SG11202005342UA - Blockchain-implemented security systems and methods for blinded outcome selection - Google Patents

Blockchain-implemented security systems and methods for blinded outcome selection

Info

Publication number
SG11202005342UA
SG11202005342UA SG11202005342UA SG11202005342UA SG11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA
Authority
SG
Singapore
Prior art keywords
blinded
blockchain
methods
security systems
implemented security
Prior art date
Application number
SG11202005342UA
Inventor
Silvia Bartolucci
Pauline Bernat
Daniel Joseph
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202005342UA publication Critical patent/SG11202005342UA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
SG11202005342UA 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection SG11202005342UA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1720389.4A GB201720389D0 (en) 2017-12-07 2017-12-07 Computer-implemented system and method
PCT/IB2018/059555 WO2019111125A1 (en) 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection

Publications (1)

Publication Number Publication Date
SG11202005342UA true SG11202005342UA (en) 2020-07-29

Family

ID=61007262

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202005342UA SG11202005342UA (en) 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection

Country Status (8)

Country Link
US (2) US11728969B2 (en)
EP (2) EP4195588A1 (en)
JP (3) JP7231630B2 (en)
KR (1) KR20200096241A (en)
CN (1) CN111466098B (en)
GB (1) GB201720389D0 (en)
SG (1) SG11202005342UA (en)
WO (1) WO2019111125A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200042635A1 (en) * 2018-08-06 2020-02-06 Factom Transactional Sharding of Blockchain Transactions
US11356276B2 (en) * 2018-08-28 2022-06-07 R&D 3 Llc Digital data management
CN110197433B (en) * 2018-10-25 2021-07-27 腾讯科技(深圳)有限公司 Numerical value transferring method, device and system
US10790990B2 (en) 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
KR102654541B1 (en) * 2022-02-15 2024-04-05 한국전력공사 Transaction consensus method in blockchain network and blockchain node
US11538028B1 (en) * 2022-06-22 2022-12-27 Alexei Dulub Implementing non-fungible tokens using bitcoin

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100329448A1 (en) * 2009-06-30 2010-12-30 Rane Shantanu D Method for Secure Evaluation of a Function Applied to Encrypted Signals
US10423961B1 (en) * 2014-02-19 2019-09-24 Hrl Laboratories, Llc System and method for operating a proactive digital currency ledger
FR3018378A1 (en) * 2014-03-12 2015-09-11 Enrico Maim TRANSACTIONAL SYSTEM AND METHOD WITH DISTRIBUTED ARCHITECTURE BASED ON TRANSFER TRANSFERS OF ACCOUNT UNITS BETWEEN ADDRESSES
BR112017002747A2 (en) * 2014-08-29 2018-01-30 Visa Int Service Ass computer implemented method, and, computer system.
US20160300223A1 (en) * 2015-04-08 2016-10-13 Portable Data Corporation Protected data transfer across disparate networks
WO2017065209A1 (en) * 2015-10-16 2017-04-20 国立大学法人東北大学 Information processing system, information processing device, information processing method, and program
GB2561729A (en) 2016-02-23 2018-10-24 Nchain Holdings Ltd Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US20170244687A1 (en) * 2016-02-24 2017-08-24 Whitewood Encryption Systems, Inc. Techniques for confidential delivery of random data over a network
US11176584B2 (en) * 2016-08-03 2021-11-16 Raise Marketplace, Llc Cross-brand redemption in an exchange item marketplace network
CN106055993A (en) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 Encryption storage system for block chains and method for applying encryption storage system
CN106788985A (en) 2016-11-25 2017-05-31 中国电子科技集团公司第三十研究所 The stealthy address implementation method that a kind of third party can supervise
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN107395349A (en) * 2017-08-16 2017-11-24 深圳国微技术有限公司 A kind of block chain network cryptographic key distribution method based on self-certified public key system

Also Published As

Publication number Publication date
CN111466098A (en) 2020-07-28
WO2019111125A1 (en) 2019-06-13
JP2023056011A (en) 2023-04-18
JP2021506151A (en) 2021-02-18
GB201720389D0 (en) 2018-01-24
US20200389292A1 (en) 2020-12-10
EP4195588A1 (en) 2023-06-14
EP3721582B1 (en) 2023-01-04
JP7449423B2 (en) 2024-03-13
CN111466098B (en) 2024-04-02
JP2024059932A (en) 2024-05-01
EP3721582A1 (en) 2020-10-14
JP7231630B2 (en) 2023-03-01
US20230412358A1 (en) 2023-12-21
US11728969B2 (en) 2023-08-15
KR20200096241A (en) 2020-08-11

Similar Documents

Publication Publication Date Title
IL283779A (en) Systems and methods for preventing, mitigating, and/or treating dementia
SG11201912230SA (en) Methods and Systems For Blockchain-Implemented Event-Lock Encryption
GB202110037D0 (en) Security systems and methods
GB202002269D0 (en) Methods and systems for ion manipulation
SG10201607277VA (en) Method and system for access control
EP3500992A4 (en) Systems and methods for enhanced authorization response
SG11202005342UA (en) Blockchain-implemented security systems and methods for blinded outcome selection
GB2549371B (en) Access authentication method and system
HK1258246A1 (en) Authentication methods and systems
ZA202007214B (en) Systems and methods for encoder-guided adaptive-quality rendering
SG11201407621RA (en) Security control system for granting access and security control method thereof
GB201712951D0 (en) Systems and methods for selecting datasets
EP3391200A4 (en) Systems, apparatuses, and methods for strided access
GB201813390D0 (en) Systems and methods for muulti-factor authentication
GB2549270B (en) Control systems and methods
GB201621176D0 (en) Authentication systems and methods
GB201612706D0 (en) Control systems and methods
IL261535B (en) Access control system and method thereof
IL257134B (en) Systems and methods for providing multi-level network security
GB2567564B (en) Control systems and methods
EP3374236A4 (en) Systems and methods for controlling airbags
ZA201807673B (en) Security system and method
GB201608976D0 (en) Task control system and method
AU2016900263A0 (en) Indirect security system and method
GB201509030D0 (en) Authentication methods and systems