摘要:
A method for preserving privacy within a communication system, wherein a location-based service concerning an area of interest is provided for at least one user by a database server and wherein location information represented by coordinates of objects and/or users and/or areas and/or queries, made to the location-based service, is concealed, includes concealing the location information by transforming coordinates by first splitting the area of interest up in tiles for providing at least one tiling of the area of interest, and then permuting the tiles by a pseudo-random permutation process.
摘要:
A method of providing a transaction forwarding service in a blockchain includes executing a smart contract in the blockchain so as to determine whether a respective full node is eligible to execute the smart contract. The smart contract specifies eligible full nodes, a filter of a respective light client and a reward for executing the smart contract. The respective full node forwards data relating to a transaction that matches the filter of the respective light client to the respective light client with a proof that the transaction is included in the blockchain. The respective full node receives a signed acknowledgement from the respective light client verifying the transaction. Then, the respective full node claims the reward using the acknowledgement.
摘要:
A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has Occurred is checked by the external dongle.
摘要:
A method for integrating a Proof of Storage (PoS) into a blockchain increases security, robustness and verifiability of a blockchain network. A part of the blockchain to be stored is received at a first one of a plurality of mining nodes of the blockchain network. The part of the blockchain is stored. Mining of the new block is bound to the stored data and performed so as to enforce that the mining nodes store different parts of the blockchain. The PoS is integrated into the new block. The PoS is verified before accepting the new block into the blockchain.
摘要:
A method for byzantine fault-tolerant replication of data on a plurality of n servers by a client, wherein the n servers include one primary node (PN) and n−1 replica nodes (REPN), wherein f servers may arbitrarily fail, and wherein all n servers include a trusted computing entity (TCE), includes: performing a request procedure, performing a prepare procedure, performing a commit procedure, and performing a reply procedure. The request procedure includes providing a request message for requesting a certain operation, and transmitting the request message to all n servers. The prepare procedure includes computing a prepare message including at least part of the content of the request message and a unique identifier (UI), the UI being computed by the TCE, the UI being based on a cryptographic signature of the request message and a unique, monotonic, sequential counter (UMSC), and providing the prepare message to the REPN.
摘要:
A method for verifying positions of a plurality of monitoring devices includes selecting a second monitoring device by a first monitoring device. A first number of monitoring devices out of the plurality of monitoring devices is supervised, the plurality of monitoring devices being positioned such that each monitoring device of the plurality of monitoring devices can be monitored by at least one other monitoring device of the plurality of monitoring devices. Correct positions of the plurality of monitoring devices have been determined and stored prior to verification, and security information for secure communication has been exchanged between two of the plurality of monitoring devices for all of the plurality of monitoring devices.
摘要:
A method for accessing a device by a user connected to the device and to at least two servers in different networks includes collaboratively generating parts of an authentication ticket on the at least two servers, collaboratively generating parts of a user session key and encrypting a combined user session key, authenticating with the authentication ticket at a distributed ticket granting server by collaboratively decrypting user request information using the combined user session key and comparing its content with the authentication ticket, collaboratively generating an encrypted user-to-device ticket and an encrypted user-to-device session key, and accessing the device by the user using the encrypted user-to-device ticket and the user-to-device session key.
摘要:
A method of providing a transaction forwarding service in a blockchain includes executing a smart contract in the blockchain so as to determine whether a respective full node is eligible to execute the smart contract. The smart contract specifies eligible full nodes, a filter of a respective light client and a reward for executing the smart contract. The respective full node forwards data relating to a transaction that matches the filter of the respective light client to the respective light client with a proof that the transaction is included in the blockchain. The respective full node receives a signed acknowledgement from the respective light client verifying the transaction. Then, the respective full node claims the reward using the acknowledgement.
摘要:
A method for secure cloud storage of user data includes deriving, using content of the user data and a secret key stored by a server, an encryption key, encrypting, using the derived encryption key, the user data to provide encrypted user data, applying an all-or-nothing transform on the encrypted user data to produce blocks of transformed encrypted user data, partitioning the blocks of transformed encrypted user data to data partitions, creating, for each of the data partitions, an authenticator, and performing data deduplication on the transformed encrypted user data.
摘要:
A method for integrating a Proof of Storage (PoS) into a blockchain increases security, robustness and verifiability of a blockchain network. A part of the blockchain to be stored is received at a first one of a plurality of mining nodes of the blockchain network. The part of the blockchain is stored. Mining of the new block is bound to the stored data and performed so as to enforce that the mining nodes store different parts of the blockchain. The PoS is integrated into the new block. The PoS is verified before accepting the new block into the blockchain.