SG10201910373PA - Cryptographic datashare control for blockchain - Google Patents
Cryptographic datashare control for blockchainInfo
- Publication number
- SG10201910373PA SG10201910373PA SG10201910373PA SG10201910373PA SG10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA SG 10201910373P A SG10201910373P A SG 10201910373PA
- Authority
- SG
- Singapore
- Prior art keywords
- datashare
- blockchain
- cryptographic
- control
- datashare control
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862757273P | 2018-11-08 | 2018-11-08 | |
US16/672,761 US10721217B2 (en) | 2018-11-08 | 2019-11-04 | Cryptographic datashare control for blockchain |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201910373PA true SG10201910373PA (en) | 2020-06-29 |
Family
ID=68470408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201910373PA SG10201910373PA (en) | 2018-11-08 | 2019-11-06 | Cryptographic datashare control for blockchain |
Country Status (6)
Country | Link |
---|---|
US (2) | US10721217B2 (en) |
EP (1) | EP3651405B1 (en) |
JP (2) | JP2020092414A (en) |
CN (1) | CN111159723B (en) |
AU (1) | AU2019261730B2 (en) |
SG (1) | SG10201910373PA (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11405365B2 (en) | 2019-03-13 | 2022-08-02 | Springcoin, Inc. | Method and apparatus for effecting a data-based activity |
US11374910B2 (en) * | 2019-03-13 | 2022-06-28 | Springcoin, Inc. | Method and apparatus for effecting a data-based activity |
US11941619B2 (en) * | 2019-12-12 | 2024-03-26 | Paypal, Inc. | Validation and storage of transaction data for a blockchain |
CN111131317B (en) | 2019-12-31 | 2022-04-26 | 百度在线网络技术(北京)有限公司 | Data processing method, device, equipment and medium based on block chain |
US11637817B2 (en) | 2020-03-12 | 2023-04-25 | Springcoin, Inc. | Method and apparatus for effecting a data-based activity |
CN111859446A (en) * | 2020-06-16 | 2020-10-30 | 北京农业信息技术研究中心 | Agricultural product traceability information sharing-privacy protection method and system |
CN113347008B (en) * | 2021-08-05 | 2021-11-26 | 南京可信区块链与算法经济研究院有限公司 | Loan information storage method adopting addition homomorphic encryption |
CN115118411B (en) * | 2022-08-29 | 2022-11-29 | 人民法院信息技术服务中心 | Method, device and equipment for down-link multi-party trusted computing and storage medium |
CN117521164B (en) * | 2024-01-08 | 2024-05-03 | 南湖实验室 | Self-adaptive homomorphic encryption method based on trusted execution environment |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1830190A (en) | 2003-07-29 | 2006-09-06 | 汤姆森特许公司 | Controlling access to a network using redirection |
KR101243713B1 (en) | 2011-07-08 | 2013-03-13 | 이광민 | Wireless lan access point and method for accessing wireless lan |
US8495714B2 (en) | 2011-07-20 | 2013-07-23 | Bridgewater Systems Corp. | Systems and methods for authenticating users accessing unsecured wifi access points |
US8844013B2 (en) | 2011-10-04 | 2014-09-23 | Salesforce.Com, Inc. | Providing third party authentication in an on-demand service environment |
US9479488B2 (en) | 2012-01-26 | 2016-10-25 | Facebook, Inc. | Network access based on social-networking information |
US10572684B2 (en) * | 2013-11-01 | 2020-02-25 | Anonos Inc. | Systems and methods for enforcing centralized privacy controls in de-centralized systems |
JP6677653B2 (en) * | 2014-12-25 | 2020-04-08 | 国立大学法人 東京大学 | Control device, analysis device and decoding device |
US10013573B2 (en) * | 2015-12-16 | 2018-07-03 | International Business Machines Corporation | Personal ledger blockchain |
WO2017148527A1 (en) * | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
US10992649B2 (en) * | 2016-04-01 | 2021-04-27 | Consensys Software Inc. | Systems and methods for privacy in distributed ledger transactions |
CN106549749B (en) * | 2016-12-06 | 2019-12-24 | 杭州趣链科技有限公司 | Block chain privacy protection method based on addition homomorphic encryption |
CN106845960B (en) * | 2017-01-24 | 2018-03-20 | 上海壹账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
US20180285839A1 (en) * | 2017-04-04 | 2018-10-04 | Datient, Inc. | Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network |
GB201706071D0 (en) * | 2017-04-18 | 2017-05-31 | Nchain Holdings Ltd | Computer-implemented system and method |
CN107911216B (en) * | 2017-10-26 | 2020-07-14 | 矩阵元技术(深圳)有限公司 | Block chain transaction privacy protection method and system |
CN108462568B (en) * | 2018-02-11 | 2021-08-06 | 西安电子科技大学 | Block chain-based secure file storage and sharing method and cloud storage system |
WO2019173519A1 (en) * | 2018-03-06 | 2019-09-12 | Jordan Simons | Customized view of restricted information recorded into a blockchain |
CA3041160C (en) * | 2018-11-07 | 2022-11-29 | Alibaba Group Holding Limited | Blockchain data protection based on account note model with zero-knowledge proof |
-
2019
- 2019-11-04 US US16/672,761 patent/US10721217B2/en active Active
- 2019-11-06 AU AU2019261730A patent/AU2019261730B2/en active Active
- 2019-11-06 EP EP19207482.1A patent/EP3651405B1/en active Active
- 2019-11-06 SG SG10201910373PA patent/SG10201910373PA/en unknown
- 2019-11-07 CN CN201911081606.1A patent/CN111159723B/en active Active
- 2019-11-07 JP JP2019202258A patent/JP2020092414A/en active Pending
-
2020
- 2020-07-16 US US16/931,119 patent/US11297043B2/en active Active
-
2022
- 2022-07-12 JP JP2022111823A patent/JP7149445B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20200153803A1 (en) | 2020-05-14 |
JP7149445B2 (en) | 2022-10-06 |
CN111159723B (en) | 2023-11-07 |
JP2022141772A (en) | 2022-09-29 |
EP3651405A1 (en) | 2020-05-13 |
AU2019261730A1 (en) | 2020-05-28 |
US10721217B2 (en) | 2020-07-21 |
JP2020092414A (en) | 2020-06-11 |
US20200351253A1 (en) | 2020-11-05 |
EP3651405B1 (en) | 2021-12-29 |
CN111159723A (en) | 2020-05-15 |
AU2019261730B2 (en) | 2021-02-11 |
US11297043B2 (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA206257S (en) | Control device | |
CA206264S (en) | Control device | |
EP3827381C0 (en) | Multi-qubit control | |
SG10201910373PA (en) | Cryptographic datashare control for blockchain | |
GB2608088B (en) | Control system | |
CA187726S (en) | Headware for computer control | |
CA217487S (en) | Control device | |
CA212393S (en) | Control device | |
CA194575S (en) | Control device | |
GB201811807D0 (en) | Encryption system | |
CA208042S (en) | Control device | |
HK1258974A1 (en) | Mobile-object control system | |
GB201710302D0 (en) | Control system | |
SG10201905100QA (en) | Control apparatus | |
GB201808757D0 (en) | Threat control | |
ZA202100616B (en) | Control arrangement | |
GB202017738D0 (en) | Control arrangement | |
PL3524860T3 (en) | Control member | |
GB2580353B (en) | Securing device for increased control | |
GB201819719D0 (en) | Control system | |
GB201913422D0 (en) | Machine-human interaction control device | |
GB201812873D0 (en) | Control system | |
SG11202009628UA (en) | Device operation control | |
GB201815107D0 (en) | Machine-human interaction control device | |
GB201814844D0 (en) | Magflow input offset control |