Patent classifications
H04L9/0618
Method and apparatus for reaching blockchain consensus
The present disclosure provides a blockchain consensus reaching method, includes: receiving election data transmitted from a blockchain node having a first account balance and/or a second account balance, the election data comprises information about a blockchain node selected by the blockchain node that transmits the election data; and determining a consensus blockchain node from blockchain nodes selected by each election data based on the election data received in this round, so that the determined consensus blockchain node performs a block packaging operation in a new round; wherein a value in the first account of each blockchain node indicates a number of digital currencies that the blockchain node has, and a value in the second account of each blockchain node indicates a number of votes that the blockchain node has. The present disclosure also provides a blockchain consensus reaching apparatus, a computer system and a computer-readable medium.
Key agreement system, method, and apparatus
A key agreement system, method, and apparatus are provided. The method includes: generating, by a first device, a private-public key pair, sending a public key in the private-public key pair to a second device, and receiving a ciphertext and a commitment value; obtaining, by the first device, a first result, obtaining an original key based on a private key in the private-public key pair and the ciphertext, determining a second bit string based on some bits in the original key, calculating a second result based on the second bit string and the first result, and sending the second result to the second device; and receiving, by the first device, an opening value, performing authentication on the second device based on the opening value and the commitment value to obtain an authentication result, and generating a session key used to communicate with the second device.
System and method for a distributed ledger for base station slicing using blockchain
A system and method for reliable and secure record keeping for Radio Access Network (RAN) capacity sharing amongst a plurality of operators using slicing methods according to 3GPP 5G specifications, wherein slicing is controlled by a RAN controller is disclosed. The record keeping system is a distributed Blockchain ledger in which a block specifies information pertaining to available, leased or purchased base station slice(s). The ledger is immutable and available to all operators through a distributed database hosted by each participant wherein each base station owner advertises its leased as well as unused base station capacity at a specific time using blocks in the Blockchain. In an embodiment, the RAN controller directly feeds the information needed to form a new block into the ledger whenever the slicing profile of a RAN changes, thereby making the ledger in complete synchronicity with the network.
FAST BILATERAL KEY CONFIRMATION
A method for creating a secure channel between devices for secure communication therebetween. The method comprises transmitting a first nonce from an initiator device to a responder device; receiving, at the initiator device, a second nonce and an identity of the responder device; transmitting an identity of the initiator device and a first set of one or more encrypted data objects from the initiator device to the responder device; receiving, at the initiator device, a second set of one or more encrypted data objects from the responder device; and generating, at the initiator device, a session key for secure communication between the initiator and responder devices.
Homomorphic encryption device and ciphertext arithmetic method thereof
A homomorphic encryption device includes: a recryption parameter generating circuit, a recryption circuit, and an arithmetic circuit. The recryption parameter generating circuit is configured to generate a recryption parameter including a plurality of recryption levels respectively for a plurality of ciphertexts based on an arithmetic scenario including information about an arithmetic schedule between the plurality of ciphertexts. The recryption circuit is configured to generate a plurality of recrypted ciphertexts by recrypting each of the plurality of ciphertexts to a corresponding recryption level based on the recryption parameter. The arithmetic circuit is configured to output an arithmetic result by performing operations by using the plurality of recrypted ciphertexts, according to the arithmetic scenario.
Physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas
A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit b.sub.k with M.sub.S bits, maps the key bit b.sub.k into a key symbol K, and performs an XOR on the key bit b.sub.k and to-be-transmitted confidential information b to obtain an encrypted bits b.sub.s; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s.sub.1, . . , s.sub.N) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
Blockchain based secure software updates for IoT devices
Methods and systems for provable, auditable and secure software updates for resource-constrained IoT devices are provided via a security framework and a protocol for owner-controlled software updates for IoT devices through blockchain.
ENCRYPTION, DECRYPTION, AND METHOD INVOLVING DIOPHANTINE EQUATION AND COMMUNICATION THEREOF BY WAVE TRANSMISSION
Embodiments of the invention relate to symmetric encryption that converts plain text to Diophantine equations, i.e. cipher text, and communication of the Diophantine equations by electromagnetic, mechanical and/or matter waves or signals. More particularly, at least one wave characteristic of electromagnetic, mechanical and/or matter waves or signals are utilised to define the Diophantine equations.
Distributed ledger for peer-to-peer cloud data asset valuation
An apparatus comprises at least one processing device having a processor coupled to a memory. The processing device is configured to implement a first ledger node of a first cloud. The first ledger node of the first cloud is configured to communicate over one or more networks with a plurality of additional ledger nodes associated with respective additional clouds. The first ledger node is further configured to obtain a transaction associated with a valuation of a data asset. The first ledger node is further configured to broadcast the valuation transaction to the additional ledger nodes. A cryptographic block characterizing at least the valuation transaction is generated and entered into a blockchain distributed ledger collectively maintained by the first and additional ledger nodes. The first and additional ledger nodes collectively maintain the blockchain distributed ledger on a peer-to-peer basis without utilizing a centralized transaction authority.
Determining an environmental parameter from sensor data of a plurality of automobiles using a cellular network
An automobile device receives first data from one or more transmitters located in an automobile. A random access preamble is transmitted on an uplink carrier to a base station in response to a pre-defined condition being met based on at least one of the following: the first data; a value of an internal timer; and a user input. A first message is transmitted to a network server via the base station over a bearer. The first message is configured to trigger establishment of a connection to the network server. A second message is received from the network server via the base station over the bearer. The second message is configured to cause transmission of the first data to the network server. The first data is transmitted to the base station via an established bearer.