Patent classifications
H04L9/14
SPLITTABLE BLOCKCHAIN BASED OWNERSHIP VERIFICATION
A method may include splitting an original token into a first sub-token and a second sub-token, generating a first hash value of the first sub-token and a first randomness value, and generating a second hash value of the second sub-token and a second randomness value. The method may also include evaluating an NIZKP regarding the split, and sampling first and second signature keys and verification keys associated with the first and second sub-tokens, respectively. The method may additionally include generating first and second signed values of concatenations of the first and second hash values and the first and second verification keys, respectively, and signed using an initial signature key of a current owner of the original token. The method may additionally include sending the NIZKP, the first and second hash values, the first and second signed values, and the first and second verification keys to the blockchain.
SPLITTABLE BLOCKCHAIN BASED OWNERSHIP VERIFICATION
A method may include splitting an original token into a first sub-token and a second sub-token, generating a first hash value of the first sub-token and a first randomness value, and generating a second hash value of the second sub-token and a second randomness value. The method may also include evaluating an NIZKP regarding the split, and sampling first and second signature keys and verification keys associated with the first and second sub-tokens, respectively. The method may additionally include generating first and second signed values of concatenations of the first and second hash values and the first and second verification keys, respectively, and signed using an initial signature key of a current owner of the original token. The method may additionally include sending the NIZKP, the first and second hash values, the first and second signed values, and the first and second verification keys to the blockchain.
SECURE MANAGEMENT OF TRANSFERS OF DIGITAL ASSETS BETWEEN COMPUTING DEVICES USING PERMISSIONED DISTRIBUTED LEDGERS
The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely manage transfers of digital assets between computing devices using permissioned distributed ledgers. By way of example, an apparatus may receive, from a first device, a request to transfer a digital asset to a second device and a first digital signature applied to the request. Based on a validation of the first digital signature, the apparatus may approve the request and apply a second digital signature to the request and the first digital signature indicative of the approval of the request by the apparatus. The apparatus may also transmit the request, the first digital signature, and the second digital signature to a computing system, which may validate the first and second digital signatures and perform operations that record the first public key and asset data identifying the digital asset within at least one element of a distributed ledger.
PUBLIC/PRIVATE KEY SYSTEM WITH INCREASED SECURITY
Some embodiments are directed to a second cryptographic device (20) and a first cryptographic device (10). The first and second cryptographic devices may be configured to transfer a key seed. The key seed may be protected using a public key from one party and a private key from the other party. For example, a public key may be obtained from a private key through a noisy multiplication. At least one of the first and second cryptographic device may validate an obtained public key, e.g., to avoid leakage of the key seed or of a private key.
PUBLIC/PRIVATE KEY SYSTEM WITH INCREASED SECURITY
Some embodiments are directed to a second cryptographic device (20) and a first cryptographic device (10). The first and second cryptographic devices may be configured to transfer a key seed. The key seed may be protected using a public key from one party and a private key from the other party. For example, a public key may be obtained from a private key through a noisy multiplication. At least one of the first and second cryptographic device may validate an obtained public key, e.g., to avoid leakage of the key seed or of a private key.
DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND COMPUTER PROGRAM
Provided is a highly practical cryptographic technology which is capable of being used when encryption and decryption are performed in a single data processing device and which can be said to be unbreakable, or close to unbreakable. A data processing device is configured to generate encrypted data by encrypting processing target data and record the generated encrypted data in a predetermined recording medium, and to decrypt the encrypted data recorded in the recording medium back into the processing target data. The processing target data is data of a text. Encryption is performed in units of plaintext split data generated by splitting the processing target data into pieces having a predetermined number of bits. The units of the splitting are equal to or shorter than a bit length of a code for identifying characters in the text.
METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.
METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.
AUTHENTICATION PROCESSING SERVICES FOR GENERATING HIGH-ENTROPY CRYPTOGRAPHIC KEYS
Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.
AUTHENTICATION PROCESSING SERVICES FOR GENERATING HIGH-ENTROPY CRYPTOGRAPHIC KEYS
Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.