H04L2209/08

SYSTEM AND METHOD FOR CRYPTOGRAPHIC CHOICE MECHANISMS
20220327882 · 2022-10-13 · ·

The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.

SYSTEM AND METHOD FOR CRYPTOGRAPHIC CHOICE MECHANISMS
20220327883 · 2022-10-13 · ·

The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.

Apparatus and method for encrypting data in a data storage system

A system and method that utilize an encryption engine endpoint to encrypt data in a data storage system are disclosed. In the system and method, the client controls the encryption keys utilized to encrypt and decrypt data such that the encryption keys are not stored together with the encrypted data. Therefore, once data is encrypted, neither the host of the data storage system, nor the encryption engine endpoint have access to the encryption keys required to decrypt the data, which increases the security of the encrypted data in the event of, for example, the data storage system being accessed by an unauthorized party.

FAULT ATTACK RESISTANT CRYPTOGRAPHIC SYSTEMS AND METHODS

Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.

ANTI-COUNTERFEITING AND ENCRYPTION METHOD BASED ON LOCAL RANDOM IMAGE TRANSFORMATION TECHNIQUE
20220284448 · 2022-09-08 ·

Disclosed is an anti-counterfeiting and encryption method based on a local random image transformation technique, which belongs to the technical field of anti-counterfeiting and encryption. In the present disclosure, local replacement is performed on random images (that is, the arrangement structure of pixels in a space is changed or pixel values are changed), and then, two random images are used to store corresponding information; and “locally scrambled” portions of the images contain a part of key information. However, since the images are still random, there is still no explicit information display in the images; and even if the information is intercepted during a transfer process, the content of the information cannot be known without the original first random scatter plot, and the existing information also cannot be tampered with. In the present disclosure, a user does not need to memorize any password.

Content recording apparatus, content editing apparatus, content reproduction apparatus, content recording method, content editing method, and content reproduction method

A content recording apparatus includes an obtaining unit which obtains a content having a variable-length packet structure, an encrypter which generates encrypted data by encrypting the content, and a recorder which records the encrypted data in a block unit having a fixed length in a recording medium. The encrypted data includes an invalidated region unnecessary for reproduction of the content. The recorder records a size of the invalidated region in the recording medium.

MUTUAL AUTHENTICATION OF CONFIDENTIAL COMMUNICATION
20220224551 · 2022-07-14 ·

Embodiments of the invention relate to systems and methods for confidential mutual authentication. A first computer may blind its public key using a blinding factor. The first computer may generate a shared secret using its private key, the blinding factor, and a public key of a second computer. The first computer may encrypt the blinding factor and a certificate including its public key using the shared secret. The first computer may send its blinded public key, the encrypted blinding factor, and the encrypted certificate to the second computer. The second computer may generate the same shared secret using its private key and the blinded public key of the first computer. The second computer may authenticate the first computer by verifying its blinded public key using the blinding factor and the certificate of the first computer. The first computer authenticates the second computer similarly.

MULTI-TENANT DATA PROTECTION IN A CENTRALIZED NETWORK ENVIRONMENT

Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.

ORACLE-AIDED PROTOCOL FOR COMPACT DATA STORAGE FOR APPLICATIONS USING COMPUTATIONS OVER FULLY HOMOMORPHIC ENCRYPTED DATA

Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.

ENHANCED RANDOMNESS FOR DIGITAL SYSTEMS
20220224509 · 2022-07-14 · ·

A digital processing method, which comprises obtaining a stream of N-bit input data words; obtaining a value k between 0 and M−1, inclusively, where M>1; processing each of the N-bit input data words at least based on the kth of M permutation elements to produce a corresponding N-bit output data word; and outputting a stream of N-bit output data words on a network or storing the stream of the N-bit output data words in a non-transitory storage medium.