Patent application number | Description | Published |
20140237253 | CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING COMMITMENTS FROM LINEARLY HOMOMORPHIC SIGNATURES - A processor of a device generates a cryptographic commitment by receiving a vector {right arrow over (m)}, a public verification key of a homomorphic signature scheme, and a tag; choosing a signature σ in the signature space; generating a commitment c by running the verification algorithm of the homomorphic signature scheme; and outputting the commitment c as intermediate values resulting from the verification algorithm. | 08-21-2014 |
20140237254 | CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING LINEARLY HOMOMORPHIC STRUCTURE-PRESERVING SIGNATURES - Generation of linearly homomorphic structure-preserving signature σ on a vector (M | 08-21-2014 |
20140270156 | CRYPTOGRAPHIC DEVICES AND METHODS FOR ENCODING-FREE ENCRYPTION ON ELLIPTIC CURVES - Encoding-free encryption on elliptic curves is obtained by a device having a processor choosing an integer r∈ | 09-18-2014 |
20150067340 | CRYPTOGRAPHIC GROUP SIGNATURE METHODS AND DEVICES - To generate a group signature on a message, a processor generates a two-level signature on an identity of the group member at the first level and the message at the second level; generates a commitment to the identity of the group member, commitments to each group element and a proof that the identity and the group elements satisfy a predetermined equation; encodes the identity of the group member in the group signature in a bit-wise manner using an identity-based encryption scheme where the message serves as the identity of the identity-based encryption scheme to produce a ciphertext; generates a first proof that the ciphertext encrypts the identity of the group member; generates a second proof that the encoded identity is an identity of a group member in a certificate signed by a group manager and that the certificate was used to generate the signature on the message at the second level; and outputs the group signature comprising the two-level signature, the commitments, the encoded identity of the group member and the proofs | 03-05-2015 |
20150100785 | METHOD FOR CIPHERING A MESSAGE VIA A KEYED HOMOMORPHIC ENCRYPTION FUNCTION, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - In one embodiment, it is proposed a method for ciphering a message by a sender device at destination to a receiver device, said method comprising using a keyed homomorphic encryption function associated with a public key of said receiver device. Such method is remarkable in that it comprises:
| 04-09-2015 |
20150100794 | METHOD FOR SIGNING A SET OF BINARY ELEMENTS, AND UPDATING SUCH SIGNATURE, CORRESPONDING ELECTRONIC DEVICES AND COMPUTER PROGRAM PRODUCTS - In one embodiment, it is proposed a method for signing a set of binary element comprising n elements, where n is an integer, by an electronic device. Such method is remarkable in that it outputs a signature associated to the set, that can be derived by the use of the public key when one or several new elements are added to the set. | 04-09-2015 |
20150154422 | METHOD FOR DETERMINING A STATISTIC VALUE ON DATA BASED ON ENCRYPTED DATA - In one embodiment, it is proposed a method for determining a statistic value, for a given time period t, on a set of n≧2 of plaintext data {x | 06-04-2015 |
20150270966 | AGGREGATOR-OBLIVIOUS ENCRYPTION OF TIME-SERIES DATA - A processor of a device of user i in an aggregator-oblivious encryption system with n users encrypts a message {right arrow over (x | 09-24-2015 |