H04L9/0618

Method and control system for controlling and/or monitoring devices
11615007 · 2023-03-28 · ·

Complex control instruction chains in a blockchain for a specific task for controlling devices to be managed in a simple manner is provided. which permits a prescribed validity to be assigned for a specific task of a blockchain-based device control, the validity being defined by the life cycle (e.g. the period of use) of a device, for example.

Blockchain management platform for performing asset adjustment, cross sectional editing, and bonding

Aspects of the disclosure relate to processing systems perform dynamic asset adjustment. A computing platform may split a parent element of a stored element chain into sub-elements, containing a fixed parameter and a variable parameter and each linked to the parent element through the stored element chain. The computing platform may determine a change in the variable parameter, resulting in a modified variable parameter. Based on a comparison of the modified variable parameter to a plurality of predetermined discrepancy thresholds, the computing platform may determine a number of quorum approvers for approval of the change to the variable parameter. The computing platform may receive quorum approval inputs corresponding to the number of quorum approvers for the approval of the change to the variable parameter. Based on the plurality of quorum approval inputs received, the computing platform may determine that a quorum approval threshold is satisfied.

SECURE HIGH-SPEED COMMUNICATION INTERFACE BETWEEN A BASIC INPUT AND OUTPUT SYSTEM AND A SERVICE PROCESSOR
20230034670 · 2023-02-02 ·

An information handling system includes a BIOS and a service processor. The BIOS may generate, during a POST, a secret key that includes a symmetric key and a HMAC key and transmits the secret key to the service processor via an high-speed communication interface. After the POST, the BIOS transmits an SMI message that includes an encrypted message and a first hash value of the encrypted message. The encrypted message is encrypted using the symmetric key and the first hash value of the encrypted message is calculated using the HMAC key. The service processor calculate a second hash value of encrypted message based on the HMAC key and verify the encrypted message by comparing the first hash value and the second hash value. After a successful verification, the service processor decrypts the encrypted message and transmits a response to the BIOS.

PHYSICAL UNCLONABLE FUNCTION BASED MUTUAL AUTHENTICATION AND KEY EXCHANGE
20230032099 · 2023-02-02 ·

Methods and endpoint nodes and controllers are disclosed for mutual authentication and key exchange. In an embodiment, physical unclonable function circuits on the endpoint nodes are used in combination with key masks to allow mutual authentication and key exchange between the endpoint nodes.

Method of Operation for a Configurable Number Theoretic Transform (NTT) Butterfly Circuit For Homomorphic Encryption
20230086526 · 2023-03-23 ·

Fully homomorphic encryption integrated circuit (IC) chips, systems and associated methods are disclosed. In one embodiment, a method of operation for a number theoretic transform (NTT) butterfly circuit is disclosed. The (NTT) butterfly circuit includes a high input word path cross-coupled with a low word path. The high input word path includes a first adder/subtractor, and a first multiplier. The low input word path includes a second adder/subtractor, and a second multiplier. The method includes selectively bypassing the second adder/subtractor and the second multiplier, and reconfiguring the low and high input word paths into different logic processing units in response to different mode control signals.

SECURE MULTI-PARTY COMPUTATION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM

A secure multi-party computation method and apparatus, a device, and a storage medium are provided, which belong to the field of data security technologies. The method includes: performing homomorphic encryption processing on first plaintext data to generate first ciphertext data; transmitting encrypted data containing the first ciphertext data to a second node device; receiving difference ciphertext data transmitted by the second node device; and decrypting the difference ciphertext data to obtain a positive and negative property of a difference between the first plaintext data and the second plaintext data. The foregoing method and apparatus, device, and storage medium are conducive to reducing the number of times of communications of secure multi-party computation, have low communication overhead and high computation efficiency, and enable magnitude comparison and equality testing to be performed simultaneously.

Scrambler Apparatus And Method In Particular For Cryptographic Applications, And Descrambler Apparatus And Method Therefor

The invention is a scrambler apparatus for scrambling a character block, in particular for cryptographic applications, which apparatus comprises a scrambler module (210) adapted for transforming a first character block (220a) consisting of first character components (225a) to a scrambled second character block (220b) consisting of second character components (225b), configured with a scrambler automaton (250), and each second character component (225b) is determined based on a first character component (225a) of the first character block (220a) having the position corresponding to the position of the given second character component (225b), at least one character component (225a, 225b) from the available character components (225a, 225b) of the first character block (220a) and the second character block (220b), and a single input signal character component (225c) of the input signal character block (220c). The invention is, furthermore, a scrambling method, a descrambler apparatus and a descrambling method.

Method and Intelligent Apparatus for Calling Permission Verification of Protected Intelligent Application
20230089388 · 2023-03-23 ·

A method and an intelligent apparatus for calling permission verification of a protected intelligent application are provided. Based on the present application, through the calling of the hardware decryption module by the device kernel application, the intelligent apparatus can decrypt the authentication ciphertext in the protected intelligent application by using the implanted-into-kernel key in the device kernel application and the burnt-into-hardware key in the write-protected storage medium, and only when the implanted-into-kernel key is the secondary authentication key obtained by encrypting the second controlled key with the first controlled key and the burnt-into-hardware key is the first controlled key, the correct second controlled key can be obtained to decrypt the authentication ciphertext and the decrypted plaintext consistent with the sample plaintext can be obtained after decryption, so that the protected intelligent application can grant the calling permission to the device kernel application through consistency verification. Thus, the use permission of the protected intelligent application can be limited to the intelligent apparatus with correct key configuration, so as to prevent the malicious piracy of the protected intelligent application running in the illegal apparatus.

RE-ENCRYPTION DEVICE, CRYPTOGRAPHIC SYSTEM, RE-ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM
20230087142 · 2023-03-23 · ·

An encryption device (30) generates a session key K and a ciphertext ct.sub.S in which the session key K is encrypted that are generated by an encryption algorithm using as input attribute information S. A re-encryption key generation device (40) generates a re-encryption key rk including a converted decryption key sk.sub.Γ.sup.˜ generated by setting a random number r in a decryption key sk.sub.Γ with which the ciphertext ct.sub.S can be decrypted, a session key K′ and a ciphertext ct.sub.S′ that are generated by the encryption algorithm using as input attribute information S′, and conversion information generated from the random number r. A re-encryption device (50) outputs a re-encrypted ciphertext rct.sub.S′ including the ciphertext ct.sub.S′ and a cipher element K.sup.˜ generated by deleting an element related to the random number r by the conversion information from decryption information K{circumflex over ( )} obtained by decrypting the ciphertext ct.sub.S with the converted decryption key sk.sub.Γ.sup.˜ and setting the session key K′.

MANAGING ACCESS TO DATA
20230091055 · 2023-03-23 · ·

A method including determining an assigned key pair associated with a device, the assigned key pair including an assigned public key and an associated assigned private key; determining an access key pair associated with content to be encrypted, the access key pair including an access public key and an associated access private key; encrypting the access private key using a combination encryption key determined based at least in part on the access private key and the assigned public key; encrypting a randomly generated key by utilizing the access public key; and encrypting the content utilizing the randomly generated key. Various other aspects are contemplated.