Search

Qingji Zheng Phones & Addresses

  • Palo Alto, CA
  • San Antonio, TX
  • Sunnyvale, CA
  • Plano, TX
  • Pittsburgh, PA
  • Santa Clara, CA

Work

Company: The university of texas at san antonio Position: None

Industries

Higher Education

Resumes

Resumes

Qingji Zheng Photo 1

None

View page
Location:
San Antonio, TX
Industry:
Higher Education
Work:
The University of Texas at San Antonio
None

Publications

Us Patents

Method And System For Secure Multiparty Cloud Computation

View page
US Patent:
20130275752, Oct 17, 2013
Filed:
Apr 17, 2012
Appl. No.:
13/449216
Inventors:
Xinwen Zhang - San Jose CA, US
Qingji Zheng - San Antonio TX, US
Guoqiang Wang - Santa Clara CA, US
Assignee:
FUTUREWEI TECHNOLOGIES, INC. - Plano TX
International Classification:
H04L 29/06
US Classification:
713167
Abstract:
One embodiment of the present invention provides a system for performing secure multiparty cloud computation. During operation, the system receives multiple encrypted datasets from multiple clients. An encrypted dataset associated with a client is encrypted from a corresponding plaintext dataset using a unique, client-specific encryption key. The system re-encrypts the multiple encrypted datasets to a target format, evaluates a function based on the re-encrypted multiple datasets to produce an evaluation outcome, and sends the evaluation outcome to the multiple clients, which are configured to cooperatively decrypt the evaluation outcome to obtain a plaintext evaluation outcome.

Method For Faster Secure Multiparty Inner Product With Spdz

View page
US Patent:
20200228325, Jul 16, 2020
Filed:
Dec 13, 2018
Appl. No.:
16/632494
Inventors:
- Stuttgart, DE
Qingji ZHENG - Pittsburgh PA, US
Jorge GUAJARDO MERCHAN - Pittsburgh PA, US
International Classification:
H04L 9/08
H04L 9/00
H04L 9/32
G06N 20/00
G06F 17/16
Abstract:
A method for implementing a secure multiparty inner product computation between two parties using an SPDZ protocol involves having a first party and a second party compute, for i=k, a vector (I)=(II) based on a vector (x={, . . . , x}), and a vector (w={W, W}), respectively, where (I)=(XX) (III)=WW, N is the total number of elements in the vectors k=N/2. The vectors (I), and (III) are securely shared between the parties. The parties then jointly compute SPDZ protocol Add([w], [x]) and Add([w], [x]) to determine shares [w+x] and [w+x] respectively, and then compute, for i= k, inner product shares [d] by performing SPDZ protocol Mult([w+x], [w+x]). SPDZ protocol ([Add d],. . . , [d], −(IV), . . . , −(V), −(VI), −, (VII)) is

Method For Faster Secure Multiparty Inner Product Computation With Spdz

View page
US Patent:
20200186528, Jun 11, 2020
Filed:
Sep 25, 2018
Appl. No.:
16/618622
Inventors:
- Stuttgart, DE
Qingji Zheng - Pittsburgh PA, US
Jorge Guajardo Merchan - Pittsburgh PA, US
International Classification:
H04L 29/06
G06F 17/16
Abstract:
A method for secure multiparty computation of an inner product includes performing multiparty additions to generate a first sum share and a second sum share between two shares of alternating elements from corresponding pairs of elements in a first vector and a second vector, performing multiparty multiplications with at least one other node to generate inner product pair shares corresponding to products of the first sum shares and the second sum shares corresponding to pairs of elements in the first and second vectors, and performing another multiparty addition of each inner product pair share with a first negated shares of pair products corresponding to pairs of elements in the first vector and a second negated shares of pair products corresponding to pairs of elements in the second vector to generate a share of an inner product of the first and second vectors.

Method And System For Fuzzy Keyword Search Over Encrypted Data

View page
US Patent:
20200125563, Apr 23, 2020
Filed:
Dec 27, 2017
Appl. No.:
16/474721
Inventors:
- Stuttgart, DE
Qingji Zheng - Pittsburgh PA, US
International Classification:
G06F 16/2458
G06F 16/22
G06F 16/2455
H04L 9/08
Abstract:
A method for performing a fuzzy search in encrypted data includes receiving an encrypted search token corresponding to a search keyword with an untrusted server computing device and generating inner product values based on a function-hiding inner product encryption operation of the encrypted query vectors encrypted node vectors in an encrypted tree stored in the memory of the untrusted server computing device. The method further includes transmitting, with the untrusted server computing device, the encrypted keyword stored in the leaf node to a client computing device in response to the first inner product value exceeding a first predetermined similarity threshold corresponding to a similarity of the first query vector to the leaf node vector, the fuzzy search not revealing plaintext contents for any of a keyword stored in the leaf node, the search keyword, or a fuzziness parameter.

Method And System For Dynamic Searchable Symmetric Encryption With Forward Privacy And Delegated Verifiability

View page
US Patent:
20190278939, Sep 12, 2019
Filed:
Jul 25, 2017
Appl. No.:
16/319556
Inventors:
- Stuttgart, DE
Qingji Zheng - Pittsburgh PA, US
Lei Yang - Lawrence KS, US
International Classification:
G06F 21/62
H04L 9/08
H04L 9/32
G16H 10/60
Abstract:
A DSSE architecture network enables multi-user such as data owners and data users to conduct privacy-preserving search on the encrypted PHIs stored in a cloud network and verify the correctness and completeness of retrieved search results simultaneously is provided. The data owners and data users may be patients, HSPs, or combination thereof. An IoT gateway aggregates periodically collected data into a single PHI file, extract keywords, build an encrypted index, and encrypt the PHI files before the encrypted index and PHI files are transmitted to a cloud network periodically for storage thus enable the DSSE architecture network to achieve a sub-linear search efficiency and forward privacy by maintaining an increasing counter for each keyword at the IoT gateway. Since the PHI files are always transmitted and added/stored into the cloud storage over the cloud network, file deletion, file modification is eliminated. The cloud network therefore does not need to learn whether the newly stored PHI files contain specific keywords. Any number of HSPs such as data users provides healthcare services for the patient by searching, querying, and/or retrieving user's encrypted PHIs incrementally stored on the cloud network in a privacy and verifiable manner. The patient delegated verifiability is derived from a combination of a Bloom filter and aggregate message authentication code.

Searchable Symmetric Encryption System And Method Of Processing Inverted Index

View page
US Patent:
20190190709, Jun 20, 2019
Filed:
Aug 24, 2017
Appl. No.:
16/327374
Inventors:
Qingji ZHENG - Pittsburgh PA, US
Xinxin FAN - Pittsburgh PA, US
Jorge GUAJARDO MERCHAN - Pittsburgh PA, US
- Stuttgart, DE
International Classification:
H04L 9/08
G06F 16/903
Abstract:
A searchable symmetric encryption (SSE) system and method of processing inverted index is provided. The SSE system includes genKey, buildSecureIndex, genToken, and search operations. A compress X is integrated into at least one of the buildSecureIndex and search operations. The compress then X takes each entry of an encrypted index, compresses entry of the encrypted index into a compressed entry, and then processes the compressed entry with a function. The function comprises a linked list function and on array function. The search operation decompresses the processed entry and output the decompressed entry. The SSE comprises a client device and a server. The genKey, buildSecureIndex, and genToken operations are integrated into the client device and the search operation is integrated into the server.

Verification Of Fragmented Information Centric Network Chunks

View page
US Patent:
20180219871, Aug 2, 2018
Filed:
Feb 1, 2017
Appl. No.:
15/422004
Inventors:
- Plano TX, US
Qingji Zheng - Sunnyvale CA, US
Ravishankar Ravindran - San Ramon CA, US
International Classification:
H04L 29/06
G06F 21/64
Abstract:
Methods, apparatus, and systems are provided for lightweight integrity verification of fragmented chunks in an information centric network. One aspect provides a method of securely providing data. A data file is segmented into multiple chunks of data, and each of the multiple chunks is divided into virtual fragments based on a maximum transmission unit size. Hash values are calculated using the virtual fragments, and a manifest is created using the hash values. In various embodiments, the manifest is provided to a consumer based on a received interest for comparison and integrity verification of virtual fragments.

Secure Content Sharing Using Content Centric Approach

View page
US Patent:
20170201375, Jul 13, 2017
Filed:
Jan 8, 2016
Appl. No.:
14/991303
Inventors:
- Plano TX, US
Ravishankar Ravindran - San Ramon CA, US
Qingji Zheng - Pittsburgh PA, US
International Classification:
H04L 9/32
H04L 29/06
Abstract:
A network enabled computer system includes a processor and a dual stack communication module to couple to a network. The dual stack communication module includes information centric network layers and a secure network connection layer, each coupled to an IP connection layer to couple to a network. A storage device is coupled to the processor to cause the processor to execute operations to route IP packets. The operations include establishing a secure connection using the secure connection layer, performing authentication via the secure connection using the secure connection layer, exchanging an encryption key via the secure connection using the secure connection layer, and transferring encrypted chunks of data using information centric network IP-content packets via the information centric network layers.
Qingji Zheng from Palo Alto, CA, age ~43 Get Report