Verifiable Cryptographic Obfuscation Methods Using PUF and LPN Encryption
Summary
The USPTO published patent application US20260100853A1 for verifiable cryptographic obfuscation methods using physically unclonable functions (PUF) and Learning Parity with Noise (LPN) encryption. The invention covers systems that verify obfuscation integrity by comparing corrected and corrupted PRG outputs via Hamming distance analysis. Technology companies and patent professionals should review for prior art and licensing implications.
What changed
The USPTO published patent application US20260100853A1 for methods and systems enabling verifiable cryptographic obfuscation. The invention describes an obfuscator system that receives obfuscated programs with embedded LPN-encrypted PRG inputs, uses PUF-generated error vectors, and verifies program integrity by computing Hamming distance between corrected and corrupted PRG outputs.
Technology companies developing cryptographic security systems, obfuscation tools, or blockchain/DRM applications should monitor this application for prior art implications. Patent applicants and IP professionals should assess whether this filing could affect freedom-to-operate for existing or planned cryptographic products. The filing date of October 7, 2024, establishes priority status for the disclosed verifiable obfuscation methods.
What to do next
- Monitor patent prosecution status for grant or office action
- Review for prior art relevance to cryptographic systems
- Evaluate potential licensing opportunities
Archived snapshot
Apr 10, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
VERIFIABLE CRYPTOGRAPHIC OBFUSCATION
Application US20260100853A1 Kind: A1 Apr 09, 2026
Inventors
Vipin Singh Sehrawat
Abstract
Methods, systems, and apparatus for verifiable cryptographic obfuscation. In one aspect, am obfuscator system receives an obfuscated program, a public seed and a secret seed, the public seed comprising a LPN encryption of a PRG input that is embedded in the obfuscated program, where the LPN encryption of the PRG input is generated using an error vector generated by physically unclonable function (PUF) included in the obfuscator system. The system computes a corrected PRG output obtained by evaluating the PRG on the LPN encryption of the PRG input using the public seed. The system predicts the error vector generated by the PUF and computes a corrupted PRG output obtained by evaluating the PRG on an LPN encryption of the PRG input and the predicted error vector. The system verifies the obfuscation of the program based on a Hamming distance between the corrected PRG output and the corrupted PRG output.
CPC Classifications
H04L 9/3278 H04L 9/30
Filing Date
2024-10-07
Application No.
18908221
Related changes
Get daily alerts for USPTO Patent Applications - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.