Patent classifications
H04L2209/08
System and method for information protection
A computer-implemented method comprises: committing a transaction amount t of a transaction with a commitment scheme to obtain a transaction commitment value T, the commitment scheme comprising at least a transaction blinding factor r_t; encrypting a combination of the transaction blinding factor r_t and the transaction amount t with a public key PK_B of a recipient of the transaction; and transmitting the transaction commitment value T and the encrypted combination to a recipient node associated with the recipient for the recipient node to verify the transaction.
Searching using encrypted client and server maintained indices
A method and apparatus of a device searches encrypted objects stored in a secure virtual storage space is described. In an exemplary embodiment, the device receives a search query that includes a set of tokens and encrypts the set of tokens. The device further creates a hashed set of encrypted tokens using a second hash function. In addition, the device sends the hashed set of encrypted tokens to a first search server as a query. Furthermore, the device receives, from the first search server, a first set of encrypted object names as a search result. The device additionally determines a set of client-side indexes to search by hashing at least some of the first set of encrypted object names using a first hash function. The device further decrypts the set of encrypted object names. The additionally searches the set of client-side indexes using the set of decrypted object names.
CONTENT RECORDING APPARATUS, CONTENT EDITING APPARATUS, CONTENT REPRODUCTION APPARATUS, CONTENT RECORDING METHOD, CONTENT EDITING METHOD, AND CONTENT REPRODUCTION METHOD
A content recording apparatus includes an obtaining unit which obtains a content having a variable-length packet structure, an encrypter which generates encrypted data by encrypting the content, and a recorder which records the encrypted data in a block unit having a fixed length in a recording medium. The encrypted data includes an invalidated region unnecessary for reproduction of the content. The recorder records a size of the invalidated region in the recording medium.
Method For Sequentially Encrypting And Decrypting Singly Linked Lists Based On Double Key Stream Ciphers
A method for sequentially encrypting and decrypting singly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and calling keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.
Information processing apparatus and method
An information processing apparatus includes a processor configured to receive, respectively from a plurality of external devices, plural pieces of encrypted data encrypted with a random number sequence. The processor generates parity data by using the received plural pieces of encrypted data. The processor stores the generated parity data in a memory. The processor receives a restoration request for restoring first encrypted data from a first external device among the plurality of external devices. The processor receives, respectively from one or more second external devices among the plurality of external devices other than the first external device, one or more pieces of second encrypted data among the plural pieces of encrypted data other than the first encrypted data. The processor restores the first encrypted data by using the received one or more pieces of second encrypted data and the parity data stored in the memory.
Compression and manipulation-resistant fuzzy hashing
Systems and a method for compression and manipulation-resistant fuzzy hashing are provided. In one or more aspects, a system includes a network interface to receive an image object from a network, and a processor to process the image object. The processing includes generating pairs of random numbers using a hash of pixel data of the image object as a seed. The processing further includes identifying a number of coordinate pairs, within image pixels of the image object, such that coordinate values of each coordinate pair of the identified coordinate pairs approximately matches one pair of the random numbers. A number of first entropy values associated with first sub-areas corresponding to the identified coordinate pairs are determined. An anchor point within the image pixels is identified that has coordinate values corresponding to a sub-area that is associated with a highest entropy value among the determined first entropy values.
Audio path sealing
In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a first housing portion and a second housing portion arranged to receive and enclose one or more personal communication devices. The apparatus further includes at least one sound attenuation layer disposed in the second housing portion, the at least one sound attenuation layer absorbs sound. The apparatus also includes a noise generator to provide one or more noise signal streams and audio output device(s), which are at least partially supported by the first housing portion and coupled to the noise generator to receive the one or more noise signal streams. The audio output device(s) are operable to output noise signal based on the one or more noise signal streams and direct the noise signal at the one or more personal communication devices placed adjacent the at least one sound attenuation layer.
Mitigation of side-channel attacks using small-overhead random pre-charging
An electronic device includes a combinational logic circuit, one or more state-sampling components, and protection circuitry. The combinational logic circuit has one or more inputs and one or more outputs. The state-sampling components are configured to sample the outputs of the combinational logic circuit at successive clock cycles. The protection circuitry is configured to protect the combinational logic circuit by, per clock cycle, starting to apply random data to the inputs of the combinational logic circuit a given time duration before a sampling time of the state-sampling components for that clock cycle, and, after applying the random data, switching to apply functional data to the inputs of the combinational logic circuit, to be sampled by the state-sampling components. A propagation delay, over any signal path via the combinational logic circuit, is no less than the given time duration.
BUFFER ACCESS FOR SIDE-CHANNEL ATTACK RESISTANCE
A cryptographic accelerator (processor) retrieves data blocks for processing from a memory. These data blocks arrive and are stored in an input buffer in the order they were stored in memory (or other known order)typically sequentially according to memory address (i.e., in-order.) The processor waits until a certain number of data blocks are available in the input buffer and then randomly selects blocks from the input buffer for processing. This randomizes the processing order of the data blocks. The processing order of data blocks may be randomized within sets of data blocks associated with a single read transaction, or across sets of data blocks associated with multiple read transactions.
System and method for cryptographic choice mechanisms
The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.