Verifiable encryption based on trusted execution environment

An execution environment and encryption key technology, applied in the direction of homomorphic encryption communication, public key infrastructure trust model, secure communication device, etc., can solve a large number of calculations, complex mathematical skills and other problems

Active Publication Date: 2021-03-02
HUAWEI TECH CO LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, converting the problem into polynomials would require extensive calculations and sophisticated mathematical skills

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable encryption based on trusted execution environment
  • Verifiable encryption based on trusted execution environment
  • Verifiable encryption based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The making and using of the Examples are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention.

[0038] For most encryption methods, it is difficult to verify properties of plaintext using only ciphertext generated by encrypting plaintext using an encryption algorithm. Disclosed herein are systems and methods for verifying properties of plaintext using ciphertext generated by encrypting the plaintext using an encryption algorithm. In some embodiments, the plaintext is a value, and the property of the plaintext to check is that the value is in range. In other embodiments, the plaintext is a string, and the attribute to be checked is the length of the string. In yet other embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for verifying a property of plaintext using ciphertext is disclosed. In an embodiment, a computing device may receive the ciphertext at a trusted execution environment (TEE) of the computingdevice. The TEE may decrypt the ciphertext to generate the plaintext using a private encryption key of an encryption key pair. The encryption key pair comprises a public encryption key and the privateencryption key. The TEE may generate a digitally signed validation result by encrypting the validation result using a private signing key of a signing key pair. The signed key pair comprises a publicsigning key and the private signing key. The private key is retrieved from secure memory of the computing device, and the secure memory may only be accessible by the TEE. The computing device may then transmit the digitally signed validation result.

Description

technical field [0001] This patent application claims priority to U.S. Patent Application No. 16 / 037,789, filed July 17, 2018, entitled "VERIFIABLE ENCRYPTION BASED ON TRUSTED EXECUTION ENVIRONMENT," which The entire contents are incorporated herein by reference as if reproduced in their entirety. [0002] field [0003] The present invention relates generally to a system and method for encryption, and in particular embodiments, to a system and method for verifying properties of plaintext using ciphertext. Background technique [0004] For most encryption methods, it is difficult to verify properties of plaintext using only ciphertext. This problem is called Verifiable Encryption Problem (VEP). [0005] Zero knowledge proof (ZKP) is a known solution to VEP. However, a general ZKP is suitable for verifying one property of plaintext, and generally not suitable for verifying other properties of plaintext. This means that, in order to prove a specific knowledge (in the case...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
CPCG06F2221/2107G06F21/57G06F2221/2101H04L9/3239H04L9/3218H04L9/0897H04L9/008H04L9/50H04L9/3252H04L9/3263H04L9/0825H04L9/14H04L9/3066G09C5/00H04L9/006H04L9/0894
Inventor 武腾谭寅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products