Patent classifications
H04L2209/30
COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR MANAGING LARGE BLOCKS OVER A BLOCKCHAIN NETWORK
Computer-implemented methods and systems suitable for implementation in nodes of a blockchain network are provided. Modified blockchain node structures, network architectures, and protocols for handling large numbers of transactions and large transaction blocks are described. A computer-implemented method for a node of a blockchain network is described which includes: receiving mined data from the blockchain network corresponding to a plurality of validated transactions; assembling blocks based on said mined data; and sending assembled blocks to a storage entity for storing on a blockchain.
Method and server for providing notary service with respect to file and verifying file recorded by the notary service
A method is provided for providing a notary service for a file, the method includes the steps in which: (a) when a notary service request for a specific file is obtained, a server generates, by using a hash function, or supports the generation of, a message digest of the specific file; and (b) if a predetermined condition is satisfied, the server registers, in a database, or supports the registration of, a representative hash value or a value obtained by processing the representative hash value, the representative hash value being generated by calculating at least one neighboring hash value that matches a specific hash value, wherein the specific hash value is a hash value of the result of encrypting the message digest with a private key of a first user, a private key of a second user and a private key of the server.
Maximizing data reduction in a partially encrypted volume
A method of data reduction in a partially encrypted volume includes receiving data to be stored on a storage array, decrypting the data using a first encryption key to generate first decrypted data, and decrypting the data using a second encryption key to generate second decrypted data. The method further includes comparing, by a storage array controller, a first compressibility value of the first decrypted data to a second compressibility value of the second decrypted data. The method further includes storing the first decrypted data if the first compressibility value is greater than or equal to the second compressibility value. The method further includes storing the second decrypted data if the second compressibility value is greater than the first compressibility value.
Signature compression for hash-based signature schemes
A digital signature over a message may be compressed by determining a plurality of values based at least in part on the message. A mapping of the plurality of values over a digital signature scheme may be used to determine a value from which a portion of the compressed digital signature is decompressible by cryptographically deriving one or more components of the uncompressed digital signature. A public key may be used to verify the authenticity of the compressed digital signature and message.
Blockchain ledger compression
A method includes: obtaining, by a server storing data in a blockchain ledger, compression point information of the blockchain ledger, in which the compression point information includes identification information of a specified data block, a server digital signature, and a user digital signature, in which the compression point information indicates that a specified portion of the blockchain ledger has passed an integrity verification, and in which the specified portion of the blockchain ledger includes data blocks in the blockchain ledger previous to the specified data block in the blockchain ledger; and compressing data of the specified portion of the blockchain ledger.
Encrypted and compressed data transmission with padding
In some examples, a system for executing instructions can include a processor to detect data to be transmitted to a storage device in response to a write operation. The processor can also determine that the data comprises a compressible characteristic that enables compression of the data to a size below a threshold value. Additionally, the processor can generate a modified data block by encrypting the compressed data, and adding a padding to the compressed and encrypted data. Furthermore, the processor can transmit the modified data block to the storage device.
Blockchain ledger authentication
A computer-implemented method for performing authentication includes: determining, by a database server storing data in a blockchain ledger, a target ledger segment on which time service authentication is to be performed; generating a Merkle tree corresponding to the target ledger segment; determining a root hash of the Merkle tree, the root hash of the Merkle tree being based on a block hash of each data block in a set of one or more data blocks; executing a predetermined time capture process in a trusted execution environment to obtain a trusted time from an interface provided by a trusted time service organization; generating a digital signature for the trusted time and the root hash in the trusted execution environment; and generating a time service certificate including the trusted time, the root hash, and the digital signature.
Message verification
According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core configured to obtain, from a timestamp, a truncated timestamp comprising a first number of least significant bits of the timestamp and not comprising at least one most significant bit of the timestamp, to derive a hash value based at least in part on the timestamp, a payload and a secret value, and to compile a first message comprising the truncated timestamp, the payload and, at least in part, the hash value, and a transmitter configured to be directed by the at least one processing core, to transmit the first message toward a recipient.
Cryptographic ASIC with combined transformation and one-way functions
A transform-enabled integrated circuit is provided with a combined transformation/hashing block, such as for cryptographic proof-of-work systems. The transform-enabled integrated circuit embeds components for a transformation function among hashing function components within the cryptographic datapath of the transform-enabled integrated circuit. The combined transformation/hashing block may be configured after the manufacture of the integrated circuit to embody as circuitry any one of a plurality of mathematical transformation functions, thus enabling a user to systemically modify the cryptographic operations performed by the integrated circuit while retaining the high performance and efficiency characteristics of application specific integrated circuits. Embodiments modify the internal intermediate state variables of the hashing function to transform and hash an input message. Method and computer program product embodiments are also provided. The technology flexibly enables the deployment of application-specific integrated circuits (ASICs) within blockchain systems, digital rights management, secure token, and other cryptography-related fields.
DEVICES AND CIRCUITRY FOR COMPUTING HASH VALUES
Devices and circuitry for computing hash values.