摘要:
Various method and system embodiments of the present invention are directed to executing bit-commitment protocols. In one embodiment of the present invention, a method for executing a bit-commitment protocol for transmitting a bit from a first party to a second party comprises preparing a three qubits are entangled in a W-state, and storing a first of the three qubits in a first storage device controlled by the first party, a second of the three qubits is stored in a second storage device controlled by the second party, and a third of the three qubits is stored in a third storage device controlled by a third party. The bit is revealed to the second party by transmitting the first and third qubits to the second party and measuring the states of the three qubits to which of the entangled W-states the three qubits are in.
摘要:
A cryptographic method and apparatus is provided in which an identifier-based encryption process is used to encrypt a message with an identifier string that specifies conditions to be checked by a trusted entity before providing a decrypted form of the encrypted message, or enabling its decryption. A further trusted entity is used to verify the identity of the message sender as indicated by a further identifier string, and to provide the sender with a secret key that the sender uses to generate complimentary signature components. These signature components are sent along with the encrypted message and are used, along with other data including the first identifier string and a public key of the further trusted entity, to authenticate the identity of the message sender.
摘要:
In one implementation, computer executable instructions are provided to identify a group of instructions corresponding to a code block for an executable module. The instructions increment a counter associated with the code block to indicate the code block has been tested.
摘要:
A method includes executing a hypervisor (165) with computing hardware (105) to implement a virtual machine (175); responsive to detecting a removable storage medium (115) communicatively coupled to the computing hardware (105), executing a virtualized migration control appliance (180) through the hypervisor (165) separate from the virtual machine (175); and blocking the virtual machine (175) from accessing data (185) stored by the removable storage medium (115) with the virtualized migration control appliance (180) if at least one governing policy prohibits the virtual machine (175) from accessing the data (185).
摘要:
A method for conducting a privacy ensured computerized poll includes, in a computerized anonymizing system (100), receiving a list (404) of invited participants (418) of said computerized poll, said list (404) comprising at least one address (202, 204) for each said participant (418). With said computerized anonymizing system (100), assigning each invited participant (418) in said poll at least one character string (410, 412) and transmitting to each invited participant (418) said at least one character string (410, 412) assigned to said participant (418) using said at least one address (202, 204). With said computerized anonymizing system (100), generating a list (408) comprising an entry for each said at least one character string (410, 412) assigned to one of said invited participants (418) and shuffling an order of said entries, and providing said shuffled list (408) to a poll initiator (402).
摘要:
Various method and system embodiments of the present invention are directed to executing bit-commitment protocols. In one embodiment of the present invention, a method for executing a bit-commitment protocol for transmitting a bit from a first party to a second party comprises preparing a three qubits are entangled in a W-state, and storing a first of the three qubits in a first storage device controlled by the first party, a second of the three qubits is stored in a second storage device controlled by the second party, and a third of the three qubits is stored in a third storage device controlled by a third party. The bit is revealed to the second party by transmitting the first and third qubits to the second party and measuring the states of the three qubits to which of the entangled W-states the three qubits are in.
摘要:
An identifier-based public/private key pair is generated for a first party with the involvement of a trusted authority that has an associated secret. An identifier of the first party is signed by the trusted party to produce a multi-component signature. This signature is converted into the first-party identifier-based key pair; the private key of this key pair comprises a component of the signature provided confidentially to the first party, and the public key being formed using at least another component of the signature and the first-party identifier. The signature used by the trusted authority is, for example, a Schnorr signature or a DSA signature.
摘要:
Identifier-based signcryption methods and apparatus are disclosed both for signing and encrypting data, and for decrypting and verifying data. The signcryption methods use computable bilinear mappings and can be based, for example, on Weil or Tate pairings. A message sender associated with a first trusted authority carries out integrated signing/encryption processes to send a signed, encrypted message to an intended recipient associated with a second trusted authority. The recipient then carries out integrated decryption/verification processes to recover the original message and verify its origin.
摘要:
First data to be sent by a first party to a second party is encrypted using public data of a trusted party and an encryption key string formed using at least a hash value generated by hashing at least one condition that typically serves as an identifier of an intended recipient of the first data. The encrypted first data is provided to a data recipient who requests a decryption key from the trusted party. The trusted party is responsible for verifying that the recipient meets the specified conditions before providing the decryption key. A valid decryption key is only provided if the correct conditions have been supplied to the trusted party.
摘要:
A method includes executing a hypervisor (165) with computing hardware (105) to implement a virtual machine (175); responsive to detecting a removable storage medium (115) communicatively coupled to the computing hardware (105), executing a virtualized migration control appliance (180) through the hypervisor (165) separate from the virtual machine (175); and blocking the virtual machine (175) from accessing data (185) stored by the removable storage medium (115) with the virtualized migration control appliance (180) if at least one governing policy prohibits the virtual machine (175) from accessing the data (185).