Patent classifications
H04L2209/46
BLOCKCHAIN-BASED DATA PROCESSING METHOD AND APPARATUS
A blockchain-based data processing method and apparatus are provided. The method comprises: by a node device of a service acceptance platform, receiving service processing application data of a target user; generating a first service processing result; encrypting the first service processing result using a public key of a node device of a service processing entity; and sending, a first transaction to a blockchain for the first transaction to be recorded in a distributed database of the blockchain upon verification of the first transaction by a plurality of node devices associated with the blockchain according to a consensus mechanism, wherein: the first transaction comprises the encrypted first service processing result, and the plurality of node devices associated with the blockchain comprises the node device of the service acceptance platform and the node device of the service processing entity.
One-Round Secure Multiparty Computation of Arithmetic Streams and Evaluation of Functions
A method for performing, in a single round of communication and by a distributed computational system, Secure MultiParty Computation (SMPC) of an arithmetic function ƒ:.sub.p.sup.k.fwdarw.
.sub.p represented as a multivariate polynomial over secret shares for a user, comprising the steps of sharing secrets among participants being distributed computerized systems, using multiplicative shares, the product of which is the secret, or additive shares, that sum up to the secret by partitioning secrets to sums or products of random elements of the field; implementing sequences of additions of secrets locally by addition of local shares or sequences of multiplications of secrets locally by multiplication of local shares; separately evaluating the monomials of ƒ by the participants; adding the monomials to obtain secret shares of ƒ.
SECURE AGGREGATE ORDER SYSTEM, SECURE COMPUTATION APPARATUS, SECURE AGGREGATE ORDER METHOD, AND PROGRAM
An aggregate order is efficiently obtained while keeping confidentiality. An inverse permutating part (12) generates a share of a vector representing an inversely permutated cross tabulation by applying inverse permutation to a cross tabulation of a table, the inverse permutation being a permutation which moves elements so that, when the table is grouped based on a key attribute, last elements of each group are sequentially arranged from beginning. A partial summing part (13) computes a prefix sum from the inversely permutated cross tabulation. The order computing part (14) generates a share of a vector representing ascending order within a group from a result of the prefix sum.
Securely transferring computation in a disaggregated environment using a processor group key
A group of processors in a processor pool comprise a secure “enclave” in which user code is executable and user data is readable solely with the enclave. This is facilitated through the key management scheme described that includes two sets of key-pairs, namely: a processor group key-pair, and a separate user key-pair (typically one per-user, although a user may have multiple such key-pairs). The processor group key-pair is associated with all (or some define subset of) the processors in the group. This key-pair is used to securely communicate a user private key among the processors. The user private key, however, is not transmitted to non-members of the group. Further, preferably the user private key is refreshed periodically or upon any membership change (in the group) to ensure that non-members or ex-members cannot decipher the encrypted user key.
System and Method for Fair, Secure N-Party Computation Using At Least One Blockchain
Described are a system and method for secure n-party computation. The method includes communicating a first input of an n-party computation to a trusted execution environment (TEE). The method also includes receiving, from the TEE, at least one encrypted output of the n-party computation using the first input and at least one second input of at least one other computing device, and using at least one public key of the at least one other computing device. The method further includes posting the at least one encrypted output on at least one blockchain accessible by the at least one other computing device. The method further includes, in response to posting the at least one encrypted output, receiving at least one proof of publication. The method further includes communicating the at least one proof of publication to the TEE and receiving the function output of the n-party computation.
System for anonymizing data for use in distributed ledger and quantum computing applications
A system and methods for anonymizing data for distribution on a distributed ledger arrangement is provided. The design includes receiving initial data at a computing device, the initial data relating to an initiating party, removing, at the computing device, personal identifying information from the initial data, thereby creating personal identifying information scrubbed data, anonymizing the personal identifying information scrubbed data on the computing device using DNA processing, thereby creating DNA processed scrubbed data, and providing the DNA processed scrubbed data from the computing device to the distributed ledger arrangement.
System and method for processing encrypted search
A requester submits a request to perform an encrypted search that is received by an encrypted search provider. The encrypted search provider processes the request and produces a set of intermediate results which are loaded onto a mobile computer system that includes a mobile power source. The mobile computer system is shipped to the requester, and while in transit to the requester, the mobile computer system processes the intermediate results to produce a completed search result. After the mobile computer system arrives at the requester, the mobile computer system provides the completed search result to the requester.
Method and Apparatus for a Blockchain-Agnostic Safe Multi-Signature Digital Asset Management
Exemplary embodiments provided herein include a method for safe creation, custody, recovery and management of a digital asset, agnostic to an underlying blockchain technology, the method including establishing a virtual layer where three private keys are generated, transacting the digital asset by using two of three of the private keys and multi-party computation techniques, abstracting interactions between the three private keys from the underlying blockchain technology, having a digital asset transaction considered as a single-signature by the underlying blockchain technology, and recovering the digital asset if any of the three private keys is no longer available. Additionally, the digital asset may be a cryptocurrency, and a party may be disconnected from any network during the normal user operation phases. Furthermore, the digital asset transaction may be considered as a single-signature, as seen by the underlying blockchain technology, and is associated to a public key PK_ABC.
Secure Federation of Distributed Stochastic Gradient Descent
Embodiments relate to training a machine learning model based on an iterative algorithm in a distributed, federated, private, and secure manner. Participating entities are registered in a collaborative relationship. The registered participating entities are arranged in a topology and a topological communication direction is established. Each registered participating entity receives a public additive homomorphic encryption (AHE) key and local machine learning model weights are encrypted with the received public key. The encrypted local machine learning model weights are selectively aggregated and distributed to one or more participating entities in the topology responsive to the topological communication direction. The aggregated sum of the encrypted local machine learning model weights is subjected to decryption with a corresponding private AHE key. The decrypted aggregated sum of the encrypted local machine learning model weights is shared with the registered participating entities.
SECURITY-ENHANCED ORIGINATION OF BLOCKCHAIN TRANSACTIONS
A blockchain-implemented transaction from an originator node is to be broadcast. The originator node is communicatively coupled to proxy nodes. The method, implemented by a proxy node, includes: receiving a transaction including an input taking x+r units of computing resources, an output providing x units to the output address and another output providing d+r units to a 1-of-n multi-signature address unlockable by any one of a set of private keys associated the proxy nodes. The proxy node selects a quantity of computing resources, t units, to be allocated to the proxy node for broadcasting the transaction and having it included in the blockchain and generates a further transaction taking d+r units sourced from the multi-signature address and an output providing t units to the proxy node. The proxy node broadcasts both transactions timed to permit their inclusion in the same block of the blockchain.