Abstract: A system and method for converting an input dataset based on a query received via a user interface into one or more defined range values is provided wherein the input dataset is converted into one or more defined range values based on a conversion value matrix. The present invention provides for encrypting the defined range values of the input dataset into a first cipher text matrix. Further, the present invention provides for encrypting the conversion value matrix into second cipher text matrix. The present invention provides for performing a computation operation between the first cipher text matrix and the second cipher text matrix to generate an aggregated cipher text matrix. The present invention provides for decrypting the aggregated cipher text matrix into a decrypted result matrix. The present invention provides for performing an aggregation operation by counting pre¬defined digit in each column of the decrypted result matrix.
We claim:
1) A system for performing homomorphic aggregation over
encrypted data, wherein the system comprises:
an encryption engine executed by a processor executing program instructions stored in a memory and configured to:
convert an input dataset based on a query received via a user interface into one or more defined range values, wherein the input dataset is converted into one or more defined range values based on a conversion value matrix;
encrypt the defined range values of the input dataset to a first cipher text matrix;
encrypt the conversion value matrix into a second cipher text matrix; and
transmit the first cipher text matrix and the second cipher text matrix to a computation server for generating an aggregated cipher text matrix;
a decryption engine executed by a processor executing program instructions stored in a memory and configured to:
receive the aggregated cipher text matrix from the computation sever;
decrypt the aggregated cipher text matrix into a decrypted result matrix; and
perform an aggregation operation by counting a pre¬defined digit in each column of the decrypted result matrix.
2) The system as claimed in claim 1, wherein the
aggregated cipher text matrix is generated based on a
computation operation performed between the first cipher
text matrix and the second cipher text matrix in the
computation server.
3) The system as claimed in claim 1, wherein the
encryption engine comprises a range conversion unit
configured to convert the input dataset based on the query received from the user interface into defined range values.
4) The system as claimed in claim 3, wherein the range
conversion unit converts the input dataset based on a
condition specified in the query received via the user
interface.
5) The system as claimed in claim 1, wherein the encryption engine comprises an encryption unit configured to encrypt the converted range values of the input dataset to the first cipher text matrix and encrypt the conversion value matrix into the second cipher text matrix.
6) The system as claimed in claim 1, wherein the decryption engine comprises a decryption unit configured to decrypt the aggregated cipher text matrix into the decrypted result matrix.
7) The system as claimed in claim 1, wherein the decryption engine comprises an aggregation unit configured to perform the aggregation operation by counting the pre¬defined digit in each column of the decrypted result matrix, the pre-defined digit being a digit A0'.
8) The system as claimed in claim 1, wherein the system further comprises a key generation unit in communication with the decryption engine and the encryption engine, the key generation unit being configured to generate a secret key for the decryption engine and a public key for the encryption engine.
9) The system as claimed in claim 1, wherein the decryption unit is configured to decrypt the aggregated cipher text matrix using a secret key.
10) The system as claimed in claim 1, wherein the range conversion unit uses the public key to encrypt the defined range values of the input dataset to the first cipher text matrix and encrypt the conversion value matrix into the second cipher text matrix.
11) The system as claimed in claim 1, wherein the encryption engine transmits the first cipher text matrix and the second cipher text matrix to the computation server for generating the aggregated cipher text matrix.
12) A computer implemented method for performing homomorphic aggregation over encrypted data, wherein the method is implemented by at least one processor executing program instructions stored in a memory, the method comprising:
converting an input dataset based on a query received via a user interface into one or more defined range values, wherein the input dataset is converted into one or more defined range values based on a conversion value matrix;
encrypting the defined range values of the input dataset into a first cipher text matrix;
encrypting the conversion value matrix into a second cipher text matrix;
performing a computation operation between the first cipher text matrix and the second cipher text matrix to generate an aggregated cipher text matrix;
decrypting the aggregated cipher text matrix into a decrypted result matrix; and
performing an aggregation operation by counting a pre-defined digit in each column of the decrypted result matrix.
13) The method as claimed in claim 12, wherein the
aggregation operation is performed by counting the pre-
defined digit in each column of the decrypted result matrix, the pre-defined digit being a digit A0'.
14) The method as claimed in claim 12, wherein a secret key is used to decrypt the aggregated cipher text matrix.
15) The method as claimed in claim 12, wherein a public key is used to encrypt the converted range values of the input dataset to the first cipher text matrix and encrypt the conversion value into the second cipher text matrix.
16) The method as claimed in claim 12, wherein the conversion of the input dataset into the defined range values based on the query is as per a condition specified in the query.
| # | Name | Date |
|---|---|---|
| 1 | 201941045254-STATEMENT OF UNDERTAKING (FORM 3) [07-11-2019(online)].pdf | 2019-11-07 |
| 2 | 201941045254-PROOF OF RIGHT [07-11-2019(online)].pdf | 2019-11-07 |
| 3 | 201941045254-POWER OF AUTHORITY [07-11-2019(online)].pdf | 2019-11-07 |
| 4 | 201941045254-FORM 1 [07-11-2019(online)].pdf | 2019-11-07 |
| 5 | 201941045254-DRAWINGS [07-11-2019(online)].pdf | 2019-11-07 |
| 6 | 201941045254-COMPLETE SPECIFICATION [07-11-2019(online)].pdf | 2019-11-07 |
| 7 | 201941045254-FORM 18 [08-11-2019(online)].pdf | 2019-11-08 |
| 8 | Correspondence by Agent_Form1, POA_15-11-2019.pdf | 2019-11-15 |
| 9 | 201941045254-Request Letter-Correspondence [15-11-2019(online)].pdf | 2019-11-15 |
| 10 | 201941045254-Form 1 (Submitted on date of filing) [15-11-2019(online)].pdf | 2019-11-15 |
| 11 | 201941045254-FORM 3 [18-02-2020(online)].pdf | 2020-02-18 |
| 12 | 201941045254-FER.pdf | 2021-10-17 |
| 13 | 201941045254-PETITION UNDER RULE 137 [05-01-2022(online)].pdf | 2022-01-05 |
| 14 | 201941045254-FORM 3 [05-01-2022(online)].pdf | 2022-01-05 |
| 15 | 201941045254-FER_SER_REPLY [06-01-2022(online)].pdf | 2022-01-06 |
| 16 | 201941045254-CLAIMS [06-01-2022(online)].pdf | 2022-01-06 |
| 17 | 201941045254-ABSTRACT [06-01-2022(online)].pdf | 2022-01-06 |
| 18 | 201941045254-US(14)-HearingNotice-(HearingDate-04-03-2024).pdf | 2024-02-21 |
| 19 | 201941045254-FORM-26 [27-02-2024(online)].pdf | 2024-02-27 |
| 20 | 201941045254-Correspondence to notify the Controller [27-02-2024(online)].pdf | 2024-02-27 |
| 21 | 201941045254-Written submissions and relevant documents [11-03-2024(online)].pdf | 2024-03-11 |
| 22 | 201941045254-Information under section 8(2) [11-03-2024(online)].pdf | 2024-03-11 |
| 23 | 201941045254-PETITION UNDER RULE 137 [12-03-2024(online)].pdf | 2024-03-12 |
| 24 | 201941045254-FORM 3 [12-03-2024(online)].pdf | 2024-03-12 |
| 25 | 201941045254-PatentCertificate14-03-2024.pdf | 2024-03-14 |
| 26 | 201941045254-IntimationOfGrant14-03-2024.pdf | 2024-03-14 |
| 1 | Searchstrategy201941045254E_23-06-2021.pdf |