographic secret.
    Type: Application
    Filed: May 19, 2022
    Publication date: November 23, 2023
    Inventor: Foo Yee YEO
  • Patent number: 11711212
    Abstract: A method includes receiving, in a data storage device, a request from a client computer for a portion of ciphertext stored in the data storage device, and providing, by a controller of the data storage device, the portion of the ciphertext to the client computer. The method also includes receiving, in the data storage device, an update token generated by the client computer from the portion of the ciphertext. The method further includes performing, by the controller of the data storage device, re-encryption of the ciphertext using the update token.
    Type: Grant
    Filed: February 17, 2021
    Date of Patent: July 25, 2023
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Foo Yee Yeo, Saravanan Nagarajan, Vipin Singh Sehrawat, Kian Beng Lim
  • Publication number: 20230143175
    Abstract: In one implementation, the disclosure provides systems and methods for a multi-party secret sharing protocol that is device specific in that the secret matrix used herein is tied to individual computing devices.
    Type: Application
    Filed: October 29, 2021
    Publication date: May 11, 2023
    Inventors: Vipin Singh SEHRAWAT, Dmitriy VASSILYEV, Foo Yee YEO
  • Publication number: 20230102012
    Abstract: Polynomial function secret sharing provides for computation of reconstruction share results for a polynomial function on an input. An allocatable share of the polynomial function is received at a computing system of the share result computation systems. The allocatable share is generated from the polynomial function. Each of the allocatable shares is distributed to a unique share result computation system of the share result computation systems. Each allocatable share includes a share element for each coefficient in the polynomial function, wherein the share elements for a coefficient across the share result computation systems summing to the coefficient. A reconstruction share result is generated at the computing system by computing a dot product of the input and the allocatable share received by the computing system. A combination of the reconstruction share results generated by the share result computation systems yields a reconstructed result of the polynomial function on the input.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Nolan MIRANDA, Vipin Singh SEHRAWAT, Foo Yee YEO
  • Publication number: 20230095443
    Abstract: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 30, 2023
    Inventors: Foo Yee YEO, Nolan MIRANDA, Vipin Singh SEHRAWAT
  • Patent number: 11522672
    Abstract: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: December 6, 2022
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Vipin Singh Sehrawat, Foo Yee Yeo
  • Patent number: 11515996
    Abstract: A homomorphic encryption system receives a ciphertext output of an arithmetic evaluation function. The arithmetic evaluation function is performed on a ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. The ciphertext output is decrypted using a summation of two or more noise-canceling party identifiers of two or more authorized parties, wherein the intersection property of the sets cancels out errors generated during the decrypting operation for the two or more authorized parties.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: November 29, 2022
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Vipin Singh Sehrawat, Foo Yee Yeo
  • Publication number: 20220374539
    Abstract: A function is decomposed into a plurality of function shares. The function returns a Boolean result based on whether an input y satisfies a query on a data set. The function shares hide the function from non-collaborating entities that separately execute the function shares. Each of the functions shares are sent to one of a plurality of servers having a same data set. The function shares are executed on the data set at the servers to obtain a respective plurality of shares. A conditional disclosure of secrets operation is simulated on the shares and the input y. The conditional disclosure of secrets operation uses a secret known to at least one of the servers, and further uses a source of randomness shared between the servers. A Boolean value corresponding to the Boolean result is returned based on the conditional disclosure of secrets operation returning the secret.
    Type: Application
    Filed: May 12, 2021
    Publication date: November 24, 2022
    Inventors: Nolan Miranda, Vipin Singh Sehrawat, Foo Yee Yeo
  • Publication number: 20220329410
    Abstract: A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 13, 2022
    Inventors: Foo Yee YEO, Vipin Singh SEHRAWAT
  • Publication number: 20220263654
    Abstract: A method includes receiving, in a data storage device, a request from a client computer for a portion of ciphertext stored in the data storage device, and providing, by a controller of the data storage device, the portion of the ciphertext to the client computer. The method also includes receiving, in the data storage device, an update token generated by the client computer from the portion of the ciphertext. The method further includes performing, by the controller of the data storage device, re-encryption of the ciphertext using the update token.
    Type: Application
    Filed: February 17, 2021
    Publication date: August 18, 2022
    Inventors: Foo Yee Yeo, Saravanan Nagarajan, Vipin Singh Sehrawat, Kian Beng Lim
  • Publication number: 20220255720
    Abstract: A homomorphic encryption system receives a ciphertext output of an arithmetic evaluation function. The arithmetic evaluation function is performed on a ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. The ciphertext output is decrypted using a summation of two or more noise-canceling party identifiers of two or more authorized parties, wherein the intersection property of the sets cancels out errors generated during the decrypting operation for the two or more authorized parties.
    Type: Application
    Filed: February 1, 2021
    Publication date: August 11, 2022
    Inventors: Vipin Singh SEHRAWAT, Foo Yee YEO
  • Publication number: 20220247550
    Abstract: A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result.
    Type: Application
    Filed: February 1, 2021
    Publication date: August 4, 2022
    Inventors: Vipin Singh SEHRAWAT, Foo Yee YEO