JP7252233B2 - ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 - Google Patents
ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 Download PDFInfo
- Publication number
- JP7252233B2 JP7252233B2 JP2020531061A JP2020531061A JP7252233B2 JP 7252233 B2 JP7252233 B2 JP 7252233B2 JP 2020531061 A JP2020531061 A JP 2020531061A JP 2020531061 A JP2020531061 A JP 2020531061A JP 7252233 B2 JP7252233 B2 JP 7252233B2
- Authority
- JP
- Japan
- Prior art keywords
- computing entity
- elliptic curve
- curve points
- smart contract
- parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 75
- 238000012795 verification Methods 0.000 claims description 35
- 238000011156 evaluation Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 10
- 238000013515 script Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 description 21
- 230000006870 function Effects 0.000 description 13
- 238000004590 computer program Methods 0.000 description 11
- 238000012546 transfer Methods 0.000 description 9
- 230000001052 transient effect Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000014509 gene expression Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 239000000872 buffer Substances 0.000 description 3
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/17—Function evaluation by approximation methods, e.g. inter- or extrapolation, smoothing, least mean square method
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Algebra (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Description
e(αvrvVmid(s)P,Q)=e(rvVmid(s)P,αvQ)
e(αwrwWmid(s)P,Q)=e(αwP,rwWmid(s)Q)
e(αyryYmid(s)P,Q)=e(ryYmid(s)P,αyQ)
ここで、
e(rvVmid(s)P+ryYmid(s)P,βQ)・e(βP,rwWmid(s)Q)=e(Zmid(s)P,Q)及び
e(rvV(s)P,rwW(s)Q)=e(ryY(s)P,Q)・e(ryt(s)P,h(s)Q)
ここで、
v(s)=a0+a1s+a2s2+・・・+ansn
w(s)=b0+b1s+b2s2+・・・+bnsn
で表される、秘密sで評価される多項式v(x)、w(x)によって表される。
〈p(xi)〉G=〈p1(xi)+p2(xi)〉G
を決定することができ、ここで、q(0)は、αv,αw,αy,β又はその何らかの組合せとすることができ、その特定の組合せは、zk_SNARKsプロトコルのようなプロトコル/変換に基づいてよい。
v(s)=a0+a1s+a2S2+・・・+ansn
w(s)=b0+b1s+b2S2+・・・+bnsn
の形式の秘密sで評価される多項式v(x)、w(x)によって表される。
f(s)=a0+a1s+a2s2+・・・+ansn
の形式の表現を取り扱っている。
〈p(x1)〉G=〈p1(x1)+p2(x1)〉G
を計算することができ、同様に、参加者Bは、
〈p(x2)〉G=〈p1(x2)+p2(x2)〉G
を計算することができる。
1.参加者1は、
2.参加者2は、、k1=0,...,n-1、k2=1,...,n及びj=1,...,mについて、
3.参加者3は、、k1=0,...,n-1、k2=0,...,n-1、k3=1,...,n及びj=1,...,mについて、
4. ...(各参加者について同様である)。
Claims (15)
- コンピュータ実施方法であって、第1コンピューティングエンティティにおいて、
第1多項式及び少なくとも2つの楕円曲線点に基づいて、第2コンピューティングエンティティのための楕円曲線点のセットを決定するステップと;
前記楕円曲線点の前記セットのサブセットを前記第2コンピューティングエンティティに利用可能にするステップと;
第2多項式を使用して生成された楕円曲線点の第2セットを受け取るステップと;
前記セット及び前記第2セットに基づいて、秘密の累乗を決定するステップと;
前記秘密の累乗に基づいて、検証鍵と評価鍵を含む共通参照文字列を決定するステップであって、前記共通参照文字列はまた、前記第1コンピューティングエンティティが前記サブセットを前記第2コンピューティングエンティティに提供した結果として前記第2コンピューティングエンティティによって決定可能でもある、ステップと;
前記第1コンピューティングエンティティによって提供された第1トランザクション入力と、前記第2コンピューティングエンティティによって提供された第2トランザクション入力とを含むスマートコントラクトを生成するステップであって、第3コンピューティングエンティティによる前記スマートコントラクトの正しい実行の結果、前記第3コンピューティングエンティティが、前記スマートコントラクトの出力を使用してブロックチェーントランザクションを生成することができる、ステップと;
を含む、方法。 - 前記楕円曲線点の前記セットは、前記第1多項式のべき乗のための対応する楕円曲線点を含む、
請求項1に記載の方法。 - 前記第1多項式は、少なくとも2次数のものである、
請求項1又は2に記載の方法。 - 前記サブセットは、前記楕円曲線点の前記セットである、
請求項1乃至3のいずれかに記載の方法。 - 前記秘密は、暗号的に保護された通信チャネルを使用することなく、前記第1コンピューティングエンティティと前記第2コンピューティングエンティティとの間で共有される、
請求項1乃至4のいずれかに記載の方法。 - 前記第1コンピューティングエンティティ及び前記第2コンピューティングエンティティは、集合的に第1デジタル資産及び第2デジタル資産を決定する、
請求項1乃至5のいずれかに記載の方法。 - 第3多項式及び前記少なくとも2つの楕円曲線点に基づいて、前記第2コンピューティングエンティティのための楕円曲線点の第3セットを決定するステップと;
前記楕円曲線点の前記第3セットの第2サブセットを前記第2コンピューティングエンティティに利用可能にするステップと;
楕円曲線点の第4セットを受け取るステップと;
前記第3及び第4セットに基づいて、パラメータを決定するステップであって、前記パラメータはまた、前記第1コンピューティングエンティティが前記第2サブセットを前記第2コンピューティングエンティティに提供した結果として前記第2コンピューティングエンティティによって決定可能でもある、ステップと;
を含み、前記共通参照文字列の決定は、前記パラメータに更に基づく、
請求項1乃至6のいずれかに記載の方法。 - シャミアの秘密分散法を使用して前記第1コンピューティングエンティティと前記第2コンピューティングエンティティとの間で楕円曲線パラメータを共有するステップ、
を更に含む、請求項1乃至7のいずれかに記載の方法。 - ディフィー・ヘルマン法を使用して前記第1コンピューティングエンティティと前記第2コンピューティングエンティティとの間でスカラーパラメータを交換するステップ、
を更に含む、請求項1乃至8のいずれかに記載の方法。 - 前記スマートコントラクトは、正しい実行のプルーフを提供したことに応答して、前記第3コンピューティングエンティティが第1デジタル資産及び第2デジタル資産をアンロックすることを可能にする、P2SHタイプのアンロッキングスクリプトを含む、
請求項1乃至9のいずれかに記載の方法。 - 前記第1コンピューティングエンティティは、オフチェーン通信チャネルを介して、前記サブセットを前記第2コンピューティングエンティティに利用可能にする、
請求項1乃至10のいずれかに記載の方法。 - 前記第2多項式は、前記第1コンピューティングエンティティにアクセス可能でない、
請求項1乃至11のいずれかに記載の方法。 - 前記少なくとも2つの楕円曲線点は、2つの異なる楕円曲線点である、
請求項1乃至12のいずれかに記載の方法。 - システムであって、
プロセッサと;
前記プロセッサによる実行の結果として、当該システムに請求項1乃至13のいずれかに記載のコンピュータ実施方法を実行させる実行可能命令を含む、メモリと;
を含む、システム。 - コンピュータシステムのプロセッサによって実行されている結果として、前記コンピュータシステムに請求項1乃至13のいずれかに記載のコンピュータ実施方法を少なくとも実行させる実行可能命令を格納する、非一時的コンピュータ読取可能記憶媒体。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023046632A JP2023068139A (ja) | 2017-12-13 | 2023-03-23 | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1720768.9A GB201720768D0 (en) | 2017-12-13 | 2017-12-13 | Computer-implemented system and method |
GB1720768.9 | 2017-12-13 | ||
GBGB1813770.3A GB201813770D0 (en) | 2018-08-23 | 2018-08-23 | Computer-Implemented system and method |
GB1813770.3 | 2018-08-23 | ||
GBGB1813772.9A GB201813772D0 (en) | 2018-08-23 | 2018-08-23 | Computer-Implemented system and method |
GB1813772.9 | 2018-08-23 | ||
PCT/IB2018/059918 WO2019116246A1 (en) | 2017-12-13 | 2018-12-12 | System and method for multi-party generation of blockchain-based smart contract |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2023046632A Division JP2023068139A (ja) | 2017-12-13 | 2023-03-23 | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2021507563A JP2021507563A (ja) | 2021-02-22 |
JP7252233B2 true JP7252233B2 (ja) | 2023-04-04 |
Family
ID=65013743
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020531060A Active JP7453911B2 (ja) | 2017-12-13 | 2018-12-07 | 暗号材料を安全に共有するためのシステム及び方法 |
JP2020531061A Active JP7252233B2 (ja) | 2017-12-13 | 2018-12-12 | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 |
JP2023046632A Pending JP2023068139A (ja) | 2017-12-13 | 2023-03-23 | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 |
JP2024035452A Pending JP2024063228A (ja) | 2017-12-13 | 2024-03-08 | 暗号材料を安全に共有するためのシステム及び方法 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020531060A Active JP7453911B2 (ja) | 2017-12-13 | 2018-12-07 | 暗号材料を安全に共有するためのシステム及び方法 |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2023046632A Pending JP2023068139A (ja) | 2017-12-13 | 2023-03-23 | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 |
JP2024035452A Pending JP2024063228A (ja) | 2017-12-13 | 2024-03-08 | 暗号材料を安全に共有するためのシステム及び方法 |
Country Status (9)
Country | Link |
---|---|
US (6) | US11683164B2 (ja) |
EP (3) | EP3725028A1 (ja) |
JP (4) | JP7453911B2 (ja) |
KR (2) | KR20200096248A (ja) |
CN (4) | CN118449685A (ja) |
SG (2) | SG11202005567QA (ja) |
TW (1) | TWI794366B (ja) |
WO (2) | WO2019116187A1 (ja) |
ZA (2) | ZA202004255B (ja) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2018320435B9 (en) * | 2017-08-22 | 2021-06-17 | Nippon Telegraph And Telephone Corporation | Agreement system, agreement apparatus, program, and recording medium |
GB201805633D0 (en) * | 2018-04-05 | 2018-05-23 | Nchain Holdings Ltd | Computer implemented method and system |
WO2021013813A1 (en) * | 2019-07-24 | 2021-01-28 | Koninklijke Philips N.V. | Summarizing a genomic data entry |
CN110535916B (zh) * | 2019-08-09 | 2022-04-15 | 江苏科技大学 | 一种基于区块链的供应保障管理方法 |
CN111427958A (zh) * | 2020-03-26 | 2020-07-17 | 北京链化未来科技有限公司 | 基于区块链的去中心化数据数据共享方法 |
TWI790450B (zh) * | 2020-06-15 | 2023-01-21 | 台灣灣谷科技股份有限公司 | 智能合約上鏈方法及其系統 |
WO2022006361A1 (en) * | 2020-06-30 | 2022-01-06 | Interdigital Patent Holdings, Inc. | Methods, architectures, apparatuses and systems directed to messaging through blockchain networks |
US11991284B1 (en) * | 2020-07-02 | 2024-05-21 | Steven Ali Ghabel | Blockchain-based authentication system and method |
KR102346880B1 (ko) | 2020-09-01 | 2022-01-03 | 김바올 | 블록체인에 기반한 성인인증정보 관리 방법 및 장치 |
CN112653550A (zh) * | 2020-10-11 | 2021-04-13 | 黑龙江头雁科技有限公司 | 一种基于BlockChain的多项密钥管理方法 |
JP2022158677A (ja) | 2021-04-02 | 2022-10-17 | 株式会社野村総合研究所 | マルチパーティ計算で行われるゼロ知識証明のための装置およびシステム |
US20220337424A1 (en) * | 2021-04-16 | 2022-10-20 | Portable Data Corp | Apparatuses And Methods For Facilitating Cryptographically Mediated Organizations And Tokens And Related Interactions |
WO2023055582A1 (en) * | 2021-09-30 | 2023-04-06 | Visa International Service Association | Round optimal oblivious transfers from isogenies |
KR20230077838A (ko) | 2021-11-26 | 2023-06-02 | (주) 이노트리 | 다자간 계약의 개인정보 보호를 위한 온라인 전자 계약 플랫폼 시스템 |
US12086630B2 (en) * | 2022-04-07 | 2024-09-10 | Piamond Corp. | Method and system for generating and managing smart contract |
GB2627757A (en) * | 2023-02-28 | 2024-09-04 | Nchain Licensing Ag | Verification of scalar multiplication of elliptic curve points in script |
GB2627758A (en) * | 2023-02-28 | 2024-09-04 | Nchain Licensing Ag | Verification of scalar multiplication of elliptic curve points in script |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015132754A (ja) | 2014-01-15 | 2015-07-23 | 日本電信電話株式会社 | マルチパーティ計算システム、秘匿計算装置、マルチパーティ計算方法及びプログラム |
Family Cites Families (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4667290A (en) | 1984-09-10 | 1987-05-19 | 501 Philon, Inc. | Compilers using a universal intermediate language |
JPH03126133A (ja) | 1989-10-11 | 1991-05-29 | Matsushita Electric Ind Co Ltd | コンパイラ処理方法 |
US5499191A (en) | 1992-06-15 | 1996-03-12 | Minc Incorporated | Multi-level logic optimization in programmable logic devices |
US5297150A (en) | 1992-06-17 | 1994-03-22 | International Business Machines Corporation | Rule-based method for testing of programming segments |
US6064928A (en) | 1997-04-24 | 2000-05-16 | Automation Systems Laboratory, Inc. | Mechanical sensor diagnostic method and system |
US5920830A (en) | 1997-07-09 | 1999-07-06 | General Electric Company | Methods and apparatus for generating test vectors and validating ASIC designs |
US6161180A (en) | 1997-08-29 | 2000-12-12 | International Business Machines Corporation | Authentication for secure devices with limited cryptography |
US6519754B1 (en) | 1999-05-17 | 2003-02-11 | Synplicity, Inc. | Methods and apparatuses for designing integrated circuits |
US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
EP1283422A1 (en) | 2001-08-07 | 2003-02-12 | Lucent Technologies Inc. | Testbench for the validation of a device under test |
US7209555B2 (en) | 2001-10-25 | 2007-04-24 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device |
US7085701B2 (en) | 2002-01-02 | 2006-08-01 | International Business Machines Corporation | Size reduction techniques for vital compliant VHDL simulation models |
ATE314763T1 (de) * | 2002-03-13 | 2006-01-15 | Koninkl Philips Electronics Nv | Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system |
US7281017B2 (en) | 2002-06-21 | 2007-10-09 | Sumisho Computer Systems Corporation | Views for software atomization |
US7657748B2 (en) * | 2002-08-28 | 2010-02-02 | Ntt Docomo, Inc. | Certificate-based encryption and public key infrastructure |
US6983456B2 (en) | 2002-10-31 | 2006-01-03 | Src Computers, Inc. | Process for converting programs in high-level programming languages to a unified executable for hybrid computing platforms |
US20050004899A1 (en) | 2003-04-29 | 2005-01-06 | Adrian Baldwin | Auditing method and service |
US20060149962A1 (en) * | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
US7059517B2 (en) * | 2003-12-31 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | On-line PIN verification using polynomials |
US7664957B2 (en) * | 2004-05-20 | 2010-02-16 | Ntt Docomo, Inc. | Digital signatures including identity-based aggregate signatures |
US7590236B1 (en) * | 2004-06-04 | 2009-09-15 | Voltage Security, Inc. | Identity-based-encryption system |
US20160004820A1 (en) | 2005-02-01 | 2016-01-07 | Newsilike Media Group, Inc. | Security facility for maintaining health care data pools |
US8200700B2 (en) | 2005-02-01 | 2012-06-12 | Newsilike Media Group, Inc | Systems and methods for use of structured and unstructured distributed data |
US8874477B2 (en) * | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
TW200725415A (en) | 2005-12-30 | 2007-07-01 | Tatung Co Ltd | Method for automatically translating high level programming language into hardware description language |
US8850411B2 (en) | 2006-06-21 | 2014-09-30 | Element Cxi, Llc | Compiler system, method and software for a resilient integrated circuit architecture |
US7926040B2 (en) | 2006-09-06 | 2011-04-12 | International Business Machines Corporation | Method and system for timing code execution in a korn shell script |
US20100067686A1 (en) * | 2006-10-30 | 2010-03-18 | Kazuhiro Minematsu | Shared key block cipher apparatus, its method, its program and recording medium |
FR2918525A1 (fr) * | 2007-07-06 | 2009-01-09 | France Telecom | Procede asymetrique de chiffrement ou de verification de signature. |
WO2009064122A1 (en) | 2007-11-18 | 2009-05-22 | Lg Electronics Inc. | Methods of joint coding in mobile communication system |
US8923510B2 (en) * | 2007-12-28 | 2014-12-30 | Intel Corporation | Method and apparatus for efficiently implementing the advanced encryption standard |
JP2010096787A (ja) * | 2008-10-14 | 2010-04-30 | Tokyo Metropolitan Univ | 秘密情報分散装置、秘密情報分散プログラム、秘密情報分散方法、秘密情報復元装置、秘密情報復元プログラム、秘密情報復元方法、及び秘密情報分散復元システム |
US8336036B2 (en) | 2008-11-21 | 2012-12-18 | Korea University Industrial & Academic Collaboration Foundation | System and method for translating high programming level languages code into hardware description language code |
US8639931B2 (en) * | 2008-12-16 | 2014-01-28 | Certicom Corp. | Acceleration of key agreement protocols |
US8165287B2 (en) * | 2008-12-30 | 2012-04-24 | King Fahd University Of Petroleum & Minerals | Cryptographic hash functions using elliptic polynomial cryptography |
US8189771B2 (en) * | 2009-01-12 | 2012-05-29 | King Fahd University Of Petroleum & Minerals | Hash functions with elliptic polynomial hopping |
FR2947404B1 (fr) | 2009-06-30 | 2011-12-16 | Sagem Securite | Cryptographie par parametrisation sur une courbe elliptique |
JP5159752B2 (ja) | 2009-12-03 | 2013-03-13 | セイコープレシジョン株式会社 | 通信データの検証装置及びそのコンピュータプログラム |
US8189775B2 (en) * | 2010-02-18 | 2012-05-29 | King Fahd University Of Petroleum & Minerals | Method of performing cipher block chaining using elliptic polynomial cryptography |
US8910014B2 (en) * | 2010-04-27 | 2014-12-09 | Nec Corporation | Coding device, error-correction code configuration method, and program thereof |
US10515567B2 (en) * | 2010-06-01 | 2019-12-24 | Ternarylogic Llc | Cryptographic machines with N-state lab-transformed switching devices |
US20120002811A1 (en) * | 2010-06-30 | 2012-01-05 | The University Of Bristol | Secure outsourced computation |
US8972746B2 (en) * | 2010-12-17 | 2015-03-03 | Intel Corporation | Technique for supporting multiple secure enclaves |
EP2721766A4 (en) * | 2011-03-18 | 2015-01-28 | Certicom Corp | SECURE FINANCIAL TRANSACTIONS |
US9569771B2 (en) * | 2011-04-29 | 2017-02-14 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
EP2705479A4 (en) | 2011-05-03 | 2014-12-24 | Panther Payments Llc | METHOD AND SYSTEM FOR FACILITATING PERSON-TO-PERSON PAYMENTS |
US8607129B2 (en) * | 2011-07-01 | 2013-12-10 | Intel Corporation | Efficient and scalable cyclic redundancy check circuit using Galois-field arithmetic |
JP5697153B2 (ja) | 2011-08-04 | 2015-04-08 | キヤノンマーケティングジャパン株式会社 | 情報処理システム、携帯端末、制御方法、及びプログラム |
US8745376B2 (en) | 2011-10-14 | 2014-06-03 | Certicom Corp. | Verifying implicit certificates and digital signatures |
US20150379510A1 (en) | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN104854814A (zh) * | 2012-12-21 | 2015-08-19 | 皇家飞利浦有限公司 | 密钥共享网络设备及其配置 |
US8683193B1 (en) | 2013-03-01 | 2014-03-25 | Robert Hansen | Strict communications transport security |
EP2989742B1 (en) * | 2013-04-24 | 2018-08-29 | NEC Corporation | Method and system for enforcing access control policies on data |
US20140321644A1 (en) | 2013-04-29 | 2014-10-30 | Her Majesty The Queen In Right Of Canada, As Represented By The Minister Of National Defence | Method and system for calculations on encrypted data |
US11127001B2 (en) | 2013-05-09 | 2021-09-21 | Wayne Fueling Systems Llc | Systems and methods for secure communication |
US9553982B2 (en) | 2013-07-06 | 2017-01-24 | Newvoicemedia, Ltd. | System and methods for tamper proof interaction recording and timestamping |
EP2860905A1 (en) * | 2013-10-09 | 2015-04-15 | Thomson Licensing | Method for ciphering a message via a keyed homomorphic encryption function, corresponding electronic device and computer program product |
US9026978B1 (en) | 2013-10-24 | 2015-05-05 | Cadence Design Systems, Inc. | Reverse interface logic model for optimizing physical hierarchy under full chip constraint |
FR3018378A1 (fr) | 2014-03-12 | 2015-09-11 | Enrico Maim | Systeme et procede transactionnels a architecture repartie fondees sur des transactions de transferts d'unites de compte entre adresses |
US10320781B2 (en) | 2016-12-08 | 2019-06-11 | Sensoriant, Inc. | System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy |
US9645794B2 (en) | 2014-09-23 | 2017-05-09 | Texas Instruments Incorporated | Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography |
US10025926B2 (en) | 2014-11-19 | 2018-07-17 | The Mitre Corporation | Side-channel leakage evaluator and analysis kit |
US20160162897A1 (en) | 2014-12-03 | 2016-06-09 | The Filing Cabinet, LLC | System and method for user authentication using crypto-currency transactions as access tokens |
CN104580240A (zh) | 2015-01-22 | 2015-04-29 | 杭州安存网络科技有限公司 | 聊天证据固定方法及装置 |
EP3259871B1 (en) | 2015-02-20 | 2020-09-16 | Telefonaktiebolaget LM Ericsson (publ) | Method of providing a hash value for a piece of data, electronic device and computer program |
EP3767878A1 (en) | 2015-03-27 | 2021-01-20 | Black Gold Coin, Inc. | A system and a method for personal identification and verification |
WO2016155804A1 (en) | 2015-03-31 | 2016-10-06 | Nec Europe Ltd. | Method for verifying information |
JP2017004044A (ja) | 2015-06-04 | 2017-01-05 | 富士通株式会社 | ライセンス管理プログラム、ライセンス管理方法、およびライセンス管理システム |
CN106293892B (zh) | 2015-06-26 | 2019-03-19 | 阿里巴巴集团控股有限公司 | 分布式流计算系统、方法和装置 |
US10936720B2 (en) | 2015-07-10 | 2021-03-02 | Nec Corporation | Method and system for reliable computation of a program |
US10339523B2 (en) * | 2015-07-14 | 2019-07-02 | Fmr Llc | Point-to-point transaction guidance apparatuses, methods and systems |
US11488147B2 (en) * | 2015-07-14 | 2022-11-01 | Fmr Llc | Computationally efficient transfer processing and auditing apparatuses, methods and systems |
US20170048209A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170091756A1 (en) * | 2015-07-14 | 2017-03-30 | Fmr Llc | Point-to-Point Transaction Guidance Apparatuses, Methods and Systems |
US10366204B2 (en) | 2015-08-03 | 2019-07-30 | Change Healthcare Holdings, Llc | System and method for decentralized autonomous healthcare economy platform |
DE102015114215A1 (de) | 2015-08-27 | 2017-03-02 | Rwe Ag | Versorgungssystem und verfahren zum betreiben eines versorgungssystems |
WO2017079652A1 (en) | 2015-11-05 | 2017-05-11 | Pulsifer Allen | Cryptographic transactions system |
US10269012B2 (en) * | 2015-11-06 | 2019-04-23 | Swfl, Inc. | Systems and methods for secure and private communications |
US10048952B2 (en) | 2015-11-11 | 2018-08-14 | Oracle International Corporation | Compiler optimized data model evaluation |
FR3043811B1 (fr) | 2015-11-16 | 2017-11-10 | Morpho | Procede d'identification d'une entite |
US20170140408A1 (en) | 2015-11-16 | 2017-05-18 | Bank Of America Corporation | Transparent self-managing rewards program using blockchain and smart contracts |
EP3378087B1 (en) * | 2015-11-16 | 2021-12-01 | Cavendish Kinetics, Inc. | Naturally closed mems switch for esd protection |
US9992028B2 (en) * | 2015-11-26 | 2018-06-05 | International Business Machines Corporation | System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger |
US11423498B2 (en) | 2015-12-16 | 2022-08-23 | International Business Machines Corporation | Multimedia content player with digital rights management while maintaining privacy of users |
JP2017111591A (ja) | 2015-12-16 | 2017-06-22 | 株式会社ソシオネクスト | 設計方法、設計プログラム及び設計装置 |
US9715373B2 (en) | 2015-12-18 | 2017-07-25 | International Business Machines Corporation | Dynamic recompilation techniques for machine learning programs |
US10044696B2 (en) | 2015-12-22 | 2018-08-07 | Mcafee, Llc | Simplified sensor integrity |
US9483596B1 (en) | 2016-01-08 | 2016-11-01 | International Business Machines Corporation | Multi power synthesis in digital circuit design |
US9960920B2 (en) | 2016-01-26 | 2018-05-01 | Stampery Inc. | Systems and methods for certification of data units and/or certification verification |
US10108812B2 (en) * | 2016-01-28 | 2018-10-23 | Nasdaq, Inc. | Systems and methods for securing and disseminating time sensitive information using a blockchain |
AU2017223129A1 (en) * | 2016-02-23 | 2018-07-12 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US10387988B2 (en) | 2016-02-26 | 2019-08-20 | Google Llc | Compiler techniques for mapping program code to a high performance, power efficient, programmable image processing hardware platform |
WO2017148527A1 (en) | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
US20200327498A1 (en) * | 2016-03-21 | 2020-10-15 | National Ict Australia Limited | Business Process Execution on a Blockchain Platform |
US11017387B2 (en) | 2016-03-24 | 2021-05-25 | International Business Machines Corporation | Cryptographically assured zero-knowledge cloud services for elemental transactions |
US11017388B2 (en) | 2016-03-25 | 2021-05-25 | International Business Machines Corporation | Cryptographically assured zero-knowledge cloud service for composable atomic transactions |
US10839096B2 (en) | 2016-03-28 | 2020-11-17 | International Business Machines Corporation | Cryptographically provable zero-knowledge content distribution network |
AU2017240796A1 (en) | 2016-03-31 | 2018-10-25 | Clause, Inc. | System and method for creating and executing data-driven legal contracts |
EP3440823B1 (en) | 2016-04-05 | 2020-09-02 | Zamna Technologies Limited | Method and system for managing personal information within independent computer systems and digital networks |
US10545739B2 (en) | 2016-04-05 | 2020-01-28 | International Business Machines Corporation | LLVM-based system C compiler for architecture synthesis |
KR102415260B1 (ko) | 2016-04-11 | 2022-06-30 | 엔체인 홀딩스 리미티드 | 블록체인에서 안전한 피어-투-피어 통신을 위한 방법 |
US10333705B2 (en) * | 2016-04-30 | 2019-06-25 | Civic Technologies, Inc. | Methods and apparatus for providing attestation of information using a centralized or distributed ledger |
US10046228B2 (en) | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
EP3452929B1 (en) | 2016-05-06 | 2020-04-01 | Innogy Innovation GmbH | System for evaluating telemetry data |
US20170337319A1 (en) | 2016-05-20 | 2017-11-23 | Ecole polytechnique fédérale de Lausanne (EPFL) | System and Method for Optimization of Digital Circuits with Timing and Behavior Co-Designed by Introduction and Exploitation of False Paths |
US9967088B2 (en) * | 2016-05-23 | 2018-05-08 | Accenture Global Solutions Limited | Rewritable blockchain |
US20170344988A1 (en) * | 2016-05-24 | 2017-11-30 | Ubs Ag | System and method for facilitating blockchain-based validation |
CN107438002B (zh) | 2016-05-27 | 2022-02-11 | 索尼公司 | 基于区块链的系统以及系统中的电子设备和方法 |
FR3052286B1 (fr) | 2016-06-06 | 2018-06-15 | Morpho | Procede de verification d'un droit d'acces d'un individu |
US10447478B2 (en) | 2016-06-06 | 2019-10-15 | Microsoft Technology Licensing, Llc | Cryptographic applications for a blockchain system |
KR101795696B1 (ko) | 2016-07-14 | 2017-11-09 | 주식회사 코인플러그 | 메신저 서비스를 통하여 송수신되는 데이터에 대한 기록 및 검증 서비스를 제공하는 방법, 및 이를 이용한 서버 |
US20180018738A1 (en) | 2016-07-14 | 2018-01-18 | Digital Asset Holdings | Digital asset platform |
US10417217B2 (en) | 2016-08-05 | 2019-09-17 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
WO2018058105A1 (en) * | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of managing trustless asset portfolios |
CN106506146A (zh) | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | 基于区块链技术的交易信息校验方法、装置及系统 |
CN106534317B (zh) | 2016-11-17 | 2019-09-03 | 杭州云象网络技术有限公司 | 一种基于区块链技术的灾备云存储系统构建方法 |
CN106559211B (zh) * | 2016-11-22 | 2019-12-13 | 中国电子科技集团公司第三十研究所 | 一种区块链中隐私保护智能合约方法 |
CN110383751B (zh) | 2017-01-06 | 2023-05-09 | 皇家飞利浦有限公司 | 关于证实的数据的pinocchio/trinocchio |
EP3566389B1 (en) | 2017-01-06 | 2021-08-18 | Koninklijke Philips N.V. | Distributed privacy-preserving verifiable computation |
CN106846666B (zh) * | 2017-01-18 | 2019-05-07 | 北京云知科技有限公司 | 一种基于区块链的存取款方法 |
US10880089B2 (en) | 2017-03-15 | 2020-12-29 | NuID, Inc. | Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication |
KR101882802B1 (ko) | 2017-04-17 | 2018-07-27 | 주식회사 코인플러그 | Utxo 기반 프로토콜을 이용한 블록체인 기반의 문서 관리 방법 및 이를 이용한 문서 관리 서버 |
US10419209B1 (en) * | 2017-04-26 | 2019-09-17 | Wells Fargo Bank, N.A. | Parallel assurance of blockchain signatures |
CN107274184A (zh) | 2017-05-11 | 2017-10-20 | 上海点融信息科技有限责任公司 | 基于零知识证明的区块链数据处理 |
CN107040545B (zh) | 2017-05-26 | 2019-05-31 | 中国人民解放军信息工程大学 | 工程文件全生命周期安全保护方法 |
CN107179932A (zh) | 2017-05-26 | 2017-09-19 | 福建师范大学 | 基于fpga高层次综合指令的优化方法及其系统 |
CN107425967B (zh) * | 2017-06-15 | 2019-08-27 | 武汉理工大学 | 一种理论安全的灵活多秘密共享方法 |
CN107426234A (zh) | 2017-08-08 | 2017-12-01 | 武汉协鑫新能源电力设计有限公司 | 一种基于区块链技术的绿色电力认证机制 |
US10268829B2 (en) | 2017-08-11 | 2019-04-23 | Dragonchain, Inc. | Security systems and methods based on cryptographic utility token inventory tenure |
US10135607B1 (en) | 2017-08-11 | 2018-11-20 | Dragonchain, Inc. | Distributed ledger interaction systems and methods |
US10333710B2 (en) | 2017-09-12 | 2019-06-25 | Qed-It Systems Ltd. | Method and system for determining desired size of private randomness using Tsallis entropy |
US10521616B2 (en) | 2017-11-08 | 2019-12-31 | Analog Devices, Inc. | Remote re-enrollment of physical unclonable functions |
CN108009441B (zh) * | 2017-11-23 | 2023-05-30 | 创新先进技术有限公司 | 资源转移和资金转移的方法和装置 |
US10949511B2 (en) * | 2017-11-30 | 2021-03-16 | Bank Of America Corporation | Multicomputer processing for data authentication using a blockchain approach |
US20190180276A1 (en) * | 2017-12-07 | 2019-06-13 | Bank Of America Corporation | Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data |
FR3075534B1 (fr) | 2017-12-14 | 2020-01-10 | CopSonic | Dispositif de stockage de cles numeriques pour signer des transactions sur une chaine de blocs |
FR3098947B1 (fr) * | 2019-07-19 | 2021-09-10 | Idemia Identity & Security France | Procédé de traitement d’une transaction émise depuis une entité de preuve |
-
2018
- 2018-12-07 SG SG11202005567QA patent/SG11202005567QA/en unknown
- 2018-12-07 KR KR1020207017958A patent/KR20200096248A/ko not_active Application Discontinuation
- 2018-12-07 EP EP18833516.0A patent/EP3725028A1/en active Pending
- 2018-12-07 JP JP2020531060A patent/JP7453911B2/ja active Active
- 2018-12-07 US US16/772,132 patent/US11683164B2/en active Active
- 2018-12-07 CN CN202410473675.1A patent/CN118449685A/zh active Pending
- 2018-12-07 WO PCT/IB2018/059770 patent/WO2019116187A1/en unknown
- 2018-12-07 CN CN201880080950.6A patent/CN111466095B/zh active Active
- 2018-12-12 CN CN202311311745.5A patent/CN117478315A/zh active Pending
- 2018-12-12 CN CN201880081012.8A patent/CN111466100B/zh active Active
- 2018-12-12 EP EP21202086.1A patent/EP4009577A1/en active Pending
- 2018-12-12 WO PCT/IB2018/059918 patent/WO2019116246A1/en unknown
- 2018-12-12 KR KR1020207017961A patent/KR20200094173A/ko unknown
- 2018-12-12 EP EP18834035.0A patent/EP3725032B1/en active Active
- 2018-12-12 US US16/772,136 patent/US11271729B2/en active Active
- 2018-12-12 TW TW107144802A patent/TWI794366B/zh active
- 2018-12-12 JP JP2020531061A patent/JP7252233B2/ja active Active
- 2018-12-12 SG SG11202005564WA patent/SG11202005564WA/en unknown
-
2020
- 2020-07-10 ZA ZA2020/04255A patent/ZA202004255B/en unknown
- 2020-07-10 ZA ZA2020/04256A patent/ZA202004256B/en unknown
-
2022
- 2022-02-23 US US17/678,926 patent/US11888976B2/en active Active
-
2023
- 2023-03-23 JP JP2023046632A patent/JP2023068139A/ja active Pending
- 2023-05-18 US US18/199,320 patent/US20230370253A1/en active Pending
- 2023-12-13 US US18/539,095 patent/US20240195611A1/en active Pending
-
2024
- 2024-03-08 JP JP2024035452A patent/JP2024063228A/ja active Pending
- 2024-03-19 US US18/610,175 patent/US20240348429A1/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015132754A (ja) | 2014-01-15 | 2015-07-23 | 日本電信電話株式会社 | マルチパーティ計算システム、秘匿計算装置、マルチパーティ計算方法及びプログラム |
Non-Patent Citations (2)
Title |
---|
CHEN, H. and CRAMER, R.,Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields,Lecture Notes in Computer Science,Vol.4117,2006年,pp.521-536 |
ZYSKIND, G., NATHAN, O. and PENTLAND, A.,Enigma: Decentralized Computation Platform with Guaranteed Privacy,[online],1506.033471v1,arXiv,2015年06月10日,pp.1-14,URL:https://arxiv.org/abs/1506.03471v1,[2022年9月30日 閲覧] |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7252233B2 (ja) | ブロックチェーンベースのスマートコントラクトの複数当事者生成のためのシステム及び方法 | |
TWI770307B (zh) | 用以使用調解方電腦系統來確保電腦程式正確執行的系統與方法 | |
JP2021518687A (ja) | トラストレスゼロ知識付帯支払のためのコンピュータ実装されたシステム及び方法 | |
JP6016948B2 (ja) | 秘匿計算システム、演算装置、秘匿計算方法、およびプログラム | |
WO2020260151A1 (en) | Zero-knowledge contingent payments protocol for granting access to encrypted assets | |
CN115393079A (zh) | 一种可随机化和溯源审计的跨链交易方法、设备和介质 | |
Gauthier et al. | Topos: A Secure, Trustless, and Decentralized Interoperability Protocol | |
Liu et al. | Fundamental Data Security Technologies | |
JP2024147682A (ja) | ブロックチェーンを介して資産関連活動を制御するシステム及び方法 | |
Scala et al. | ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20211116 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20221011 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230110 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20230124 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20230222 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20230323 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7252233 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |