H04L9/065

ENCRYPTION SCHEMES WITH ADDRESSABLE ELEMENTS
20220045996 · 2022-02-10 ·

The present disclosure relates to implementations of physically unclonable functions (PUFs) for cryptographic and authentication purposes. Specifically, the disclosure describes implementations of systems using PUFs that may replace existing public key infrastructures (PKIs).

Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles

Systems and methods for partial frame encryption in accordance with embodiments of the invention are disclosed. In one embodiment, the method receives a video bitstream that includes several frames, each frame including several independently encoded compression units within the frame, encrypts a portion of each of several compression units in several frames, and generates an output bitstream that includes the several independently encoded compression units including the encrypted portions of the compression units.

Method and apparatus for processing data, computer device and storage medium
11397820 · 2022-07-26 ·

Some embodiments disclose a method and apparatus for processing data, a computer device and a storage medium. A method can include: acquiring, by a cloud storage system, a series of slices obtained by dividing a to-be-stored file; encrypting, by the cloud storage system, each slice by using a different data key; and storing, by the cloud storage system, an encrypted data ciphertext.

Radio having hybrid staring and non-staring architecture

A system may include a first radio comprising a first radio processor, a first radio modem, and a first radio transmitter configured to transmit non-hopping transmissions and hopping transmissions. The system may further include a second radio comprising a second radio processor, a second radio modem, and a second radio hopping receiver, wherein the second radio hopping receiver is a non-staring second radio receiver. The first radio may be configured to: receive a message and a destination for the message, the destination being the second radio; upon a determination that the destination has a non-staring receiver, store the message; determine a time interval start time for a cyclical hop pattern associated with the second radio; output the message from the memory to the first radio modem; output the message from the first radio modem to the first radio transmitter; and/or transmit the message to the second radio.

Multiparty secure computing method, device, and electronic device

Embodiments of a secure multi-party computation method applicable to any one computing node of a plurality of computing nodes deployed in a distributed network are provided. The plurality of computing nodes jointly participate in a secure multi-party computation based on private data held by each computing node. The computing node is connected to a trusted key source, and the method includes: obtaining a trusted key from the trusted key source; encrypting the private data held by the computing node based on the obtained trusted key to obtain ciphertext data; transmitting a computing parameter comprising at least the ciphertext data to other computing nodes participating in the secure multi-party computation, so that the other computing nodes perform the secure multi-party computation based on collected computing parameters transmitted by the computing nodes participating in the secure multi-party computation.

LOW LATENCY CALCULATION TRANSCRYPTION METHOD

A method for confidentially processing data stored on a platform is described. A transcryption module, receiving a request for access to a data block, transmits the access request to an access request prediction module which returns a list of data blocks. The transcryption module determines whether a corresponding key stream block is present in the cache. The homomorphic calculation module calculates homomorphic ciphertexts of key stream blocks corresponding to the data blocks of the list. The transcryption module transcrypts the data blocks by adding them with the homomorphic ciphertexts of the corresponding key stream blocks. The transcryption module transmits the data blocks thus transcrypted to the request management module.

PROTECTION OF A CIPHER ALGORITHM

A cryptographic device includes hardware data processing circuitry and software data processing circuitry coupled to the hardware data processing circuitry. The device, in operation, executes a plurality of rounds of a symmetrical data cipher algorithm and protects the execution of the plurality of rounds of the symmetrical data cipher algorithm. The protecting includes executing data masking and unmasking operations using the hardware data processing circuitry, executing linear operations applied to data using the software data processing circuitry, executing linear operations applied to masks using the hardware data processing circuitry, and executing non-linear operations applied to data using one of the hardware data processing circuitry or the software data processing circuitry.

Systems and methods for transcoding and place shifting media content

A set-top box (STB), digital video recorder (DVR), video player or other host device receives and interacts with a transcode module to provide enhanced transcoding capabilities that may be useful in placeshifting or other applications. The transcode module includes a host interface that couples to and communicates with the host device. The transcode module also includes a processor that receives an encrypted media stream from the host device via the bus interface, decrypts the encrypted media stream, transcodes the encrypted media stream to a different format, re-encrypts the transcoded stream, and provides the re-encrypted media stream to the host device via the host interface. The transcoded media content may be placeshifted to a remote player, stored at the host, or used for any other purpose.

Information encryption method and device

Disclosed are an information encryption method and device. A particular embodiment of the method comprises: acquiring customer information, wherein the customer information comprises an item number and a telephone number; selecting a random salt corresponding to the current date from a pre-generated random salt list, wherein the random salt list is used for storing a date and a random salt; using an irreversible encryption algorithm to encrypt the item number and the random salt corresponding to the current date so as to generate a first ciphertext; generating, based on the first ciphertext, a digital second ciphertext; and using the second ciphertext to process the telephone number so as to generate a first encrypted telephone number. This embodiment prevents private customer information from being leaked.

PRIVACY-ENHANCED DECISION TREE-BASED INFERENCE ON HOMOMORPHICALLY-ENCRYPTED DATA

A technique for computationally-efficient privacy-preserving homomorphic inferencing against a decision tree. Inferencing is carried out by a server against encrypted data points provided by a client. Fully homomorphic computation is enabled with respect to the decision tree by intelligently configuring the tree and the real number-valued features that are applied to the tree. To that end, and to the extent the decision tree is unbalanced, the server first balances the tree. A cryptographic packing scheme is then applied to the balanced decision tree and, in particular, to one or more entries in at least one of: an encrypted feature set, and a threshold data set, that are to be used during the decision tree evaluation process. Upon receipt of an encrypted data point, homomorphic inferencing on the configured decision tree is performed using a highly-accurate approximation comparator, which implements a “soft” membership recursive computation on real numbers, all in an oblivious manner.