H04L2209/08

Multiplicative masking for cryptographic operations

A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.

Managing information for model training using distributed blockchain ledger

Embodiments are directed to generating and training a distributed machine learning model using data received from a plurality of third parties using a distributed ledger system, such as a blockchain. As each third party submits data suitable for model training, the data submissions are recorded onto the distributed ledger. By traversing the ledger, the learning platform identifies what data has been submitted and by which parties, and trains a model using the submitted data. Each party is also able to remove their data from the learning platform, which is also reflected in the distributed ledger. The distributed ledger thus maintains a record of which parties submitted data, and which parties removed their data from the learning platform, allowing for different third parties to contribute data for model training, while retaining control over their submitted data by being able to remove their data from the learning platform.

Method and system for processing a GNSS signal using homomorphic encryption
11626971 · 2023-04-11 · ·

An apparatus and method are described for processing a global navigation satellite system (GNSS) signal, the GNSS comprising multiple satellites, wherein each satellite transmits a respective navigation signal containing a spreading code. The method comprises receiving an incoming signal at a receiver, wherein the incoming signal may contain navigation signals from one or more satellites; encrypting the incoming signal at the receiver using a homomorphic encryption scheme to form an encrypted signal; and transmitting the encrypted signal from the receiver to a remote server.

Obfuscating cryptographic material in memory
11604740 · 2023-03-14 · ·

Methods and systems disclosed herein describe obfuscating plaintext cryptographic material stored in memory. A random location in an obfuscation buffer may be selected for each byte of the plaintext cryptographic material. The location of each byte of the plaintext cryptographic material may be stored in a position tracking buffer. To recover the scrambled plaintext cryptographic material, the location of each byte of the plaintext cryptographic material may be read from the position tracking buffer. Each byte of the plaintext cryptographic material may then be read from the obfuscation buffer and written to a temporary buffer. When each byte of the plaintext cryptographic material is recovered, the plaintext cryptographic material may be used to perform one or more cryptographic operations. The scrambling techniques described herein reduce the likelihood of a malicious user recovering plaintext cryptographic material while stored in memory.

Data privacy using a podium mechanism
11651103 · 2023-05-16 · ·

Systems and methods are provided for performing operations comprising: storing a set of input data; generating a noise distribution based on a two-step function, wherein a height of the two-step function is determined by a privacy parameter, a width of the two-step function is determined by minimizing a variance of the noise distribution, and wherein a mean of the two-step function is determined by a value of the set of input data to be privatized; applying the noise distribution to the set of input data to generate privatized noisy output data; and transmitting the resulting privatized noisy output data in response to a request for a portion of, or a complete set of, the input data.

Non-transitory computer-readable storage medium and communication device
11645420 · 2023-05-09 · ·

A non-transitory computer-readable storage medium storing a program that causes a processor included in a business operator's terminal to execute a process, the process includes conversion processing and confirmation request processing. The conversion processing that converts user information acquired from an user into a management format and obtains converted user information. The confirmation request processing that calculates a first hash value obtained by hashing the converted user information with a first hash function, transmits a confirmation request including the first hash value, the first hash function, and conversion content of the conversion to the user, and requests the user to confirm validity of the user information managed.

PROTECTION METHOD AND DEVICE AGAINST A SIDE-CHANNEL ANALYSIS
20170373837 · 2017-12-28 ·

A method for executing an operation by a circuit, may include executing a first operation to process an input data, the circuit generating during the execution of the first operation a first signal, and executing in the circuit a second operation receiving the input data and configured to add to the first signal, between first and second instants during the execution of the first operation, a continuous second signal. A combination of the first and second signal forming a resultant signal in which the second signal may be indistinctly measurable with the first signal from outside of the circuit. The second signal and the resultant signal varying as a function of the input data.

METHODS FOR PROTECTING SUBSTITUTION OPERATION USING SUBSTITUTION TABLE AGAINST A SIDE-CHANNEL ANALYSIS
20170373838 · 2017-12-28 ·

A method for executing by a circuit a substitution operation such that an output data may be selected in a substitution table using an input data as an index. The substitution operation may be performed using a new masked substitution table. The input data may be combined by XOR operations with a new value of a first mask parameter, and the output data may be combined by XOR operations with a new value of a second mask parameter. The new masked substitution table may be generated by computing the new value of the first mask parameter by applying XOR operations to a previous value of the first mask parameter and to a first input mask, computing the new value of the second mask parameter by applying XOR operations to a previous value of the second mask parameter and to a second input mask, and generating the new masked substitution table using a previous masked substitution table and the first and second input masks.

TIMELY RANDOMIZED MEMORY PROTECTION

In a system executing a program, a method comprises detecting one or more input/output calls associated with the program and re-randomizing memory associated with the program in response to the one or more input/output calls. A related system is also described.

DEVICE AND METHOD FOR MULTIPLICATION FOR IMPEDING SIDE-CHANNEL ATTACKS

A device for multiplying two bit sequences has a controller that selects and activates exactly one multiplier unit from a plurality of parallel multiplier units, according to a random signal. A partial multiplier unit shared by all the multiplier units receives and multiplies operands formed by the respectively activated multiplier unit. Each multiplier unit implements a different multiplication method with a respective selector unit that selects segments of the bit sequences to be multiplied, in accordance with a selection plan adapted to the respective multiplication method, to form operands from one or more segments and outputs the operands. The respective accumulation unit receives step by step partial products from the partial multiplier unit, accumulates the partial products in accordance with an accumulation plan adapted to the implemented multiplication method and matching the selection plan, and outputs the calculated product of after accumulation has been completed.