H04L9/00

SHARE DOMAIN ARRANGEMENTS FOR MASKED HARDWARE IMPLEMENTATIONS
20230016420 · 2023-01-19 ·

Hardware masking may be used as a countermeasure to make power analysis attacks more difficult. Masking attempts to decouple the secret and/or processed values of a cryptographic algorithm from its intermediate values. One method of masking probabilistically splits each bit of a computation into multiple shares. Mask-share domains (i.e., the wires and gates that perform a computation on a share) are physically spaced to reduce coupling between mask-share domains. The mask-share domains may be connected to the same power supply network. The physical distance between mask-share domains along the power-supply network may be selected to reduce coupling between mask-share domains that may occur via the power supply network. The mask-share domains may each be connected to different on-chip power supply networks.

Application programming interface for certificate management systems

A system can include a certificate application programming interface (API) device that is operable to receive, via an application programming interface (API), an enrollment request for the at least one computerized device. The certificate API device can also generate, via the API, an enrollment package and an end entity certificate package for the at least one computerized device by obtaining the enrollment package and the end entity certificate package from a certificate management service (CMS). The certificate API device can also transmit, via the API, the enrollment package and the end entity certificate package to the at least one computerized device. The system can also include the CMS that is operable to provide the enrollment package and the end entity certificate package to the certificate API device.

ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
20230012779 · 2023-01-19 ·

An electronic device is provided. The electronic device includes a communication interface, a memory for storing at least one instruction and storing a plurality of pieces of transaction information and a plurality of index values corresponding to the plurality of pieces of transaction information, and at least one processor configured to control the electronic device by being connected to the memory, wherein the at least one processor is further configured to execute the at least one instruction to, when a delete request including an index value corresponding to transaction information is received, compare the index value included in the delete request with the plurality of index values stored in the memory, delete transaction information corresponding to the index value included in the delete request from the memory, based on a result of the comparison, generate verification data corresponding to the interface to transmit the generated verification data to an external server included in a blockchain network.

INTERMEDIARY SERVER, SYSTEM, INTERMEDIATING METHOD, AND NON-TRANSITORY RECORDING MEDIUM
20230020412 · 2023-01-19 ·

An intermediary server for intermediating ownership of energy between a supplier and a user, includes circuitry that transmits a first request to another intermediary server capable of requesting a change of ownership of energy to a decentralized ledge system that manages energy information on energy, the first request requesting to change ownership of energy produced by a same production method as a particular production method, from another intermediary agent managing the other intermediary server to an intermediary agent managing the intermediary server.

FILE VERIFICATION SYSTEM AND METHOD
20230224174 · 2023-07-13 ·

A method of using a tree structure overlaid on a blockchain, wherein each node of the tree is a different transaction. The method comprises: inspecting the blockchain to identify at least part of the tree structure, including identifying a target child node which includes a record of a file in the respective payload of that node, and identifying a path comprising one or more edges back through the tree structure from the target child node to the root node. The method then comprises: A) for each edge along the identified path from target child node back to root node, checking that the respective child node is signed by a key associated with the respective parent node, and B) checking that a current instance of the file matches the record included in the target child node. The current instance of the file is verified at least on condition of these checks.

LIGHTWEIGHT DATA STORAGE APPARATUS FOR GRAPHIC BLOCKCHAIN AND METHOD THEREOF
20230015556 · 2023-01-19 ·

The present invention relates to a lightweight data storage apparatus for graphic blockchains, at least comprising a common transaction construction module for a user to initiate new transactions and a network broadcast module for broadcasting the transactions, wherein the apparatus further comprises a combined-transaction constructing module and a transaction deleting module, wherein the combined-transaction constructing module serves to determine whether number of transactions initiated by an account satisfies a first predetermined condition, and if yes, execute a first lightening procedure on the transactions, and the transaction deleting module serves to execute a second lightening procedure on the transactions that have been processed by the first lightening procedure and now have validation references satisfying a second predetermined condition, after which the network broadcast module broadcasts the transactions obtained after the second lightening procedure. With the disclosed transaction-combining and reference-transaction-deleting scheme, data storage overheads of a graphic blockchain can be reduced.

METHOD FOR COOPERATIVE RESOURCE ALLOCATION FOR PERFORMING MOVEMENT MANEUVERS IN A ROAD AREA, AND RELATED CONTROL CIRCUIT AND MOTOR VEHICLE HAVING SUCH A CONTROL CIRCUIT
20230222902 · 2023-07-13 · ·

The present disclosure relates to a method for which a road area is divided into multiple resources and a storage device for reservation data for exclusively reserving the respective resource is provided that is made available to each road user. A control circuit of a respective road user plans a respective movement route over at least one of the resources on the basis of reservation data currently stored in the storage device and takes the planned movement route as a basis for reserving the resources required therefor by generating its own reservation data in the storage device.

Devices, Systems, Software, and Methods for Efficient Data Processing for Fully Homomorphic Encryption, Post-Quantum Cryptography, Artificial Intelligence, and other Applications
20230019214 · 2023-01-19 · ·

Systems, devices, software, and methods of the present invention provide for homomorphically encrypted (HE) and other data represented as polynomials of degree K−1 to be transformed in O(K*log(K)) time into ‘unique-spiral’ representations in which both linear-time (O(K)) addition and linear-time multiplication are supported without requiring an intervening transformation. This capability has never previously been available and enables very significant efficiency improvements, i.e., reduced runtimes, for applications such as Fully Homomorphic Encryption (FHE), Post-Quantum Cryptography (PQC) and Artificial Intelligence (AI). Other efficient operations, such as polynomial division, raising to a power, integration, differentiation and parameter-shifting are also possible using the unique-spiral representations. New methods are introduced based on the unique-spiral representation that have applications to efficient polynomial composition, inversion, and other important topics.

SECURE AND ROBUST FEDERATED LEARNING SYSTEM AND METHOD BY MULTI-PARTY HOMOMORPHIC ENCRYPTION

It is provided a federated learning system for aggregating gradient information representing a result of training an AI model in an edge device, the federated learning system comprising the edge device and a server apparatus, the training module in the edge device being configured to generate an edge switch share in which the encrypted aggregated gradient is encrypted, and to transmit the generated edge switch share to the server apparatus, the encryption/decryption module in the server apparatus being configured to generate an encrypted aggregated gradient for decryption by adding edge switch shares received from the plurality of the edge device, generate an aggregated gradient by decrypting the generated encrypted aggregated gradient for decryption, and to transmit the generated aggregated gradient to the edge device, the training module in the edge device being configured to train the AI model by using the aggregated gradient received from the server apparatus.

System and Method of Providing Physically Authenticated Digital Tracking and Association for Objects and Products
20230019729 · 2023-01-19 ·

A method and system comprising; a physical medium having a first unique identifier and a second unique identifier stored within; where said physical medium is in communication with a first distributed ledger having said first unique identifier associated with said second unique identifier stored within; where said distributed ledger is operatively connected with a first comparison algorithm providing; physical authentication of data associated with additional data elements; further provides mathematical coupling to further additional data which allows for novel visibility and management, including reducing inefficiencies and errors, within physical systems, for example product supply chains, without the need to fully replace current supply chain management systems.