Patent classifications
H04L2209/08
TIME AND FREQUENCY DOMAIN SIDE-CHANNEL LEAKAGE SUPPRESSION USING INTEGRATED VOLTAGE REGULATOR CASCADED WITH RUNTIME CRYPTO ARITHMETIC TRANSFORMATIONS
Apparatus and method for resisting side-channel attacks on cryptographic engines are described herein. An apparatus embodiment includes a cryptographic block coupled to a non-linear low-dropout voltage regulator (NL-LDO). The NL-LDO includes a scalable power train to provide a variable load current to the cryptographic block, randomization circuitry to generate randomized values for setting a plurality of parameters, and a controller to adjust the variable load current provided to the cryptographic block based on the parameters and the current voltage of the cryptographic block. The controller to cause a decrease in the variable load current when the current voltage is above a high voltage threshold, an increase in the variable load current when the current voltage is below a low voltage threshold; and a maximization of the variable load current when the current voltage is below an undervoltage threshold. The cryptographic block may be implemented with arithmetic transformations.
Batch-wise distributed preprocessing information verification
Some embodiments are directed to a dealer device for batch-wise provisioning of preprocessing information for a multiparty computation and an evaluator device for batch-wise distributed verification with one or more other evaluator devices of the preprocessing information. The preprocessing information comprises multiple random values and multiple message authentication codes for blinding and integrity checking respectively in the multi-party computation. The multiple random values and a set of proof values together define a checking polynomial. The dealer device computes proof values wherein the checking polynomial is identical to zero. The evaluator device obtains secret-shares of the random values, proof values, and message authentication codes. The evaluator device checks by a distributed computation with the one or more other evaluator devices that an evaluation of the checking polynomial in a random evaluation point is zero, thus verifying that multiple polynomial checking equations are satisfied on the multiple random values.
Communication protocol
A zero knowledge communications protocol is provided that can unconditionally secure communications sent through a communications network by encrypting all messages, continuously sending noise messages through the network, and routing all network activity through an anonymity network. This combination of components prevent an eavesdropper on the network from garnering any information about when a communication is sent, the contents and statistics of a communication, the sender, or the intended recipient of the communication.
Efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers
The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using dependent shufflers. Each of multiple clients provides an encrypted client-specific secret input value. A subset of clients are shuffling clients who participate with a service provider in a secret shuffling of the encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.
System and method for cryptographic choice mechanisms
The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.
Data management device, data management system, data management method, and program
A data management device (10) includes an insertion position determiner (121) to determine an insertion position of dummy data to be inserted into transmission target data, a dummy data inserter (122) to insert the dummy data in the insertion position of the transmission target data to create dummy-inserted data, an insertion position encryptor (123) to encrypt data indicating the insertion position with a public key (PUBa) to create insertion-position-encrypted data; and a deliverer (110) to deliver the dummy-inserted data and the insertion-position-encrypted data.
Data set including a secure key
An example of the instant solution comprises at least one of receiving an encrypted data and an encryption key, generating a randomized matrix, dispersing the encrypted data based on the randomized matrix resulting in a fragmented encrypted data and dispersing the encryption key based on the randomized matrix and the fragmented encrypted data.
CURRENT SIGNATURE JAMMER OF AN INTEGRATED CIRCUIT
The present description concerns an integrated circuit including, between first and second terminals having a first voltage applied therebetween, a load configured to execute instructions, a circuit for delivering a digital signal having at least two bits from a binary signal and a current output digital-to-analog converter controlled by the digital signal and coupled between the first and second terminals in parallel with the load.
Electronic authentication systems
Methods and devices are provided for use in carrying out a transaction between a transaction device and a point of interaction. In connection therewith, a device for interacting with a point of interaction to carry out a transaction by a consumer includes a processor comprising a payment application and a system environment module, where the system environment module is configured to determine whether the payment application is eligible for a transaction. The device also includes an input in communication with the processor and configured to receive transaction data from a point of interaction in connection with the transaction, and an output in communication with the processor and configured to transmit transaction data to the point of interaction in connection with the transaction when the system environment module determines that the payment application is eligible for the transaction.
Optimizations for privacy-preserving distance metric computation
Novel tools and techniques are provided for implementing signal encryption or signal authentication. In various embodiments, a second computing system might pack, using a packing function, two or more elements of a second vector associated with a third entity to generate a packed second vector; might individually encrypt, using a generated public key received from a first computing system, each element of the packed second vector to generate an encrypted packed second vector; might pack two or more elements of an encrypted first vector from the first computing system to generate a packed encrypted first vector; might combine the encrypted packed second vector with the packed encrypted first vector to generate a combined packed encrypted vector; and might send the combined packed encrypted vector to the first computing system for generating a similarity score that is indicative of differences between the second vector and the first vector.