-
公开(公告)号:US20240267198A1
公开(公告)日:2024-08-08
申请号:US18040215
申请日:2021-08-01
Applicant: NTT Research, Inc.
Inventor: Dakshita KHURANA , Brent Waters
CPC classification number: H04L9/002 , H04L9/006 , H04L9/0662
Abstract: Systems, methods, network devices, and machine-readable media disclosed herein perform chosen ciphertext attack secure encryption given any public key infrastructure that has been established with only chosen plaintext attack security. The resulting chosen ciphertext attack secure encryption makes black-box use of the chosen plaintext attack secure scheme and other underlying primitives, and specifically new public keys do not need to be created or distributed.
-
2.
公开(公告)号:US12034834B1
公开(公告)日:2024-07-09
申请号:US18113368
申请日:2023-02-23
Applicant: RANDAEMON sp. z o.o.
Inventor: Jan Jakub Tatarkiewicz , Wieslaw Bohdan Kuźmicz
CPC classification number: H04L9/0662 , H04L9/085 , H04L9/0869
Abstract: A method for encryption that combines the steganographic method of concealing data inside a truly random string of bits with a cryptographic key that allows for the random distribution of this data, essentially creating a symmetrical cipher.
-
公开(公告)号:US12003619B2
公开(公告)日:2024-06-04
申请号:US16883236
申请日:2020-05-26
Applicant: POLITECNICO DI TORINO , TOOTHPIC S.R.L.
Inventor: Magli Enrico , Coluccia Giulio , Valsesia Diego , Bianchi Tiziano
CPC classification number: H04L9/0662 , G06F21/602 , H04L9/0866 , H04L9/0869 , H04L9/3231
Abstract: A method and a user apparatus for the protection of confidential data, wherein the apparatus includes an image sensor and a processor configured for: capturing a plurality of images by way of the image sensor, generating a sensor fingerprint on the basis of the plurality of images, encoding at least a portion of the sensor fingerprint using an algorithm of random projections in such a way as to generate a compressed fingerprint, encrypting and/or decrypting the confidential data using the compressed fingerprint as a key.
-
公开(公告)号:US12000917B2
公开(公告)日:2024-06-04
申请号:US17423729
申请日:2020-01-21
Inventor: Xiaohong Joe Zhou , Zheng Zhong , Meryem Muge Karaman
IPC: G01V3/00 , G01R33/48 , G01R33/56 , G01R33/561 , G01R33/567 , G06F7/58 , H04L9/06 , H04L9/32 , H04L9/00
CPC classification number: G01R33/4824 , G01R33/5608 , G01R33/5611 , G01R33/5616 , G01R33/5673 , G06F7/588 , H04L9/0662 , H04L9/3239 , H04L9/3247 , H04L9/50
Abstract: A system and method for producing a series of time-resolved magnetic resonance (MR) images is set forth. The system can perform method steps of encoding spatial information into an MRI signal by manipulating a phase of the MRI signal within an MRI system, generating and outputting a phase-encoded MRI signal over time by digitizing a plurality of time points in the MRI signal, repeating the generating and outputting step for a plurality of phase-encoded signals, each phase-encoded signal in synchrony with a trigger, producing a plurality of digitized time points, and reconstructing a series of time resolved MR images, each image of the series of MR images at one specific time point selected from the plurality of digitized time points for each phase-encoded step. Each image in the series of time-resolved MR images corresponding to a specific time point in a cyclic event.
-
公开(公告)号:US11979488B2
公开(公告)日:2024-05-07
申请号:US17514135
申请日:2021-10-29
Inventor: Joo Hee Lee , Duk Jae Moon , Hyo Jin Yoon , Ji Hoon Cho , Seong Kwang Kim , Joo Young Lee , Jin Cheol Ha
CPC classification number: H04L9/0819 , G06F7/50 , G06F7/722 , G06F17/16 , H04L9/0631 , H04L9/0637 , H04L9/0662 , H04L9/0861 , H04L9/14 , H04L2209/24
Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.
-
6.
公开(公告)号:US20240098072A1
公开(公告)日:2024-03-21
申请号:US18513184
申请日:2023-11-17
Applicant: Listat Ltd.
Inventor: Ievgen Verzun , Richard K. Williams
CPC classification number: H04L63/0464 , G06F21/606 , H04L9/0662 , H04L9/34 , H04L63/102
Abstract: Software installed in the nodes in a communication network allows them to perform a “name server” function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a “task” function, which entails the receipt and transmission of the packets, and an “authority” function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
-
公开(公告)号:US20240097883A1
公开(公告)日:2024-03-21
申请号:US17791806
申请日:2021-01-06
Applicant: Mesinja Pty Ltd
Inventor: Robert Bede SHORTEN
CPC classification number: H04L9/0662 , G06F7/586
Abstract: Described embodiments relate to systems and method for conditioning, de-biasing and/or whitening raw entropy data or for hashing data. The method comprises receiving data; determining at least a first algebraic number from the data; calculating at least one solution to one or more transcendental equations using the at least the first algebraic number as an input parameter value, wherein the one or more transcendental equations comprise a transcendental function that is capable of generating transcendental number outputs from algebraic number inputs; determining one or more sequences of pseudo random numbers based on the at least one solution; and determining an output based on the one or more sequences of pseudo random numbers. For example, the data may be received from a raw entropy source and comprise raw entropy to be transformed. Alternatively, the data may be data to be hashed and the output may comprise a hash of the data.
-
公开(公告)号:US11909871B1
公开(公告)日:2024-02-20
申请号:US17813801
申请日:2022-07-20
Applicant: Liberty Mutual Insurance Company
Inventor: Gregory Frasco
CPC classification number: H04L9/085 , H04L9/0662 , H04L9/0825 , H04L9/0866 , H04L2209/50
Abstract: There is a need for more effective and efficient secure data transmission. This need can be addressed by, for example, solutions for secure data transmission that utilize per-user-functionality secret shares. In one example, a method includes generating a hashed user identifier based on a received user identifier; transmitting the hashed user identifier to an external computing entity; and receiving a data retrieval secret share from the external computing entity, wherein: (i) the data retrieval secret share is selected from a plurality of per-user-functionality secret shares, (ii) the plurality of per-user-functionality secret shares are generated based on a secret value, (iii) the secret value is generated based on the hashed user identifier, (iv) the secret value is used to generate a user data private key, and (v) the external computing entity is configured to encrypt user-provided data using the user data private key prior to transmission of the encrypted user-provided data.
-
公开(公告)号:US11909861B2
公开(公告)日:2024-02-20
申请号:US18189187
申请日:2023-03-23
Applicant: Google LLC
Inventor: Kevin Yeo , Joon Young Seo , Sarvar Patel
CPC classification number: H04L9/0662 , G06F21/6227
Abstract: A method includes obtaining, from a server, a filter including a set of encrypted identifiers each encrypted with a server key controlled by the server. The method includes obtaining a request that requests determination of whether a query identifier is a member of a set of identifiers corresponding to the set of encrypted identifiers. The method also includes transmitting an encryption request to the server that requests the server to encrypt the query identifier. The method includes receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key and determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers. When the encrypted query identifier is not a member of the set of encrypted identifiers, the method includes reporting that the query identifier is not a member of the set of identifiers.
-
公开(公告)号:US11902421B2
公开(公告)日:2024-02-13
申请号:US17287101
申请日:2019-10-15
Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
Inventor: Yuki Okano , Reo Yoshida , Tetsutaro Kobayashi
CPC classification number: H04L9/0662 , H04L9/0833 , H04L9/0869 , H04L9/0891 , H04L9/0894 , H04L63/0471
Abstract: A server device includes a memory and a processor to execute saving an encrypted text of a message generated by encrypting the message with a message key generated from a shared key and a group identifier, by using a message key identifier as an identifier of the message key as a key; saving an encrypted text of the message key generated by encrypting the message key to be re-encryptable by using the shared key, by using the message key identifier as a key; and receiving, after update of the shared key, a re-encryption key from a communication terminal that has generated the re-encryption key by using the shared key and the updated shared key, using the re-encryption key to generate a re-encrypted encrypted text of the message key, and overwriting the encrypted text of the message key before re-encryption with the re-encrypted encrypted text of the message key.
-
-
-
-
-
-
-
-
-