GB201714660D0 - Computer-implemented methods and systems - Google Patents

Computer-implemented methods and systems

Info

Publication number
GB201714660D0
GB201714660D0 GBGB1714660.6A GB201714660A GB201714660D0 GB 201714660 D0 GB201714660 D0 GB 201714660D0 GB 201714660 A GB201714660 A GB 201714660A GB 201714660 D0 GB201714660 D0 GB 201714660D0
Authority
GB
United Kingdom
Prior art keywords
systems
computer
implemented methods
implemented
methods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
GBGB1714660.6A
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nchain Holdings Ltd
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1713064.2A external-priority patent/GB201713064D0/en
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of GB201714660D0 publication Critical patent/GB201714660D0/en
Priority to KR1020207005181A priority Critical patent/KR102627049B1/en
Priority to EP18765195.5A priority patent/EP3669491B1/en
Priority to JP2020506804A priority patent/JP7202358B2/en
Priority to US16/639,099 priority patent/US11381389B2/en
Priority to KR1020247001616A priority patent/KR20240011260A/en
Priority to EP24150264.0A priority patent/EP4325770A3/en
Priority to CN201880053433.XA priority patent/CN110999207B/en
Priority to PCT/IB2018/056094 priority patent/WO2019034986A1/en
Priority to SG11202000808WA priority patent/SG11202000808WA/en
Priority to TW107128337A priority patent/TWI822693B/en
Priority to TW112136001A priority patent/TW202403575A/en
Priority to US17/847,976 priority patent/US20230013158A1/en
Priority to JP2022206111A priority patent/JP2023024683A/en
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
GBGB1714660.6A 2017-08-15 2017-09-12 Computer-implemented methods and systems Ceased GB201714660D0 (en)

Priority Applications (13)

Application Number Priority Date Filing Date Title
SG11202000808WA SG11202000808WA (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault
EP18765195.5A EP3669491B1 (en) 2017-08-15 2018-08-13 Threshold ecdsa for securing bitcoin wallet
EP24150264.0A EP4325770A3 (en) 2017-08-15 2018-08-13 Threshold ecdsa for securing bitcoin wallet
PCT/IB2018/056094 WO2019034986A1 (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault
JP2020506804A JP7202358B2 (en) 2017-08-15 2018-08-13 A computer-implemented method of generating a threshold vault
US16/639,099 US11381389B2 (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault
KR1020247001616A KR20240011260A (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault
KR1020207005181A KR102627049B1 (en) 2017-08-15 2018-08-13 Computer-implemented method for generating threshold vaults
CN201880053433.XA CN110999207B (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold library
TW107128337A TWI822693B (en) 2017-08-15 2018-08-14 Computer-implemented method of generating a threshold vault
TW112136001A TW202403575A (en) 2017-08-15 2018-08-14 Computer-implemented method of generating a threshold vault
US17/847,976 US20230013158A1 (en) 2017-08-15 2022-06-23 Computer-implemented method of generating a threshold vault
JP2022206111A JP2023024683A (en) 2017-08-15 2022-12-23 Method generating threshold vault and implemented by computer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1713064.2A GB201713064D0 (en) 2017-08-15 2017-08-15 Computer-implemented methods and systems
IB2017054961 2017-08-15

Publications (1)

Publication Number Publication Date
GB201714660D0 true GB201714660D0 (en) 2017-10-25

Family

ID=59895345

Family Applications (1)

Application Number Title Priority Date Filing Date
GBGB1714660.6A Ceased GB201714660D0 (en) 2017-08-15 2017-09-12 Computer-implemented methods and systems

Country Status (1)

Country Link
GB (1) GB201714660D0 (en)

Similar Documents

Publication Publication Date Title
GB201709760D0 (en) Computer-Implemented system and method
GB201709188D0 (en) Computer-Implemented system and method
GB201707296D0 (en) Computer-implemented system and method
GB201705621D0 (en) Computer-implemented system and method
GB201706132D0 (en) Computer-implemented system and method
GB201707168D0 (en) Computer-implemented system and method
GB201709367D0 (en) Computer-implemented system and method
GB201705749D0 (en) Computer-implemented system and method
GB201707788D0 (en) Computer-implemented system and method
GB201803815D0 (en) Computer-implemented methods and systems
GB201705858D0 (en) Computer-implemented system and method
GB201701592D0 (en) Computer-implemented system and method
GB201721021D0 (en) Computer-implemented methods and systems
GB201710176D0 (en) Computer-implemented system and method
GB201709518D0 (en) Computer-implemented system and method
GB201709848D0 (en) Computer-implemented system and method
GB201706071D0 (en) Computer-implemented system and method
GB201703562D0 (en) Computer-implemented system and method
GB201709845D0 (en) Computer-implemented system and method
GB201701589D0 (en) Computer-implemented system and method
GB201709219D0 (en) Computer-implemented system and method
GB201710283D0 (en) Computer-implemented system and method
GB201714907D0 (en) Computer-implemented system and method
GB201802063D0 (en) Computer-implemented methods and systems
GB201806448D0 (en) Computer-implemented methods and systems

Legal Events

Date Code Title Description
AT Applications terminated before publication under section 16(1)