H04L9/0618

Method and apparatus for obtaining privacy set intersection, device and storage medium

A method and apparatus for obtaining a privacy set intersection are provided. The method may include: encrypting a privacy set of an intersection initiator by using a homomorphic encryption algorithm to generate a cipher text, a cipher text function, a public key, and a private key of the intersection initiator; delivering the cipher text, the cipher text function, and the public key of the intersection initiator to an intersection server; receiving a to-be-decrypted function value of a privacy set of the intersection server from the intersection server; and decrypting the to-be-decrypted function value of the privacy set of the intersection initiator by using the private key, to obtain an intersection element of the privacy set of the intersection initiator and the privacy set of the intersection server.

Apparatus for processing modular multiply operation and methods thereof
11509454 · 2022-11-22 · ·

Disclosed is a ciphertext computation method. The ciphertext computation method includes: receiving a modular computation command for a plurality of ciphertexts; performing a modular computation for the plurality of ciphertexts by using a lookup table storing a plurality of predetermined prime number information; and outputting a result of the computation.

SYSTEM AND METHOD FOR COMPILING HIGH-LEVEL LANGUAGE CODE INTO A SCRIPT EXECUTABLE ON A BLOCKCHAIN PLATFORM
20230057419 · 2023-02-23 ·

A computer-implemented method (and corresponding system) is provided, that enables or facilitates the execution of a portion of source code, written in a high-level language (HLL), on a blockchain platform. The method and system can include a blockchain compiler, arranged to convert a portion of high-level source code into a form that can be used with a blockchain platform. This may be the Bitcoin blockchain or an alternative. The method can include: receiving the portion of source code as input; and generating an output script comprising a plurality of op_codes. The op_codes are a subset of op_codes that are native to a functionally-restricted, blockchain scripting language. The outputted script is arranged and/or generated such that, when executed, the script provides, at least in part, the functionality specified in the source code. The blockchain scripting language is restricted such that it does not natively support complex control-flow constructs or recursion via jump-based loops or other recursive programming constructs. The step of generating the output script may comprise the unrolling at least one looping construct provided in the source code. The method may further comprise providing or using an interpreter or virtual machine arranged to convert the output script into a form that is executable on a blockchain platform.

Data incubator for secure data processing in service-provider networks

Various techniques for processing sensitive data in an isolated incubator system within a service-provider network are described. The incubator system, for instance, is isolated from a client system in the service-provider network. In an example method, the incubator system receives an indication of an operation, and first encrypted data, from the client system. The incubator system converts the first encrypted data to plaintext and performs the operation. The incubator system converts the processed data into second encrypted data and provides the second encrypted data to the client system. Thus, the incubator system performs the operation on the data without exposing the data to the client system in the plaintext format.

SYSTEMS, METHODS, AND APPARATUS FOR DIVIDING AND ENCRYPTING DATA
20230057517 · 2023-02-23 ·

A method for data encryption may include receiving input data, finding a delimiter in the input data, generating, based on a position of the delimiter in the input data, a portion of data using a part of the input data, and encrypting the portion of data. The input data may include a record, the delimiter indicates a boundary of the record, and the portion of data may include the record. The position of the delimiter may be in the part of the input data. Generating the portion of data may include generating the portion of data based on a subset of the part of the input data. The part of the input data may be a first part of the input data, and the position of the delimiter may be in a second part of the input data.

SEARCHABLE ENCRYPTED DATA SHARING METHOD AND SYSTEM BASED ON BLOCKCHAIN AND HOMOMORPHIC ENCRYPTION

The present disclosure relates to a searchable encrypted data sharing method and system based on blockchain and homomorphic encryption, which protects security of sensitive data on the blockchain and realizes searchable and homomorphic calculation of data ciphertext. According to the present disclosure, a data owner encrypts the generated sensitive data and the keywords extracted according to the data with his own key, and then sends the encrypted transaction information to the cloud server. The cloud server verifies the identity of the data owner. If the verification succeeds, the uploaded ciphertext data is stored on a local server, and a ciphertext index, keyword ciphertext and related evidences of the data storage are uploaded to an alliance chain. The alliance chain node verifies the consistency of the uploaded transaction information, and if the verification succeeds, the transaction information is recorded.

CHATBOT SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM

There is provided a chatbot system including a plurality of user terminals, a chatbot, and a chat server. The chatbot includes a memory and a processor configured to create a message from data which is acquired from an external service, receive, as an input, a list including a user ID of a user terminal which has utilization authority for the data, generate a policy-equipped ciphertext by an encryption algorithm of ciphertext policy attribute-based encryption, and transmit the policy-equipped ciphertext to the chat server, and each of the user terminals includes a memory and a processor configured to receive a policy-equipped ciphertext from the chat server and decrypt the policy-equipped ciphertext using an attribute-equipped secret key which is generated on the basis of a user ID of the user terminal.

Secure Collection of Diagnostics Data about Integrated Circuit Memory Cells
20230057004 · 2023-02-23 ·

Systems, apparatuses, and methods to secure remote collection of memory diagnostics data generated during operations of memory cells configured in a memory device connected to a host system. The diagnostics data is stored in a secure memory region within the memory device, which controls access to the secure memory region based on cryptography. After a communication connection is established, via the host system and between the memory device and a security server having a privilege to access the secure memory region, the diagnostics data can be transmitted from the memory device to the security server in an encrypted form over the communication connection.

Systems and Methods for Management of Token Interactions
20230055618 · 2023-02-23 · ·

Systems and techniques to report token-related events within an NFT platform are illustrated. One embodiment includes a method for facilitating use of digital wallets including initiating, in a digital wallet, a view disclosing characterizations of content on a user interface; generating, within the view, one or more partitions; wherein each partition corresponds to a content classification and a set of access rights; and moving one or more icons into a first partition of the one or more partitions; wherein each icon corresponds to a token.

METHOD OF COMMUNICATION OF INFORMATION
20220366000 · 2022-11-17 ·

The present disclosure relates to a method for communicating between an electronic tag and a computer connected to the internet, wherein the electronic tag: encrypts at least part of the information to be transmitted, using a data format preserving algorithm; generates a URL comprising at least the encrypted part of the information; and transmits the URL to an NFC reader.