Patent classifications
H04L9/3066
Secure firmware transfer for an integrated universal integrated circuit card (iUICC)
A device can (i) operate a primary platform (PP) within a tamper resistant element (TRE) and (ii) receive encrypted firmware images for operating within the primary platform. The TRE can store in nonvolatile memory of the TRE (i) a PP static private key (SK-static.PP), (ii) a server public key (PK.IDS1), and (iii) a set of cryptographic parameters. The TRE can generate a one-time PKI key pair of SK-OT1.PP and PK-OT1.PP and send the public key PK-OT1.PP to a server. The TRE can receive a one-time public key from the server comprising PK-OT1.IDS1. The TRE can derive a ciphering key using an elliptic curve Diffie Hellman key exchange and the SK-static.PP, SK-OT1.PP, PK.IDS1, and PK-OT1.IDS1 keys. The TRE can decrypt the encrypted firmware using the derived ciphering key. The primary platform can comprise a smart secure platform (SSP) and the decrypted firmware can comprise a virtualized image for the primary platform.
USER INPUT DURING AN ELECTRONIC DATA TRANSFER
Approaches for display of a user input field on a data originating device during a data transfer are disclosed herein. The data originating device can be positioned within a proximity of a data receiving device to initiate a data transfer between the data originating device and the data receiving device. A secure channel may be established between the data originating device and the data receiving device to exchange information related to the user input field in some embodiments.
CRYPTOGRAPHIC BINDING OF NATIVE APPLICATION AND EXTERNAL BROWSER SESSIONS
Systems and methods are provided for receiving information associated with a final single sign-on page from a native browser, extracting a public key from the information associated with the final single sign-on page, generating a single sign-on token to bind a browser session and a native application session, associating the single sign-on token with the public key extracted from the information associated with the final single sign-on page, and encrypting the single sign-on token with the public key to bind the browser session and the native application session.
Method of constructing a public-key system in QAP-based homomorphic encryption
A public-key scheme of Homomorphic Encryption (HE) in the framework Quotient Algebra Partition (QAP) comprises: encryption, computation and decryption. With the data receiver choosing a partition or a QAP, [n, k, C], a public key Key.sub.pub=(VQ.sub.en, Gen.sub..sup.†P.sup.† are produced, where VQ.sub.en is the product of an n-qubit permutation V and an n-qubit encoding operator Q.sub.en, Gen.sub.
, which is transmitted to the cloud. The receiver prepares the instruction of encoded computation U.sub.en=P
V.sup.†Q.sub.en.sup.† for a given k-qubit action M and sends to cloud, where
is the error-correction operator of [n, k, C],
=I.sub.2.sub.
the complex-transposes of VQ.sub.en and
METHOD AND SYSTEM FOR CHEON RESISTANT STATIC DIFFIE-HELLMAN SECURITY
A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
METHODS AND SYSTEMS FOR COMPRESSED ENCRYPTION
Disclosed herein are method and systems for transmitting a plurality of ciphertexts to a plurality of users. The systems and methods described herein provide for performing an encryption update comprising a plurality of encryption keys and a multi-ciphertext to a plurality of recipient nodes. Methods and systems for organizing a database are also disclosed herein.
QUORUM-BASED AUTHORIZATION
A framework for managing authorization for performance of actions with a computing system. For example, techniques for performing authorization of users and/or clients for access to an infrastructure service provided by a cloud servicer provider (CSP) and/or for performance of actions with the infrastructure service.
Approximate algebraic operations for homomorphic encryption
Disclosed herein are system, method, and computer program product embodiments for performing a set of operations on one or more encrypted numbers to be an approximation of performing an algebraic operation on the one or more encrypted number. A server can receive from a client, a public key of a fully homomorphic encryption scheme and one or more encrypted numbers, and perform a set of operations comprising a square root function, a rectified linear activation function (ReLU), or a multiplicative inverse function on the one or more encrypted numbers to generate an encrypted operational result. The encrypted operational result generated by the set of operations can be an approximation of performing an algebraic operation on the one or more encrypted number. The server can further transmit to the client the encrypted operational result.
METHOD FOR TRANSMITTING AND RECEIVING CONSUMPTION DATA AND DEVICES IMPLEMENTING SAID METHODS
A method for transmitting consumption data by a meter to a meter data management system is described. The meter obtains (S301) consumption data, the data being obtained by metrology software. It generates (S302) a hashcode from a triplet comprising a serial number of the meter, a cyclic redundancy code calculated from the metrology software and a certificate number certifying that the meter is authorised to be used for invoicing consumption. It next encrypts (S304) the hashcode with a private key known solely to the meter, in order to obtain a signature. Finally, it transmits (S306), to the system managing said consumption data, a frame comprising an identifier of the meter, the consumption data obtained and the signature.
Cryptographic processing events for encrypting or decrypting data
A cryptographic method is provided. The cryptographic method comprises an initialisation phase for determining a provisional generator point G′ equal to a first product G′=[d′]G, where d′ is a first random scalar forming a secret key of N bits and G is a generator point of an elliptical curve, and determining a provisional key Q′ equal to a second product Q′=[d′]Q, where Q is a point of the elliptical curve forming a public key. During an encryption phase a second random scalar forming a second secret key k of M bits, with M<N; a public key P is calculated such that P=[k]G′; a coordinate of an intermediate point SP1, of the elliptical curve, equal to a fourth product SP1=[k]Q′; at least one key by application of a derivation function (F1); and data (T1) are encrypted based on said at least one key.