H04L9/008

MAPPING KEYS TO A BLOCKCHAIN OVERLAY NETWORK
20230046315 · 2023-02-16 ·

A method of managing an overlay network overlaid on data-storage transactions of a blockchain, whereby data content of the overlay network is stored in payloads of the data-storage transactions and overlay-layer links are defined between the data-storage transactions. The method comprises identifying a graph structure of the overlay network, wherein nodes corresponds to different ones of the data-storage transactions and edges correspond to the links. Each node is associated with a respective first key for signing an input of a child data-storage transaction to authorise writing the child to the blockchain. The method further comprises using a child key derivation, CKD, function to determine a hierarchical set of second keys having the same graph structure as the overlay network, wherein the second keys enable an additional function other than signing inputs of the data-storage transactions.

DATA PROCESSING METHOD, APPARATUS, AND SYSTEM, DEVICE, AND MEDIUM
20230046195 · 2023-02-16 ·

A data providing apparatus obtains first privacy data and second privacy data, encrypts the first privacy data by using an encryption algorithm to obtain a ciphertext of the first privacy data, and sends the ciphertext of the first privacy data and the second privacy data to a data processing apparatus. The data processing apparatus inputs the ciphertext of the first privacy data and the second privacy data into a ciphertext computation function to obtain a ciphertext of a data processing result. In this way, the first privacy data is used in computation in a ciphertext form, thereby ensuring security. In addition, the second privacy data is used in computation in a plaintext form, thereby reducing ciphertext input for the ciphertext computation function.

METHOD FOR ENCRYPTING DATABASE SUPPORTING COMPOSABLE SQL QUERY
20230048229 · 2023-02-16 ·

Disclosed is a database encryption method supporting composable SQL query, which mainly comprises the following steps: (1) a user encrypting and preprocessing data based on the encryption scheme provided by the present disclosure and uploading an encryption result and preprocessed data to a service provider; (2) setting and uploading a SQL query instructions: the user uploads the query instruction to the service provider according to actual needs, and uploads auxiliary parameters for the query instruction at the same time; (3) data query: the service provider performs SQL query according to the query instruction and auxiliary parameters received from the user, saves a calculation result, updates the data and returns a query result to the user.

ANONYMOUS MESSAGE BOARD
20230049001 · 2023-02-16 · ·

A method of facilitating an anonymous message board may include receiving a secret key share associated with a published public key. An initial table state may be generated by encrypting, via the public key, an initial table including a table index and table initial values. A user post encrypted via the public key may be received, the user post including a message and a message index value. The initial table state may be updated to an updated table state by replacing an initial table value of the initial table values with the message. In response to a time interval associated with a predetermined length of time expiring after generating the initial table state, the updated table state may be partially decrypted via the first secret key share as a partially decrypted table. The partially decrypted table may be broadcast.

EFFICIENT CONVOLUTION IN AN ENVIRONMENT THAT ENFORCES TILES
20230053311 · 2023-02-16 ·

A method comprising: receiving an input tensor having a shape defined by [n.sub.1, ...,n.sub.k], where k is equal to a number of dimensions that characterize the input tensor; receiving tile tensor metadata comprising: a tile tensor shape defined by [t.sub.1, ..., t.sub.k], and information indicative of an interleaving stride to be applied with respect to each dimension of the tile tensor; constructing an output tensor comprising a plurality of the tile tensors, by applying a packing algorithm which maps each element of the input tensor to at least one slot location of one of the plurality of tile tensors, based on the tile tensor shape and the interleaving stride, wherein the interleaving stride results in non-contiguous mapping of the elements of the input tensor, such that each of the tile tensors includes a subset of the elements of the input tensor which are spaced within the input tensor according to the interleaving stride.

Blockchain-based trustable guarantees

Disclosed herein are methods, systems, and apparatus for processing blockchain-based guarantee information. One of the methods includes receiving a first cyphertext of a first digital document specifying a guarantee from a first computing device associated with at least a first guarantor and one or more zero-knowledge proofs (ZKPs) related to one or more values associated with the guarantee, and the first digital document specifies one or more predetermined conditions of executing the guarantee; verifying that the one or more ZKPs are correct; storing the first cyphertext to a blockchain based on performing a consensus algorithm; receiving a first message from a second computing device associated with a beneficiary or a representative of the beneficiary.

Adaptive co-distillation model
11580453 · 2023-02-14 · ·

A method for use with a computing device is provided. The method may include inputting an input data set into a first private artificial intelligence model generated using a first private data set and a second private artificial intelligence model generated using a second private data set. The method may further include receiving a first result data set from the first private artificial intelligence model and receiving a second result data set from the second private artificial intelligence model. The method may further include training an adaptive co-distillation model with the input data set and the first result data set. The method may further include training the adaptive co-distillation model with the input data set and the second result data set. The adaptive co-distillation model may not be trained on the first private data set or the second private data set.

Systems and methods for encrypting data and algorithms

Systems, methods, and computer-readable media for achieving privacy for both data and an algorithm that operates on the data. A system can involve receiving an algorithm from an algorithm provider and receiving data from a data provider, dividing the algorithm into a first algorithm subset and a second algorithm subset and dividing the data into a first data subset and a second data subset, sending the first algorithm subset and the first data subset to the algorithm provider and sending the second algorithm subset and the second data subset to the data provider, receiving a first partial result from the algorithm provider based on the first algorithm subset and first data subset and receiving a second partial result from the data provider based on the second algorithm subset and the second data subset, and determining a combined result based on the first partial result and the second partial result.

Homomorphic encryption offload for lightweight devices

Disclosed are systems, methods, devices, and computer-readable media for offloading lattice-based cryptographic operations to hybrid cloud computing system. In one embodiment, a method is disclosed comprising receiving a first network request from a client device via a secure application programming interface (API), the request including unencrypted data; encrypting the unencrypted data using an algorithm that generates homomorphically encrypted data; issuing a second network request to a second API of a cloud platform, the second network request including the encrypted data; receiving a response from the cloud platform in response to the second network request; and transmitting, in response to the first network request, a result to the client device based on the response, the result obtained by decrypting an encrypted output returned by the cloud platform.

PROVISION OF DIGITAL CONTENT VIA A COMMUNICATION NETWORK
20230041783 · 2023-02-09 ·

Methods and apparatus are disclosed for enabling digital content from a content provider (12, 5 14) to be provided via a communication network (10) from intermediate digital content stores (16) to user-devices (18). According to one aspect, the method comprises the content provider (12, 14) providing digital content encrypted using a cryptographic encryption key to an intermediate digital content store (16), the cryptographic encryption key being a public key of a key-pair and having an associated private key. In response to a request from a user-device (18) to the content provider (12, 14) for the digital content, a cryptographic session key is shared between the content provider (12, 14) and the requesting user-device (18). The content provider (12, 14) provides to the intermediate digital content store (16) the cryptographic re-encryption key and indications of the requested digital content and of the user-device (18).