SG11202105237WA - Techniques for preventing collusion using simultaneous key release - Google Patents

Techniques for preventing collusion using simultaneous key release

Info

Publication number
SG11202105237WA
SG11202105237WA SG11202105237WA SG11202105237WA SG11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA
Authority
SG
Singapore
Prior art keywords
techniques
key release
simultaneous key
preventing collusion
collusion
Prior art date
Application number
SG11202105237WA
Inventor
Sivanarayana Gaddam
Ranjit Kumaresan
Rohit Sinha
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2018/062847 external-priority patent/WO2020112104A1/en
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11202105237WA publication Critical patent/SG11202105237WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
SG11202105237WA 2018-11-28 2019-05-02 Techniques for preventing collusion using simultaneous key release SG11202105237WA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/US2018/062847 WO2020112104A1 (en) 2018-11-28 2018-11-28 Blockchain-based accountable data publishing and usage
US201862784194P 2018-12-21 2018-12-21
PCT/US2019/030415 WO2020112166A1 (en) 2018-11-28 2019-05-02 Techniques for preventing collusion using simultaneous key release

Publications (1)

Publication Number Publication Date
SG11202105237WA true SG11202105237WA (en) 2021-06-29

Family

ID=70854381

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202105237WA SG11202105237WA (en) 2018-11-28 2019-05-02 Techniques for preventing collusion using simultaneous key release

Country Status (5)

Country Link
US (1) US11921884B2 (en)
EP (1) EP3888291A4 (en)
CN (1) CN113169866A (en)
SG (1) SG11202105237WA (en)
WO (1) WO2020112166A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11392467B2 (en) 2019-04-17 2022-07-19 Microsoft Technology Licensing, Llc Failover between decentralized identity stores
US11429743B2 (en) 2019-04-29 2022-08-30 Microsoft Technology Licensing, Llc Localization of DID-related claims and data
US11381567B2 (en) 2019-04-29 2022-07-05 Microsoft Technology Licensing, Llc Execution of an application within a scope of user-granted permission
US11411959B2 (en) * 2019-05-03 2022-08-09 Microsoft Technology Licensing, Llc Execution of application in a container within a scope of user-granted permission
US11507883B2 (en) 2019-12-03 2022-11-22 Sap Se Fairness and output authenticity for secure distributed machine learning
US11627116B2 (en) * 2020-03-02 2023-04-11 Fortanix, Inc. Secure computation of multiparty data
WO2023044664A1 (en) * 2021-09-23 2023-03-30 Intel Corporation Protecting secret processing, secret input data, and secret output data using enclaves
CN115277259B (en) * 2022-09-27 2023-02-28 南湖实验室 Method for supporting large-scale cross-platform migration of persistent data through privacy calculation

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8196214B2 (en) * 2007-12-14 2012-06-05 Apple Inc. Method and apparatus for securing content using encryption with embedded key in content
US10491568B1 (en) 2014-05-21 2019-11-26 Amazon Technologies, Inc. Management of encrypted data storage
US9577829B1 (en) * 2014-09-03 2017-02-21 Amazon Technologies, Inc. Multi-party computation services
US9231925B1 (en) * 2014-09-16 2016-01-05 Keypasco Ab Network authentication method for secure electronic transactions
EP3210157B1 (en) * 2014-10-23 2020-04-01 Pageproof.com Limited Encrypted collaboration system and method
US9608810B1 (en) * 2015-02-05 2017-03-28 Ionic Security Inc. Systems and methods for encryption and provision of information security using platform services
EP3257227B1 (en) 2015-02-13 2021-03-31 Visa International Service Association Confidential communication management
CN106302312B (en) * 2015-05-13 2019-09-17 阿里巴巴集团控股有限公司 Obtain the method and device of electronic document
US9832024B2 (en) * 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication
US10534913B2 (en) * 2016-03-30 2020-01-14 British Telecommunications Public Limited Company Blockchain state reliability determination
JP6920333B2 (en) * 2016-04-11 2021-08-18 エヌチェーン ホールディングス リミテッドNchain Holdings Limited Secure peer-to-peer communication method on the blockchain
US10417217B2 (en) * 2016-08-05 2019-09-17 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization
CN110050474A (en) 2016-12-30 2019-07-23 英特尔公司 The type name of subobject for the composite object in Internet of Things network and block chain
US20180254898A1 (en) * 2017-03-06 2018-09-06 Rivetz Corp. Device enrollment protocol
WO2018170504A1 (en) 2017-03-17 2018-09-20 Labyrinth Research Llc Unified control of privacy-impacting devices
GB201710168D0 (en) * 2017-06-26 2017-08-09 Microsoft Technology Licensing Llc Introducing middleboxes into secure communications between a client and a sever
US10742397B2 (en) * 2018-04-26 2020-08-11 Jonathan Sean Callan Method and system for managing decentralized data access permissions through a blockchain
US11349646B1 (en) * 2018-05-03 2022-05-31 Berryville Holdings, LLC Method of providing secure communications to multiple devices and multiple parties
MX2020013174A (en) * 2018-06-04 2022-08-12 Noah Rafalko Telecommunication system and method for settling session transactions.
CN112204921A (en) * 2018-07-27 2021-01-08 赫尔实验室有限公司 System and method for protecting data privacy of lightweight devices using blockchains and multi-party computing

Also Published As

Publication number Publication date
WO2020112166A1 (en) 2020-06-04
CN113169866A (en) 2021-07-23
EP3888291A1 (en) 2021-10-06
EP3888291A4 (en) 2022-08-17
US20220012358A1 (en) 2022-01-13
US11921884B2 (en) 2024-03-05

Similar Documents

Publication Publication Date Title
SG11202105237WA (en) Techniques for preventing collusion using simultaneous key release
IL277089A (en) Passwordless security system for data-at-rest
SG11202007833XA (en) Techniques for die tiling
GB2582913B (en) Locking device
SG11202103053XA (en) Downhole release apparatus
GB2583563B (en) Lock device
PL3822438T3 (en) Automatic lock
SG11202010335WA (en) Techniques for performing secure operations
GB2573498B (en) Improved tiling system for decking
GB201710659D0 (en) Release mechanism
PL3348486T3 (en) Release mechanism
EP3990320C0 (en) Retarder
EP4028708C0 (en) Lock system
GB2579725B (en) Lock
EP3953548A4 (en) Lock release mechanism
GB201915326D0 (en) Toilet system
CA184544S (en) Lock
ZA202110110B (en) Release valve
PL3524760T3 (en) Lever latch
GB2590348B (en) Fasteners for security devices
GB2576971B (en) Underlay
EP3839175C0 (en) Escutcheon device
SI3771790T1 (en) Lock
FI12487U1 (en) Siphon system
AU201817058S (en) anchoring plate