Patent classifications
H04L2209/08
TERMINAL DEVICE, DATABASE SERVER, AND CALCULATION SYSTEM
A database server stores encrypted vector data in which each of a plurality of elements is encrypted by encryption maintaining semi-homomorphism between calculation before encryption and calculation after encryption. The database server receives an obfuscated query (N-randomized query) from a terminal device, performs calculation for each of a plurality of segments of vectors of the obfuscated query with a segment of the encrypted vector data, and transmits the calculation to the terminal device in reply. The terminal device may acquire a result of decryption calculation transmitted in reply by a decryption device.
Differential power analysis countermeasures
An electronic device includes a plurality of logic units, which have respective inputs and outputs and are arranged in a ring topology, such that an input of each of the logic units is coupled to an output of another of the logic units. Each of the logic units includes respective processing logic, which is identical to and operates in synchrony with the processing logic of the other logic units to process respective data values using at least one secret value stored in the device. The logic units are coupled, at an initial cycle of the device, to receive respective input values that are mutually uncorrelated. At subsequent cycles of the device, each of the logic units receives and operates on intermediate values that are output by another of the logic units.
Encryption device and operation method thereof
An encryption device for performing virtual and real operations and a method of operating the encryption device. The method includes performing a virtual operation; when a real operation request signal is received, determining whether the virtual operation being performed is completed; and in response to the virtual operation being completed, performing a real operation in response to the real operation request signal.
Systems and methods for providing randomness-as-a-service
Systems, apparatuses, methods, and computer program products are disclosed for facilitating on-demand delivery of unknown qubits. An example method includes determining a first quantum basis pattern. The example method further includes encoding, by encoding circuitry, a set of bits utilizing the first quantum basis pattern to generate a set of qubits and transmitting, by quantum communications circuitry, the set of qubits over a quantum line, for example, a polarization maintaining optical fiber, to a remote device, wherein the set of qubits is configured for measurement by an independently determined, second quantum basis pattern, resulting in a second set of bits different than the first set of bits.
Redundant Quantum Random Number Generator in a Quantum Communication System
The disclosed embodiments generally use multiple QRNGs contained within independent servers operating in a round-robin fashion via an Application Programming Interface (API) such that the quality of the random number bitstream can be enhanced due to a sum of entropy being gathered across multiple QRNGs that are multiplicative in nature. This allows for multiple modes of operation to be accomplished, the first being a higher overall random stream bitrate, the second being an enhanced entropy stream where output from the independent QRNGs are interleaved together to improve the quality of the random bitstream, and the third mode of operation where a minimum guaranteed random bitstream rate is maintained equal to the redundancy value chosen by the operator based upon the quantity of QRNG devices within the system.
Chip device and method for a randomized logic encryption
A chip device with a logic circuitry (105) protected by a randomized logic encryption based on a key (K) for preventing a designated usage of the logic circuitry (105) by an unauthorized user comprises: a physically unclonable function, PUF, (110), a storage (120), and a chip enabler (130) with one or more registers (132). The physically unclonable function, PUF, (110) is configured to generate a device-individual response (Re) based on a challenge (Ch). The storage (120) has stored the challenge (Ch) and a data element (C), the data element (C) being an encryption of the key (K) with the response (Re) of the PUF (110) as encryption key. The enabler (130) is configured to enable the logic circuitry (105) for the designated usage only, when the key (K) is transferred to the register(s) (132), the key (K) being a decryption of the data element (C) with the response (Re) as the encryption key.
Method and system for providing quantum random number on basis of quantum entropy source
A method and a system of providing a quantum random number based on a quantum entropy source. The method includes generating a quantum random number and providing the quantum random number to a device. The generating of the quantum random number based on the quantum entropy source includes determining, by a management unit, whether quantum random numbers stored in a storage are insufficient; generating a quantum random number based on the quantum entropy source using a quantum random number generator provided in a production unit in response to a determination that the quantum random numbers are insufficient; verifying, by a verification unit, the generated quantum random number based on NIST SP800-90B and SP800-22; and in response to quality of the generated quantum number satisfying a criterion, storing the verified quantum random number in the storage.
System and method for producing a unique stable biometric code for a biometric hash
Biometric data such as iris, facial, or fingerprint data may be obtained from a user. A public code may be generated from the biometric data, but does not obtain any of the biometric data or information that can be used to identify the user. The public code includes information that can be used to extract from the biometric data a biometric code that is suitable for bitwise comparison. Neither the underlying biometric data nor information from which the biometric data may be determined is stored as only the public code and the actual biometric feature of the user is required to generate the biometric code.
USING A SECURE ENCLAVE TO SATISFY RETENTION AND EXPUNGEMENT REQUIREMENTS WITH RESPECT TO PRIVATE DATA
Data may contain personal information and be subject to privacy requirements. The data may be encrypted and only a secure enclave may be able to decrypt the encrypted data. The secure enclave may be used to generate a report based on the encrypted data and a first set of added noise. The report may be subject to audit requirements and satisfy a differential privacy guarantee. The encrypted data may be stored for a first period. After the first period, the secure enclave may be used to generate a private synopsis based on the encrypted data and a second set of added noise. The private synopsis may satisfy the differential privacy guarantee. The private synopsis may be encrypted and only the secure enclave may be able to decrypt the encrypted private synopsis. The encrypted data may be expunged, and the encrypted private synopsis may be retained for a second period.
METHOD OF PROCESSING OPERATIONS OF POLYNOMIAL-BASED SECURITY ALGORITHM AND APPARATUS FOR IMPLEMENTING THE METHOD
The present disclosure according to at least one embodiment provides a method of processing operations of a polynomial-based security algorithm, the method being performed by a computing system. The method comprises identifying a plurality of operations using secret information in the polynomial-based security algorithm, generating a random index to be applied to the identified operations, and performing the operations using the random index.