Patent classifications
H04L9/0656
Partial Cryptographic Key Transport Using One-Time Pad Encryption
A method of securely encrypting data whereby a computing device can utilize a seed and a pin to generate a mantissa of an irrational number. The computing device can then utilize a portion of the mantissa as a one-time pad to encrypt data. The seed can be transmitted to a recipient via a graphical code to enable secure decryption by a recipient’s computing device.
Managing information for model training using distributed blockchain ledger
Embodiments are directed to generating and training a distributed machine learning model using data received from a plurality of third parties using a distributed ledger system, such as a blockchain. As each third party submits data suitable for model training, the data submissions are recorded onto the distributed ledger. By traversing the ledger, the learning platform identifies what data has been submitted and by which parties, and trains a model using the submitted data. Each party is also able to remove their data from the learning platform, which is also reflected in the distributed ledger. The distributed ledger thus maintains a record of which parties submitted data, and which parties removed their data from the learning platform, allowing for different third parties to contribute data for model training, while retaining control over their submitted data by being able to remove their data from the learning platform.
Secure cryptographic system for datalinks
The present disclosure provides a system for securing wireless data communication. The system includes a launcher and a projectile. The launcher has a random number generator, a launcher memory, a launcher encryption/decryption module, and a launcher transceiver. The projectile has a projectile memory, a projectile encryption/decryption module, and a projectile transceiver. Both the launcher encryption/decryption module and the projectile encryption/decryption module are configured to use the one-time pad to encrypt and to decrypt data. The system is configured to establish a temporary datalink at a point in time in which the projectile and the launcher are substantially collocated so that the one-time pad can be transmitted from random number generator located in the launcher to the projectile memory using the temporary datalink.
Quantum resistant blockchain with multi-dimensional quantum key distribution
A system for generating a blockchain including an input for receiving a plurality of groups of data. Blockchain processing circuitry generates the blockchain for the plurality of groups of data. The blockchain processing circuitry generates the blockchain by performing a first hash using the first group of data and a first nonce as an input to a hash function to generate a first digital signature for a first block, wherein the hash function uses encryption based on quantum key distribution and orbital angular momentum. The blockchain processing circuitry establishes the first block of the blockchain using the first group of data, the first nonce and the first digital signature. The blockchain processing circuitry performs a second hash using the second group of data, a second nonce and the first digital signature as an input to the hash function to generate a second digital signature for the second block, wherein the hash function uses encryption based on the quantum key distribution and the orbital angular momentum. The circuitry establishes the second block of the blockchain using the second group of data, the second nonce, the first digital signature and the second digital signature.
SYSTEMS AND METHODS FOR TRUSTWORTHY ELECTRONIC AUTHENTICATION USING A COMPUTING DEVICE
A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor. An encryption key-generation key is created cryptographically using the Device-ID and stored locally, which together with the user's cryptographic signatures are encrypted with a one-time-pad encryption key obtained from the RAS on a communication channel different from that used for other communication between the device and the RAS to provide perfect secrecy, then transmitted from the device to the RAS on a connection therebetween to register said shared-secrets.
GENERATING UNIQUE CRYPTOGRAPHIC KEYS FROM A POOL OF RANDOM ELEMENTS
A system and method for encryption key generation by receiving a plaintext message having a fixed character length and receiving, from a source, a plurality of random number. A matrix is created from the plurality random numbers and has at least one of the number of rows or columns equal to or greater than the character length. An array that can be used as an encryption key or a seed for an encryption key is generated by selecting an initial element within the matrix, selecting subsequent elements using a selection technique until a number of elements in the array is equal to the character length and rejecting any previously selected elements from the array.
Encrypted search with no zero-day leakage
A method for providing encrypted search includes receiving, at a user device associated with a user, a search query for a keyword that appears in one or more encrypted documents stored on an untrusted storage device and accessing a count table to obtain a count of documents that include the keyword. The method also includes generating a delegatable pseudorandom function (DPRF) based on the keyword, a private cryptographic key, and the count of documents. The method also includes evaluating a first portion of the DPRF and delegating a remaining second portion of the DPRF to the untrusted storage device which causes the untrusted storage device to evaluate the DPRF and access an encrypted search index associated with the documents. The untrusted storage device determines one or more encrypted documents associated with DPRF and returns, to the user device, an identifier for each encrypted document associated with the DPRF.
Light-based data encoding and/or decoding device
Provided is a data-coding apparatus that includes: a data-input line for receiving input data; a data scrambler having light sources coupled to the data-input line and modulated in accordance with the input data, and light sensors that receive light from the light sources; and at least one light-sensing processor coupled to the light sources and configured so as to selectively isolate light signals received from individual ones of the light sources based on at least one control signal input into such data scrambler. The light-sensing processor is dynamically controlled by the control signal(s) so as to rearrange words within the input data according to patterns that change in real time.
DEVICE FOR SUPPORTING HOMOMORPHIC ENCRYPTION OPERATION AND OPERATING METHOD THEREOF
A device for supporting a homomorphic encryption operation includes a ciphertext conversion circuit configured to convert first ciphertexts corresponding to a first operation size to second ciphertexts corresponding to a second operation size, different from the first operation size, to convert the operated ciphertext having the second operation size to a third ciphertexts corresponding to the first operation size, and to perform a homomorphic encryption operation on the second ciphertexts.
System and method for securely transmitting non-PKI encrypted messages
An embodiment of an automatic key delivery system is described, An automatic key delivery system comprises the following operations. Herein, a first token is generated and provided to a first network device. Thereafter, a first key value pair, including the first token and a first key segment of a cryptographic key, is received by a first relay server and a second key value pair, including the first token and a second key segment of the cryptographic key, is received from a second relay server. In response, a second token to be provided to the first relay server and the second relay server. Thereafter, the first and second key segment are returned from the first and second relay servers based on usage of the second token as a lookup in order to recover the cryptographic key for decryption of an encrypted content from the first network device.