Smart contracts, blockchains (distributed ledgers), and rights management broadly construed are the themes of today's Spotlight Patents. Assigned to Wells Fargo, the first of today's patents continues last week's theme of quantum computing and blockchains, more specifically, a post-quantum cryptography side chain. Assigned to Huawei, the second patent addresses techniques for verifiable encryption based on trusted execution environment.
11,223,470, "Post-quantum cryptography side chain," assigned to Wells Fargo Bank.
A computing entity accesses one or more blocks of a blockchain, encrypts the content of the one or more blocks using a first cryptographic technique to generate one or more first encrypted block values, and writes a first side chain block comprising the one or more first encrypted block values and a first signature to a first side chain. The computing entity accesses at least one of (a) at least one block of a particular second set of one or more second sets of the plurality of blocks or (b) one or more first side chain blocks corresponding to blocks of the second set, encrypts the content of the accessed block(s) using a second cryptographic technique to generate at least one second encrypted block value, and writes a second side chain block comprising the at least one second encrypted block value and a second signature to a second side chain.
11,223,485, "Verifiable encryption based on trusted execution environment," assigned to Huawei Technologies Co., Ltd. (CN).
A method for verifying a property of plaintext using ciphertext is disclosed. In an embodiment, a computing device may receive the ciphertext at a trusted execution environment (TEE) of the computing device. The TEE may decrypt the ciphertext to generate the plaintext using a private encryption key of an encryption key pair. The encryption key pair comprises a public encryption key and the private encryption key. The TEE may generate a digitally signed validation result by encrypting the validation result using a private signing key of a signing key pair. The signing key pair comprises a public signing key and the private signing key. The private key is retrieved from secure memory of the computing device, and the secure memory may only be accessible by the TEE. The computing device may then transmit the digitally signed validation result.