H04L9/0618

Method and system for asynchronous side channel cipher renegotiation
11700243 · 2023-07-11 · ·

A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.

Customized view of restricted information recorded into a blockchain
11700265 · 2023-07-11 · ·

Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions and data access guidelines are received which govern access by a user to one or more of the data portions. A request to view one or more data portions of a block entry is received from the user. The data access guidelines for the user are applied to the request and the one or more data portions that are accessible by the request according to the data access guidelines are identified. A customized view of the block entry is generated which includes the one or more data portions determined to be accessible by the request.

RNS-BASED CKKS VARIANT WITH MINIMAL RESCALING ERROR

Methods and systems for reducing noise in homomorphic multiplication include: receiving a plurality of ciphertexts, each having a corresponding level; receiving data specifying a homomorphic multiplication on two ciphertexts; for two ciphertexts having different levels: adjusting a scaling factor of a first ciphertext so that the respective scaling factors of the two ciphertexts are the same; performing the homomorphic multiplication; and rescaling a result of the homomorphic multiplication; for two ciphertexts having the same level: performing the homomorphic multiplication; rescaling a result of the homomorphic multiplication; and using the scaling factors of the two ciphertexts during a decryption process.

Determining an Environmental Parameter From Sensor Data of a Plurality of Automobiles Using a Cellular Network
20230217252 · 2023-07-06 · ·

A computer server receives sensor data via a cellular wireless network from each of a plurality of automobiles in a geographical area. In each automobile of the plurality of automobiles the sensor data is received from sensors located in the respective automobile. The sensor data of the respective automobile may include a time stamp of the sensor data and at least one parameter of an external environment of the respective automobile. The computer server may further determine an external environmental parameter of the geographical area based on the sensor data received from the plurality of automobiles in the geographical area via the cellular wireless network. The external environmental parameter relates to the external environment of the plurality of automobiles in the geographical area. The computer server may transmit the external environmental parameter to multiple automobiles of the plurality of automobiles.

Machine learning based on homomorphic encryption

A method for evaluating data is based on a computational model, the computational model comprising model data, a training function and a prediction function. The method includes training the computational model by: receiving training data and training result data for training the computational model, and computing the model data from the training data and the training result data with the training function. The method includes predicting result data by: receiving field data for predicting result data; and computing the result data from the field data and the model data with the prediction function. The training data may be plaintext and the training result data may be encrypted with a homomorphic encryption algorithm, wherein the model data may be computed in encrypted form from the training data and the encrypted training result data with the training function. The field data may be plaintext, wherein the result data may be computed in encrypted form from the field data and the encrypted model data with the prediction function.

Distributed key secret for rewritable blockchain

A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple individually untrusted parties. The blockchains may include a series of blocks secured by integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret or individually-untrusted parties in possession of only a portion of the key secret. In some cases, multiple individually-untrusted parties may combine their portions into the key secret. As a group, the multiple individually-untrusted parties may perform non-tamper-evident operation with respect to at least one integrity code within the blockchain.

Multi-party threshold authenticated encryption

Systems and methods for threshold authenticated encryption are provided. A collection of cryptographic devices may encrypt or decrypt a message, provided that a threshold number of those devices participate in the encryption process. One cryptographic device may generate a commitment message and transmit it to the other selected devices. Those devices may each perform a partial computation using the commitment message, and transmit the partial computations back to the encrypting or decrypting device. The encrypting or decrypting device may use those partial computations to produce a cryptographic key, which may then be used to encrypt or decrypt the message.

SYSTEMS, METHODS, AND DEVICES FOR GENERATING DIGITAL AND CRYPTOGRAPHIC ASSETS BY MAPPING BODIES FOR N-DIMENSIONAL MONITORING USING MOBILE IMAGE DEVICES

Provided are systems, methods, and devices for generating digital and/or cryptographic assets. An initial state of an environment is acquired using sensors that includes a state of each sensor, a region of interest including a 3D body, and a state of light sources. The asset is associated with the 3D body. A plurality of boundary conditions associated with a workflow for capturing the asset is determined. A visualization of a set of boundary conditions is displayed on a display that includes a plurality of visual cues including first and second visual cues. Each respective visual cue provides a visual indication of a state of a corresponding boundary condition in the set of boundary conditions. At least one visual cue is updated when each boundary condition in the set of boundary conditions is satisfied. When satisfied, the workflow at the computer-enabled imaging device is executed, thereby capturing the asset.

Using error detection bits for cryptographic integrity and authentication

In some examples, a method includes receiving a plaintext message including plaintext data and error detection bits. The method also includes encrypting the plaintext message based on a feedback algorithm to generate an encrypted message including a set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication. The set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication can replace the error detection bits in whole or in part. A receiver can confirm the cryptographic integrity and the cryptographic authentication of the encrypted message by decrypting the set of encrypted bits.

Federated key management

A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system.