H04L2209/04

Distributed ledger-based ad-hoc system, apparatus and method

A system, method and apparatus for routing traffic in ad-hoc networks. A routing blockchain network processes routing node information proposals received from manager nodes of network clusters. Performance metrics of one or more nodes in the system are verified using distributed ledger techniques and provided to the manager nodes as updates to each manager node's routing information. The manager nodes further determine routing paths for ad-hoc communication requests based on an authentication event that defines conditions necessary to route traffic streams in association with a particular resource.

ENCRYPTED HANDSHAKE FOR TRUST VALIDATION BETWEEN TWO APPLICATIONS

In an example embodiment, a framework is provided that provides a secure mechanism to limit misuse of licensed applications. Specifically, a mutual handshake is established, using existing properties of a requesting application, and wraps objects with dynamic parameters, such as a current timestamp, to perform masking, hashing, and encryption for the handshake.

KEY SPLITTING
20170222800 · 2017-08-03 ·

According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.

Method of determining a representation of a product of a first element and a second element of a finite set, method of evaluating a function applied to an element of a finite set and associated devices
09722773 · 2017-08-01 · ·

A method for determining a representation of a product of a first element and a second element is disclosed comprising, picking a random value for each pair of a first integer between 1 and d and a second integer greater than the first integer, adding the random value to the product of a first value and a second value, and adding the result of the first addition and the product of the first value and the second value. Then summing, for each integer between 1 and d, a product of the first and second values associated with the integer, the random values associated with the pairs of which the first integer is the integer concerned, and the values obtained for the pairs of which the second integer is the integer concerned.

System, method and computer-accessible medium for facilitating logic encryption

Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s) at the location(s). The interference graph can be constructed based at least in part on an effect of the location(s) on at least one further location of the IC(s).

METHODS FOR PROTECTING COMPUTER HARDWARE FROM CYBER THREATS
20220045839 · 2022-02-10 ·

A semiconductor intellectual property (IP) core comprising a transformation engine designed and configured to represent each element of a field GF(2.sup.8) using a polynomial of degree no higher than 7+d, where d>0 is a redundancy parameter. Also disclosed in the specification are several other IP cores and several different methods.

METHODS AND APPARATUS FOR EFFICIENTLY IMPLEMENTING A DISTRIBUTED DATABASE WITHIN A NETWORK
20220237312 · 2022-07-28 · ·

An apparatus includes a processor and a memory operatively coupled to the processor and associated with an instance of a distributed database at a first compute device. The processor is configured to select an anonymous communication path. Each blinded public key from a sequence of blinded public keys associated with the anonymous communication path is associated with a pseudonym of a compute device from a set of compute devices that implement the anonymous communication path. The processor is configured to generate an encrypted message encrypted with a first blinded public key. The processor is configured to generate an encrypted data packet including the encrypted message and a compute device identifier associated with a second compute device. The encrypted data packet is encrypted with a second blinded public key. The processor is configured to send the encrypted data packet to a third compute device.

Point cloud scrambling

Scrambling a point cloud (PC), including: receiving the PC in polar coordinates, wherein each point of the PC includes an index; scrambling each point of the PC by translating each point along a radial axis of the polar coordinates by adding a pseudo-random number (PRN) to each point, wherein the PRN is generated using the index and a secret key.

CONSTANT TIME SECURE ARITHMETIC-TO-BOOLEAN MASK CONVERSION
20210406406 · 2021-12-30 ·

A first arithmetic input share and a second arithmetic input share of an initial arithmetically-masked cryptographic value are received. A sequence of operations using the arithmetic input shares and a randomly generated number is performed, where a current operation in the sequence of operations generates a corresponding intermediate value that is used in a subsequent operation. At the end of the sequence of operations, a first Boolean output share and a second Boolean output share are generated. The arithmetic-to-Boolean mask conversion is independent of the input bit length.

EFFICIENT MASKED POLYNOMIAL COMPARISON

Various embodiments relate to a method and system for securely comparing a first and second polynomial, including: selecting a first subset of custom-character coefficients of the first polynomial and a second subset of custom-character corresponding coefficients of the second polynomial, wherein the coefficients of the first polynomial are split into custom-character shares and the first and second polynomials have custom-character coefficients; subtracting the second subset of coefficients from one of the shares of the first subset of coefficients; reducing the number of elements in the first subset of coefficients to custom-character elements by combining groups of custom-character/custom-character elements together; generating a random number for each of the elements of the reduced subset of coefficients; summing the product of each of the elements of the reduced subset of coefficients with their respective random numbers; summing the custom-character shares of the sum of the products; and generating an output indicating that the first polynomial does not equal the second polynomial when the sum does not equal zero.