SG11202105237WA - Techniques for preventing collusion using simultaneous key release - Google Patents
Techniques for preventing collusion using simultaneous key releaseInfo
- Publication number
- SG11202105237WA SG11202105237WA SG11202105237WA SG11202105237WA SG11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA SG 11202105237W A SG11202105237W A SG 11202105237WA
- Authority
- SG
- Singapore
- Prior art keywords
- techniques
- key release
- simultaneous key
- preventing collusion
- collusion
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2018/062847 WO2020112104A1 (en) | 2018-11-28 | 2018-11-28 | Blockchain-based accountable data publishing and usage |
US201862784194P | 2018-12-21 | 2018-12-21 | |
PCT/US2019/030415 WO2020112166A1 (en) | 2018-11-28 | 2019-05-02 | Techniques for preventing collusion using simultaneous key release |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202105237WA true SG11202105237WA (en) | 2021-06-29 |
Family
ID=70854381
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202105237WA SG11202105237WA (en) | 2018-11-28 | 2019-05-02 | Techniques for preventing collusion using simultaneous key release |
Country Status (5)
Country | Link |
---|---|
US (1) | US11921884B2 (en) |
EP (1) | EP3888291A4 (en) |
CN (1) | CN113169866A (en) |
SG (1) | SG11202105237WA (en) |
WO (1) | WO2020112166A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11392467B2 (en) | 2019-04-17 | 2022-07-19 | Microsoft Technology Licensing, Llc | Failover between decentralized identity stores |
US11429743B2 (en) | 2019-04-29 | 2022-08-30 | Microsoft Technology Licensing, Llc | Localization of DID-related claims and data |
US11381567B2 (en) | 2019-04-29 | 2022-07-05 | Microsoft Technology Licensing, Llc | Execution of an application within a scope of user-granted permission |
US11411959B2 (en) * | 2019-05-03 | 2022-08-09 | Microsoft Technology Licensing, Llc | Execution of application in a container within a scope of user-granted permission |
US11507883B2 (en) | 2019-12-03 | 2022-11-22 | Sap Se | Fairness and output authenticity for secure distributed machine learning |
US11627116B2 (en) * | 2020-03-02 | 2023-04-11 | Fortanix, Inc. | Secure computation of multiparty data |
WO2023044664A1 (en) * | 2021-09-23 | 2023-03-30 | Intel Corporation | Protecting secret processing, secret input data, and secret output data using enclaves |
CN115277259B (en) * | 2022-09-27 | 2023-02-28 | 南湖实验室 | Method for supporting large-scale cross-platform migration of persistent data through privacy calculation |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8196214B2 (en) * | 2007-12-14 | 2012-06-05 | Apple Inc. | Method and apparatus for securing content using encryption with embedded key in content |
US10491568B1 (en) | 2014-05-21 | 2019-11-26 | Amazon Technologies, Inc. | Management of encrypted data storage |
US9577829B1 (en) * | 2014-09-03 | 2017-02-21 | Amazon Technologies, Inc. | Multi-party computation services |
US9231925B1 (en) * | 2014-09-16 | 2016-01-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
EP3210157B1 (en) * | 2014-10-23 | 2020-04-01 | Pageproof.com Limited | Encrypted collaboration system and method |
US9608810B1 (en) * | 2015-02-05 | 2017-03-28 | Ionic Security Inc. | Systems and methods for encryption and provision of information security using platform services |
EP3257227B1 (en) | 2015-02-13 | 2021-03-31 | Visa International Service Association | Confidential communication management |
CN106302312B (en) * | 2015-05-13 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Obtain the method and device of electronic document |
US9832024B2 (en) * | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
US10534913B2 (en) * | 2016-03-30 | 2020-01-14 | British Telecommunications Public Limited Company | Blockchain state reliability determination |
JP6920333B2 (en) * | 2016-04-11 | 2021-08-18 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | Secure peer-to-peer communication method on the blockchain |
US10417217B2 (en) * | 2016-08-05 | 2019-09-17 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
CN110050474A (en) | 2016-12-30 | 2019-07-23 | 英特尔公司 | The type name of subobject for the composite object in Internet of Things network and block chain |
US20180254898A1 (en) * | 2017-03-06 | 2018-09-06 | Rivetz Corp. | Device enrollment protocol |
WO2018170504A1 (en) | 2017-03-17 | 2018-09-20 | Labyrinth Research Llc | Unified control of privacy-impacting devices |
GB201710168D0 (en) * | 2017-06-26 | 2017-08-09 | Microsoft Technology Licensing Llc | Introducing middleboxes into secure communications between a client and a sever |
US10742397B2 (en) * | 2018-04-26 | 2020-08-11 | Jonathan Sean Callan | Method and system for managing decentralized data access permissions through a blockchain |
US11349646B1 (en) * | 2018-05-03 | 2022-05-31 | Berryville Holdings, LLC | Method of providing secure communications to multiple devices and multiple parties |
MX2020013174A (en) * | 2018-06-04 | 2022-08-12 | Noah Rafalko | Telecommunication system and method for settling session transactions. |
CN112204921A (en) * | 2018-07-27 | 2021-01-08 | 赫尔实验室有限公司 | System and method for protecting data privacy of lightweight devices using blockchains and multi-party computing |
-
2019
- 2019-05-02 CN CN201980077589.6A patent/CN113169866A/en active Pending
- 2019-05-02 US US17/296,510 patent/US11921884B2/en active Active
- 2019-05-02 EP EP19888393.6A patent/EP3888291A4/en active Pending
- 2019-05-02 SG SG11202105237WA patent/SG11202105237WA/en unknown
- 2019-05-02 WO PCT/US2019/030415 patent/WO2020112166A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2020112166A1 (en) | 2020-06-04 |
CN113169866A (en) | 2021-07-23 |
EP3888291A1 (en) | 2021-10-06 |
EP3888291A4 (en) | 2022-08-17 |
US20220012358A1 (en) | 2022-01-13 |
US11921884B2 (en) | 2024-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202105237WA (en) | Techniques for preventing collusion using simultaneous key release | |
IL277089A (en) | Passwordless security system for data-at-rest | |
SG11202007833XA (en) | Techniques for die tiling | |
GB2582913B (en) | Locking device | |
SG11202103053XA (en) | Downhole release apparatus | |
GB2583563B (en) | Lock device | |
PL3822438T3 (en) | Automatic lock | |
SG11202010335WA (en) | Techniques for performing secure operations | |
GB2573498B (en) | Improved tiling system for decking | |
GB201710659D0 (en) | Release mechanism | |
PL3348486T3 (en) | Release mechanism | |
EP3990320C0 (en) | Retarder | |
EP4028708C0 (en) | Lock system | |
GB2579725B (en) | Lock | |
EP3953548A4 (en) | Lock release mechanism | |
GB201915326D0 (en) | Toilet system | |
CA184544S (en) | Lock | |
ZA202110110B (en) | Release valve | |
PL3524760T3 (en) | Lever latch | |
GB2590348B (en) | Fasteners for security devices | |
GB2576971B (en) | Underlay | |
EP3839175C0 (en) | Escutcheon device | |
SI3771790T1 (en) | Lock | |
FI12487U1 (en) | Siphon system | |
AU201817058S (en) | anchoring plate |