Patent classifications
H04L2209/42
ANONYMITY MECHANISMS IN PERMISSIONED BLOCKCHAIN NETWORKS
A member of a group in a blockchain network may generate a public key and a private key, request a blockchain network group certificate, associated with the private key, from a blockchain network certificate authority, and distribute a private key to members of the group.
TAMPER RESISTANT PUBLIC LEDGER VOTING SYSTEM
There is disclosed an electronic voting system for tamper resistant voting. In some embodiments of a system and/or method for allows a voter to verify that his vote was recorded properly and/or allows public counting of votes by any entity. For example, the system may record information on a distributed ledger that prevents changing of votes. For example, enough data may be available to each voter to check that his vote was recorded properly and/or to substantiate and/or prove if it was not recorded properly. For example, public data may be recorded anonymously such that a third party may be able to access the number of votes, but not the identify of individual voters. Optionally, the individual voter may be supplied a way to substantiate a claim that he voted for either party of the election.
Search device, tag generation device, query generation device, searchable encryption system and computer readable medium
A search device (60) determines whether or not an auxiliary tag AT corresponding to an auxiliary query AQ obtained by conversion of a keyword exists, among auxiliary tags AT stored in an auxiliary tag storage unit (632) and obtained by conversion of a search word. When it is determined that the auxiliary tag AT corresponding to the auxiliary query AQ exists, the search device (60) specifies an encryption tag ET corresponding to a search query SQ being set with attribute information x indicating an attribute of a user, and the keyword, among encryption tags ET stored in an encryption tag storage unit (633) and being set with an access condition v indicating an accessible attribute, and the search word.
Subversion resilient attestation for trusted execution environments
A computer-implemented method includes receiving an original message from a trusted execution environment. The original message includes an original digital signature authored by the trusted execution environment. The method includes computing a proof of knowledge for the original digital signature and modifying the original message by replacing the original digital signature with the proof of knowledge.
System and methods for recording codes in a distributed environment
Systems and methods for recording codes in a distributed environment are provided. A first node receives data including at least one code from a code generation computing device via a network. The first node adds a first new block to a first cryptographically verifiable encrypted ledger, the first block containing the at least one code. The first node adds a second new block to a second cryptographically verifiable, the second block containing the at least one code. The first node or a second node retrieves the at least one code from the second cryptographically verifiable unencrypted ledger. The first node or the second node analyzes the at least one code pursuant to a set of rules.
Database encryption layer
An example operation may include one or more of receiving, by one or more endorser nodes of a blockchain network, an invoke chaincode transaction proposal, executing chaincode, encrypting, by an application programming interface between the chaincode and a shared ledger, blockchain state to the shared ledger, decrypting blockchain state from the shared ledger, endorsing, by the one or more endorser nodes, one or more results from executing the chaincode, and creating a blockchain transaction from the one or more endorsed results.
Identity Authentication Method and Apparatus
A method comprises generating, based on identity information of a user by an identity management server, a temporary privacy identity identifier of a terminal device, receiving, from the terminal device, a network access request comprising the temporary privacy identity identifier, generating an authentication key of the temporary privacy identity identifier based on the temporary privacy identity identifier and a primary identity authentication key of a domain to which the terminal device belongs, generating a first message based on the temporary privacy identity identifier and the authentication key, sending the first message to the terminal device, receiving a second message from the terminal device based on the first message, performing authentication on the second message based on the temporary privacy identity identifier and the authentication key, and allowing access to a network device by the terminal device after the authentication succeeds.
System and method for anonymous location verification
A computer implemented system for anonymous electronic verification of location credentials including at least one processor and data storage is described in various embodiments. The system includes cryptographic mechanisms and electronic communication between one or more computing systems that in concert, provide verification of a prover's location credentials in accordance to logical conditions of a verifier's policy without providing additional information to a verifier entity.
Systems and methods for countering co-existence attack
Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols).
Systems and methods for using distributed ledger micro reporting tools
Systems and methods for using distributed ledger micro reporting tools are disclosed. In one embodiment, in a distributed computer application executed by an information processing apparatus comprising at least one computer processor, a method for using a distributed ledger micro reporting tool may include: (1) an event listener establishing a connection a distributed ledger; (2) in response to the creation of each block of a plurality of blocks on the distributed ledger, the listener reading block details from the block, wherein the block comprises a plurality of transactions, and the block details comprise a transaction hash for each of the plurality of transactions; (3) indexing the transaction hash with a timestamp; and (4) storing the index of the transaction hash with the timestamp.