GB201714660D0 - Computer-implemented methods and systems - Google Patents
Computer-implemented methods and systemsInfo
- Publication number
- GB201714660D0 GB201714660D0 GBGB1714660.6A GB201714660A GB201714660D0 GB 201714660 D0 GB201714660 D0 GB 201714660D0 GB 201714660 A GB201714660 A GB 201714660A GB 201714660 D0 GB201714660 D0 GB 201714660D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- systems
- computer
- implemented methods
- implemented
- methods
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11202000808WA SG11202000808WA (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
EP18765195.5A EP3669491B1 (en) | 2017-08-15 | 2018-08-13 | Threshold ecdsa for securing bitcoin wallet |
EP24150264.0A EP4325770A3 (en) | 2017-08-15 | 2018-08-13 | Threshold ecdsa for securing bitcoin wallet |
PCT/IB2018/056094 WO2019034986A1 (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
JP2020506804A JP7202358B2 (en) | 2017-08-15 | 2018-08-13 | A computer-implemented method of generating a threshold vault |
US16/639,099 US11381389B2 (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
KR1020247001616A KR20240011260A (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold vault |
KR1020207005181A KR102627049B1 (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method for generating threshold vaults |
CN201880053433.XA CN110999207B (en) | 2017-08-15 | 2018-08-13 | Computer-implemented method of generating a threshold library |
TW107128337A TWI822693B (en) | 2017-08-15 | 2018-08-14 | Computer-implemented method of generating a threshold vault |
TW112136001A TW202403575A (en) | 2017-08-15 | 2018-08-14 | Computer-implemented method of generating a threshold vault |
US17/847,976 US20230013158A1 (en) | 2017-08-15 | 2022-06-23 | Computer-implemented method of generating a threshold vault |
JP2022206111A JP2023024683A (en) | 2017-08-15 | 2022-12-23 | Method generating threshold vault and implemented by computer |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1713064.2A GB201713064D0 (en) | 2017-08-15 | 2017-08-15 | Computer-implemented methods and systems |
IB2017054961 | 2017-08-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
GB201714660D0 true GB201714660D0 (en) | 2017-10-25 |
Family
ID=59895345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB1714660.6A Ceased GB201714660D0 (en) | 2017-08-15 | 2017-09-12 | Computer-implemented methods and systems |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB201714660D0 (en) |
-
2017
- 2017-09-12 GB GBGB1714660.6A patent/GB201714660D0/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201709760D0 (en) | Computer-Implemented system and method | |
GB201709188D0 (en) | Computer-Implemented system and method | |
GB201707296D0 (en) | Computer-implemented system and method | |
GB201705621D0 (en) | Computer-implemented system and method | |
GB201706132D0 (en) | Computer-implemented system and method | |
GB201707168D0 (en) | Computer-implemented system and method | |
GB201709367D0 (en) | Computer-implemented system and method | |
GB201705749D0 (en) | Computer-implemented system and method | |
GB201707788D0 (en) | Computer-implemented system and method | |
GB201803815D0 (en) | Computer-implemented methods and systems | |
GB201705858D0 (en) | Computer-implemented system and method | |
GB201701592D0 (en) | Computer-implemented system and method | |
GB201721021D0 (en) | Computer-implemented methods and systems | |
GB201710176D0 (en) | Computer-implemented system and method | |
GB201709518D0 (en) | Computer-implemented system and method | |
GB201709848D0 (en) | Computer-implemented system and method | |
GB201706071D0 (en) | Computer-implemented system and method | |
GB201703562D0 (en) | Computer-implemented system and method | |
GB201709845D0 (en) | Computer-implemented system and method | |
GB201701589D0 (en) | Computer-implemented system and method | |
GB201709219D0 (en) | Computer-implemented system and method | |
GB201710283D0 (en) | Computer-implemented system and method | |
GB201714907D0 (en) | Computer-implemented system and method | |
GB201802063D0 (en) | Computer-implemented methods and systems | |
GB201806448D0 (en) | Computer-implemented methods and systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AT | Applications terminated before publication under section 16(1) |