Enhanced Security for Existing Public Key Infrastructure

    公开(公告)号:US20240267198A1

    公开(公告)日:2024-08-08

    申请号:US18040215

    申请日:2021-08-01

    CPC classification number: H04L9/002 H04L9/006 H04L9/0662

    Abstract: Systems, methods, network devices, and machine-readable media disclosed herein perform chosen ciphertext attack secure encryption given any public key infrastructure that has been established with only chosen plaintext attack security. The resulting chosen ciphertext attack secure encryption makes black-box use of the chosen plaintext attack secure scheme and other underlying primitives, and specifically new public keys do not need to be created or distributed.

    SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR GENERATING PSEUDO RANDOM NUMBERS

    公开(公告)号:US20240097883A1

    公开(公告)日:2024-03-21

    申请号:US17791806

    申请日:2021-01-06

    CPC classification number: H04L9/0662 G06F7/586

    Abstract: Described embodiments relate to systems and method for conditioning, de-biasing and/or whitening raw entropy data or for hashing data. The method comprises receiving data; determining at least a first algebraic number from the data; calculating at least one solution to one or more transcendental equations using the at least the first algebraic number as an input parameter value, wherein the one or more transcendental equations comprise a transcendental function that is capable of generating transcendental number outputs from algebraic number inputs; determining one or more sequences of pseudo random numbers based on the at least one solution; and determining an output based on the one or more sequences of pseudo random numbers. For example, the data may be received from a raw entropy source and comprise raw entropy to be transformed. Alternatively, the data may be data to be hashed and the output may comprise a hash of the data.

    Anonymized data transmission using per-user-functionality secret shares

    公开(公告)号:US11909871B1

    公开(公告)日:2024-02-20

    申请号:US17813801

    申请日:2022-07-20

    Inventor: Gregory Frasco

    Abstract: There is a need for more effective and efficient secure data transmission. This need can be addressed by, for example, solutions for secure data transmission that utilize per-user-functionality secret shares. In one example, a method includes generating a hashed user identifier based on a received user identifier; transmitting the hashed user identifier to an external computing entity; and receiving a data retrieval secret share from the external computing entity, wherein: (i) the data retrieval secret share is selected from a plurality of per-user-functionality secret shares, (ii) the plurality of per-user-functionality secret shares are generated based on a secret value, (iii) the secret value is generated based on the hashed user identifier, (iv) the secret value is used to generate a user data private key, and (v) the external computing entity is configured to encrypt user-provided data using the user data private key prior to transmission of the encrypted user-provided data.

    Privately querying a database with private set membership using succinct filters

    公开(公告)号:US11909861B2

    公开(公告)日:2024-02-20

    申请号:US18189187

    申请日:2023-03-23

    Applicant: Google LLC

    CPC classification number: H04L9/0662 G06F21/6227

    Abstract: A method includes obtaining, from a server, a filter including a set of encrypted identifiers each encrypted with a server key controlled by the server. The method includes obtaining a request that requests determination of whether a query identifier is a member of a set of identifiers corresponding to the set of encrypted identifiers. The method also includes transmitting an encryption request to the server that requests the server to encrypt the query identifier. The method includes receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key and determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers. When the encrypted query identifier is not a member of the set of encrypted identifiers, the method includes reporting that the query identifier is not a member of the set of identifiers.

    Server device, communication terminal, communication system, and program

    公开(公告)号:US11902421B2

    公开(公告)日:2024-02-13

    申请号:US17287101

    申请日:2019-10-15

    Abstract: A server device includes a memory and a processor to execute saving an encrypted text of a message generated by encrypting the message with a message key generated from a shared key and a group identifier, by using a message key identifier as an identifier of the message key as a key; saving an encrypted text of the message key generated by encrypting the message key to be re-encryptable by using the shared key, by using the message key identifier as a key; and receiving, after update of the shared key, a re-encryption key from a communication terminal that has generated the re-encryption key by using the shared key and the updated shared key, using the re-encryption key to generate a re-encrypted encrypted text of the message key, and overwriting the encrypted text of the message key before re-encryption with the re-encrypted encrypted text of the message key.

Patent Agency Ranking