MX2021006820A - Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo. - Google Patents

Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo.

Info

Publication number
MX2021006820A
MX2021006820A MX2021006820A MX2021006820A MX2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A MX 2021006820 A MX2021006820 A MX 2021006820A
Authority
MX
Mexico
Prior art keywords
sender
data payload
recipient
implement
key
Prior art date
Application number
MX2021006820A
Other languages
English (en)
Inventor
Silvio Micali
Original Assignee
Algorand Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Algorand Inc filed Critical Algorand Inc
Publication of MX2021006820A publication Critical patent/MX2021006820A/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Transfer Between Computers (AREA)
  • Electrophonic Musical Instruments (AREA)
  • Exchange Systems With Centralized Control (AREA)
  • Structure Of Telephone Exchanges (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Los métodos para un protocolo de cadena de bloques virtual incluyen generar una clave pública y una clave privada para transmitir un mensaje desde un emisor a un destinatario. El emisor encripta el mensaje usando la clave pública y una clave criptográfica del destinatario para generar una primera carga útil de datos. El emisor firma una función de troceo de la primera carga útil de datos usando una clave criptográfica del emisor para generar una segunda carga útil de datos. El emisor transmite la primera carga útil de datos y la segunda carga útil de datos al destinatario. El emisor recibe una versión firmada de la segunda carga útil de datos firmada usando la clave criptográfica del destinatario. El emisor determina que se ha publicado la versión firmada de la segunda carga útil de datos en una cadena de bloques. El emisor publica la clave privada en la cadena de bloques.
MX2021006820A 2018-12-10 2019-12-10 Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo. MX2021006820A (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862777410P 2018-12-10 2018-12-10
US201862778482P 2018-12-12 2018-12-12
PCT/US2019/065524 WO2020123538A1 (en) 2018-12-10 2019-12-10 Using virtual blockchain protocols to implement a fair electronic exchange

Publications (1)

Publication Number Publication Date
MX2021006820A true MX2021006820A (es) 2021-07-02

Family

ID=69724039

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2021006820A MX2021006820A (es) 2018-12-10 2019-12-10 Uso de protocolos de cadena de bloques virtual para implementar un intercambio electronico justo.

Country Status (12)

Country Link
US (2) US11405186B2 (es)
EP (1) EP3895372A1 (es)
JP (2) JP7369772B2 (es)
KR (1) KR20210100660A (es)
CN (1) CN113475037A (es)
AU (2) AU2019396425B2 (es)
BR (1) BR112021011165A2 (es)
CA (1) CA3122537A1 (es)
IL (2) IL282861B2 (es)
MX (1) MX2021006820A (es)
SG (1) SG11202104773QA (es)
WO (1) WO2020123538A1 (es)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210342803A1 (en) * 2020-02-17 2021-11-04 Electronics And Telecommunications Research Institute Method and apparatus for using a service through blockchain system

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6557134B2 (en) * 1997-09-30 2003-04-29 Glenayre Electronics, Inc. ARQ method for wireless communication
US7010683B2 (en) * 2000-01-14 2006-03-07 Howlett-Packard Development Company, L.P. Public key validation service
JP4614377B2 (ja) * 2000-03-01 2011-01-19 キヤノン株式会社 暗号化データ管理システム及び方法、記憶媒体
US7885412B2 (en) * 2005-09-29 2011-02-08 International Business Machines Corporation Pre-generation of generic session keys for use in communicating within communications environments
EP3257227B1 (en) * 2015-02-13 2021-03-31 Visa International Service Association Confidential communication management
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
JP6452156B2 (ja) * 2015-09-03 2019-01-16 日本電信電話株式会社 許諾情報管理システム、利用者端末、権利者端末、許諾情報管理方法、および、許諾情報管理プログラム
CN116957790A (zh) * 2016-02-23 2023-10-27 区块链控股有限公司 一种实现区块链上交换的通证化方法及系统
US10594702B2 (en) * 2016-12-16 2020-03-17 ULedger, Inc. Electronic interaction authentication and verification, and related systems, devices, and methods
CN106790253A (zh) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 基于区块链的认证方法和装置
CN107040383B (zh) * 2017-04-24 2018-01-30 中山大学 一种基于区块链的盲可验证加密签名方法
CN110546939B (zh) * 2017-04-26 2022-07-26 维萨国际服务协会 用于记录表示多个交互的数据的系统和方法
GB201709760D0 (en) * 2017-06-19 2017-08-02 Nchain Holdings Ltd Computer-Implemented system and method
WO2018235845A1 (ja) * 2017-06-21 2018-12-27 日本電信電話株式会社 鍵交換システムおよび鍵交換方法
GB201803815D0 (en) * 2018-03-09 2018-04-25 Nchain Holdings Ltd Computer-implemented methods and systems
JP6907144B2 (ja) * 2018-03-27 2021-07-21 Kddi株式会社 アクセス制限システム、アクセス制限方法及びアクセス制限プログラム
US11165756B2 (en) * 2018-06-11 2021-11-02 Fujitsu Limited Delayed-access encryption for blockchain field
CN108833438B (zh) * 2018-07-18 2020-04-14 电子科技大学 一种基于区块链的工业物联网信息安全存储方法
JP6838260B2 (ja) * 2018-11-14 2021-03-03 カウリー株式会社 ブロックチェーン制御方法

Also Published As

Publication number Publication date
IL282861B1 (en) 2023-05-01
JP7369772B2 (ja) 2023-10-26
SG11202104773QA (en) 2021-06-29
IL301597A (en) 2023-05-01
KR20210100660A (ko) 2021-08-17
US20200186334A1 (en) 2020-06-11
JP2024003002A (ja) 2024-01-11
CA3122537A1 (en) 2020-06-18
IL282861B2 (en) 2023-09-01
AU2019396425B2 (en) 2023-03-16
AU2019396425A2 (en) 2021-06-03
CN113475037A (zh) 2021-10-01
US20230125327A1 (en) 2023-04-27
AU2019396425A1 (en) 2021-05-20
AU2023203711A1 (en) 2023-07-06
US11405186B2 (en) 2022-08-02
EP3895372A1 (en) 2021-10-20
BR112021011165A2 (pt) 2021-08-31
JP2022512220A (ja) 2022-02-02
WO2020123538A1 (en) 2020-06-18
IL282861A (en) 2021-06-30

Similar Documents

Publication Publication Date Title
CA3011012A1 (en) Generating and sending encrypted payment data messages between computing devices to effect a transfer of funds
US10187361B2 (en) Method for secure communication using asymmetric and symmetric encryption over insecure communications
US11095624B2 (en) End-to-end encryption for personal communication nodes
WO2019204670A3 (en) Decentralized protocol for maintaining cryptographically proven multi-step referral networks
MX2021014176A (es) Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales.
MX2019004655A (es) Recuperacion de informacion de transaccion cifrada en transacciones confidenciales de cadena de bloques.
CN103795523B (zh) 用于电子招投标的电子标书多层加解密系统及方法
GB2603096A (en) Forward secrecy in transport layer security using ephemral keys
SG11201903671WA (en) Data transmission method, apparatus and system
MX2018003295A (es) Método criptográfico, implementado por computadora para mejorar una red informatica, y terminal, sistema y medio legible por computadora para la misma.
JP2018525891A5 (es)
WO2011016900A3 (en) Hardware based cryptography
GB2505590A (en) System and method for secure instant messaging
JP2006276093A5 (es)
ATE523007T1 (de) Verfahren und programmprodukt zur sicherstellung der vertraulichkeit einer email-adresse in einer email
CN106850522A (zh) 一种即时通信中群组文件加密传输的实现方法
CN109743171A (zh) 一种解决多方数字签名、时间戳及加密的密钥串联方法
CN106355104A (zh) 一种基于沙箱技术实现原文隐私保护的电子签名方法
CN104967513A (zh) 具有多重安全属性的基于身份的多接收者环签密方法
US20170279608A1 (en) Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications
EP4274157A3 (en) Communicating securely with devices in a distributed control system
EE201700036A (et) Meetod, seade ja süsteem krüptograafilise liitsignatuuri genereerimiseks ning masinloetav andmekandja
CN107733646A (zh) 加密方法、解密方法和加密解密系统
Kallam Diffie-hellman: key exchange and public key cryptosystems
CN104200154A (zh) 一种基于标识的安装包签名方法及其装置