Patent classifications
H04L9/36
SYSTEM AND METHOD FOR STORING THE LOCATION ON A BLOCKCHAIN OF A HASH OF A DIGITAL ITEM WITHIN SAID DIGITAL ITEM
A system and method is presented for storing a location on a blockchain of a hash, such as a cryptographic hash, digital fingerprint, or digest, of a digital item, such as a document, file, sound clip, or computer code, within the digital item itself. The blockchain may be used for providing a provenance of the digital item by generating the hash of the digital item and submitting it within a transaction to the blockchain. The system and method presented allow the location of the hash within the blockchain to be embedded within the digital item before said hash is generated and submitted, providing a clear link between a record of the hash and the digital item in question, and reducing the computational and network resources required to verify the provenance of the digital item.
SYSTEM AND METHOD FOR STORING THE LOCATION ON A BLOCKCHAIN OF A HASH OF A DIGITAL ITEM WITHIN SAID DIGITAL ITEM
A system and method is presented for storing a location on a blockchain of a hash, such as a cryptographic hash, digital fingerprint, or digest, of a digital item, such as a document, file, sound clip, or computer code, within the digital item itself. The blockchain may be used for providing a provenance of the digital item by generating the hash of the digital item and submitting it within a transaction to the blockchain. The system and method presented allow the location of the hash within the blockchain to be embedded within the digital item before said hash is generated and submitted, providing a clear link between a record of the hash and the digital item in question, and reducing the computational and network resources required to verify the provenance of the digital item.
Data determination apparatus, data determination method, and computer readable medium
A data determination apparatus of the present invention includes a state transition model storage unit to store a state transition model representing a state transition, a state management unit to hold an operating state of an own apparatus based on the state transition model, a communication permission list storage unit to store, as a communication permission list, communication permitted data whose communications are permitted in respective operating states, a communication unit to obtain communication determination data, and a determination unit to determine whether or not the communication determination data is communication permitted data whose communication has been permitted in a current operating state, using the current operating state and the communication permission list.
Data determination apparatus, data determination method, and computer readable medium
A data determination apparatus of the present invention includes a state transition model storage unit to store a state transition model representing a state transition, a state management unit to hold an operating state of an own apparatus based on the state transition model, a communication permission list storage unit to store, as a communication permission list, communication permitted data whose communications are permitted in respective operating states, a communication unit to obtain communication determination data, and a determination unit to determine whether or not the communication determination data is communication permitted data whose communication has been permitted in a current operating state, using the current operating state and the communication permission list.
METHODS AND DEVICES FOR ESTIMATING SECRET VALUES
A secret value estimation device is provided for determining an estimate of at least one secret value used by at least one cryptographic mechanism implemented in a cryptographic system from a statistical distribution of a set of multivariate leakage traces determined by a leakage traces statistical distribution unit. Each leakage trace being a vector comprises a plurality of random values, the number of said random values being an integer number superior or equal to 1, the statistical distribution being a function of parametric linear combinations of a set of leakage model basis vectors representing a multivariate leakage model, the number of basis vectors being an integer number superior or equal to 1, and the linear combinations being defined by a matrix of real values.
METHODS AND DEVICES FOR ESTIMATING SECRET VALUES
A secret value estimation device is provided for determining an estimate of at least one secret value used by at least one cryptographic mechanism implemented in a cryptographic system from a statistical distribution of a set of multivariate leakage traces determined by a leakage traces statistical distribution unit. Each leakage trace being a vector comprises a plurality of random values, the number of said random values being an integer number superior or equal to 1, the statistical distribution being a function of parametric linear combinations of a set of leakage model basis vectors representing a multivariate leakage model, the number of basis vectors being an integer number superior or equal to 1, and the linear combinations being defined by a matrix of real values.
Group service implementation method and device, equipment and storage medium
Provided are a group service implementation method and device, an equipment and a storage medium. The specific solution is described below. A service transaction request is acquired. In response to the service transaction request including to-be-authenticated data and a threshold signature, a signature group corresponding to the threshold signature is determined. Group information of the signature group is acquired by querying a blockchain, where the signature group includes at least two members, the at least two members of the signature group are used for authenticating the to-be-authenticated data by adopting secure multi-party computation and generating the threshold signature for the to-be-authenticated data by adopting a signature private key, and the group information includes at least a verification public key of the threshold signature. The threshold signature is verified by adopting the verification public key in the group information.
DATA COMMUNICATION DEVICE, COMMUNICATION SYSTEM, DATA RELAY METHOD, AND RECORDING MEDIUM WITH STORED PROGRAM
A data communication device includes a first communicator that receives encrypted data; a second communicator that transmits the encrypted data; an identification information acquisition unit that, when the first communicator has received information for encryption that is used for establishing encrypted communications including encrypted part and plaintext part where the plaintext part includes identification information of a transmission source of the encrypted data, acquires the identification information from the information for encryption; and a configurator that sets data transmission of the second communicator, based on the identification information.
Flexible provisioning of attestation keys in secure enclaves
A computing platform implements one or more secure enclaves including a first provisioning enclave to interface with a first provisioning service to obtain a first attestation key from the first provisioning service, a second provisioning enclave to interface with a different, second provisioning service to obtain a second attestation key from the second provisioning service, and a provisioning certification enclave to sign first data from the first provisioning enclave and second data from the second provisioning enclave using a hardware-based provisioning attestation key. The signed first data is used by the first provisioning enclave to authenticate to the first provisioning service to obtain the first attestation key and the signed second data is used by the second provisioning enclave to authenticate to the second provisioning service to obtain the second attestation key.
SELF-TEST OF AN ASYNCHRONOUS CIRCUIT
An indication of an operating mode of an asynchronous circuit may be received. A determination may be made as to whether the operating mode of the asynchronous circuit corresponds to a self-test of the asynchronous circuit. In response to determining that the operating mode of the asynchronous circuit corresponds to the self-test, a first clock signal may be provided to a first portion of a self-test component in a feedback path of the asynchronous circuit and a second clock signal may be provided to a second portion of the self-test component in the feedback path of the asynchronous circuit. Furthermore, a test value may be generated based on the first clock signal and the second clock signal.