-
公开(公告)号:US11637702B2
公开(公告)日:2023-04-25
申请号:US17172825
申请日:2021-02-10
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff
IPC: H04L9/32
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
公开(公告)号:US12058265B2
公开(公告)日:2024-08-06
申请号:US18138399
申请日:2023-04-24
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff , Katarzyna Lucja Olejnik
IPC: H04L9/32
CPC classification number: H04L9/3218
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
公开(公告)号:US20210365585A1
公开(公告)日:2021-11-25
申请号:US17326498
申请日:2021-05-21
Applicant: Raytheon BBN Technologies Corp.
Inventor: Zachary Ratliff , Joud Khoury
Abstract: Techniques for privacy-preserving contact tracing are disclosed, including: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; and transmitting, by the first user device, publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry.
-
公开(公告)号:US20230261873A1
公开(公告)日:2023-08-17
申请号:US18138399
申请日:2023-04-24
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff
IPC: H04L9/32
CPC classification number: H04L9/3218
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
公开(公告)号:US20220006635A1
公开(公告)日:2022-01-06
申请号:US17364048
申请日:2021-06-30
Applicant: Raytheon BBN Technologies Corp.
Inventor: Daniel Alan Gregory , Prithwish Basu , Zachary Ratliff , Siddharth Pal , Kimberly Gavin , Benjamin Montgomery , Joud Khoury
Abstract: Techniques for geospatial-temporal pathogen tracing in zero knowledge include: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; transmitting, by the first user device, first publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry; and applying at least the first publicly verifiable exposure data and second publicly verifiable exposure data to a machine learning model, to obtain actionable intelligence associated with the pathogen.
-
公开(公告)号:US12001584B2
公开(公告)日:2024-06-04
申请号:US17326498
申请日:2021-05-21
Applicant: Raytheon BBN Technologies Corp.
Inventor: Zachary Ratliff , Joud Khoury
CPC classification number: G06F21/6245 , G16H10/60 , H04L9/0643 , H04L9/3218 , H04L9/3247
Abstract: Techniques for privacy-preserving contact tracing are disclosed, including: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; and transmitting, by the first user device, publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry.
-
公开(公告)号:US20220037035A1
公开(公告)日:2022-02-03
申请号:US17364044
申请日:2021-06-30
Applicant: Raytheon BBN Technologies Corp.
Inventor: Daniel Alan Gregory , Prithwish Basu , Zachary Ratliff , Siddharth Pal , Kimberly Gavin , Benjamin Montgomery , Joud Khoury
Abstract: Techniques for geospatial-temporal pathogen tracing include: obtaining, from multiple mobile devices in association with a first time, first contact tracing data including at least first geospatial traffic data and first values of a set of attributes associated with a pathogen; obtaining, from the multiple mobile devices in association with a second time, second contact tracing data including at least second geospatial traffic data and second values of the set of attributes associated with the pathogen; and applying at least the first contact tracing data and the second contact tracing data to a machine learning model, to obtain actionable intelligence associated with the pathogen.
-
公开(公告)号:US20210281412A1
公开(公告)日:2021-09-09
申请号:US17172825
申请日:2021-02-10
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff
IPC: H04L9/32
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
-
-
-
-
-
-