Patent classifications
H04L2209/466
RESOURCE STABILIZATION IN A DISTRIBUTED NETWORK
Systems and techniques are provided for a resource stabilization in a distributed network. A computing device in a distributed network may check the median value of a transactional resource in relation to a specified external resource. The computing device in the distributed network may compare the median value of the transactional resource to a threshold value for the transactional resource to determine whether the median value of the transactional resource is above the threshold value or below the threshold value. The supply of the transactional resource in the distributed network may be increased in response to determining that the transactional resource is above the threshold value or may be in response to determining that the transactional resource is below the threshold value.
Flexible content selection processes using secure multi-party computation
This document relates to using secure MPC to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. In one aspect, a method includes receiving, by a first server of a secure MPC system from a client device, a digital component request. The first server identifies, for each digital component in a set, a selection value and a priority tier. For each tier, the first server determines, using a secure MPC process in collaboration with one or more second servers of the secure MPC system, a first secret share of a winner parameter for each digital component in the priority tier. The first server identifies a highest tier for which a given digital component has a winner parameter that indicates that the given digital component is a winning digital component.
System and method for authenticating user identity
Methods and systems for authenticating profile data is described. The method includes obtaining information associated with a commitment (i) generated based on an attribute of a user and (ii) verified via a verification system implementing a zero-knowledge (ZK) proof. The method also includes authenticating an identity of the user, and signing, based on the authentication of the identity of the user, a transaction on a blockchain.