Patent classifications
H04L9/3255
Secure multiparty computation for Internet of Things communications
Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.
Systems and methods for generating signatures
System and method for digitally signing messages using multi-party computation.
Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust
A method of determining a confidence level associated with a device using heuristics of trust includes receiving, by an evaluating device, at least a communication from a first remote device, determining, by the evaluating device, an identity of the first remote device as a function of the at least a communication, calculating, by the evaluating device, at least a heuristic of trust as a function of the at least a communication and the identity, assigning, by the evaluating device, a first confidence level to the first remote device as a function of the at least a heuristic of trust, and assigning, by the evaluating device, an access right as a function of the first confidence level.
Blockchain controlled cross-domain data transfer
An example operation may include one or more of receiving a data file with off-chain content that originated in a first security domain of a multi-domain blockchain network, verifying that the on-chain and off-chain content satisfies a cross-domain security policy between the first security domain and a second security domain within the multi-domain blockchain network with a different security policy than the first security domain, in response to verifying the on-chain and off-chain content, signing the on-chain portion of the data file with a signature of a cross-domain endorsement peer, transmitting the signed on-chain portion of the data file to an ordering service of the multi-domain blockchain network, and transmitting the off-chain portion of the data file to a cross-domain content controller in the first security domain.
Rapid and secure off-ledger cryptocurrency transactions through cryptographic binding of a private key to a possession token
Disclosed is a method, a device, and/or a system of rapid and secure off-ledger cryptocurrency transactions through cryptographic binding of a private key to a possession token. In one embodiment, a method for rapid and secure ledger-less transfer of a quantity of cryptocurrency includes generating a public-private key pair, securely storing the private key and utilizing the public key as a public address. The method verifies a ledger transaction on a distributed ledger network associated the quantity of cryptocurrency with the public address. The method generates a possession token having a state indicated by a state indicator. The state evolves upon transfer between two computing devices. The method cryptographically associates the ledger token and the possession token through incorporation of the public address into data generating the state indicator. The possession token is transferred to a computing device over the network while retaining the private key in secure custody.
Secure communication method, client and non-public server
Embodiments of the present disclosure provide a secure communication method, a client and a non-public server. The secure communication method includes: generating a set of destination addresses of a non-public server based on an IPv6 prefix of the non-public server, and a signature string and a user ID of a client, wherein the signature string is obtained by signing an IPv6 address and the user ID of the client based on a private key of the client; initiating a set of connection request to the non-public server based on a set of communication connections containing the set of destination addresses, for the non-public server to determine a public key corresponding to a user ID based on the user ID in the set of destination addresses, verifying the set of communication connections based on the public key, and establishing communication when the verification of the set of communication connections passes.
ANONYMOUS EVENT ATTESTATION
Methods, systems, and computer media provide attestation tokens that protect the integrity of communications transmitted from client devices, while at the same time avoiding the use of stable device identifiers that could be used to track client devices or their users. In one approach, client devices can receive batches of N device integrity elements from a device integrity computing system, each corresponding to a different public key. The N device elements can be signed by a device integrity computing system. The signing by the device integrity computing system can be signing with a blind signature scheme. Client devices can include throttlers imposing limits on the quantity of attestation tokens created by the client device.
METHOD AND SYSTEM FOR DIGITAL SIGNATURES UTILIZING MULTIPLICATIVE SEMIGROUPS
A method for verification at a computing device of a signed message received from a first party over a public communications channel, the method including extracting a message digest “a” belonging to a semigroup from the signed message; obtaining a public key [c,e] for the first party, including a fixed value checker “c” and an endpoint “e”, checker “c” and endpoint “e” belonging to the semigroup and the endpoint comprising a multiplication of a private key “b” for the first party and the checker “c”, multiplying the message digest “a” and the endpoint “e” to create an endmatter “ae”; extracting a signature “d” from the signed message, the signature “d” belonging to the semigroup and being a multiplication of message digest “a” and private key “b”; multiplying the signature “d” and the checker “c” to create a signcheck “dc”; and verifying that the endmatter “ae” matches the signcheck “dc”.
USING PKI FOR SECURITY AND AUTHENTICATION OF CONTROL DEVICES AND THEIR DATA
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.
SYSTEM AND METHOD FOR AUTHENTICATING DIGITAL TRANSACTION BY IMPLEMENTING MULTI-PARTY COMPUTATION PROTOCOL
Disclosed is a system (100, 200) for authenticating a digital transaction by implementing a multi-party computation protocol. The system comprises a first set of first nodes (102) configured to generate a first data (104), wherein each of the first nodes, from the first set of first nodes, in a second set of first nodes (102A) is an independent party and a server arrangement (106) communicably coupled with the first set of first nodes. The server arrangement is configured to receive the first data from the first set of first nodes, generate a second data (108), verify whether a number of other of the first nodes (102B) not in the second set of first nodes is equal to or at most only one greater than a number of first nodes in the second set of first nodes and authenticate the digital transaction based on the verification, using the secret shares in the first data and the second data.