AK Tueno, Y Boev, F Kerschbaum - US Patent App. 16/573,813, 2021 - Google Patents
BACKGROUND [0002] Machine learning (ML) classifiers are valuable tools in many areas such as healthcare, finance, spam filtering, intrusion detection, remote diagnosis, etc. To per …
P Kolte, S Jackson, PR Shanmugavelayutham… - US Patent …, 2021 - Google Patents
US11190339B2 - System and method for performing equality and less than operations on encrypted data with quasigroup operations - Google Patents US11190339B2 - System and …
F Kerschbaum, A Schroepfer - US Patent App. 13/920,937, 2014 - Google Patents
Secure multi-party computation may be performed utilizing mixed protocols in order to improve performance. In particu lar, embodiments implementing mixed protocols can reduce …
Techniques and architectures may be used to provide an environment where a data owner storing private encrypted data in a cloud and a data evaluator may engage in a secure …
A method and system for privacy-preserving ridge regression using masks is provided. The method includes the steps of requesting a garbled circuit from a crypto service provider …
A Nicholls - US Patent 10,257,173, 2019 - Google Patents
The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer based methods of sharing information securely, in particular an …
OP Masters, HC Hunt, FA Bergamaschi… - US Patent …, 2022 - Google Patents
Various embodiments are provided for performing weighted partial matching under homomorphic encryption in a com puting environment. Selected data may be encoded and …
N Gama, J Brandt, D Jetchev, S Peceny… - US Patent App. 16 …, 2020 - Google Patents
A method for performing privacy-preserving or secure multi-party computations enables multiple parties to collaborate to produce a shared result while preserving the privacy of …
VM Kulkarni, RS Arora, P Krishnan… - US Patent …, 2022 - Google Patents
In a secure multi-party computation (sMPC) system, a super mask is constructed using a set of masks corresponding to a set of data contributors. Each data contributor uses a …