SG11201908552RA - Methods and devices for testing signature verification for blockchain system - Google Patents

Methods and devices for testing signature verification for blockchain system

Info

Publication number
SG11201908552RA
SG11201908552RA SG11201908552RA SG11201908552RA SG 11201908552R A SG11201908552R A SG 11201908552RA SG 11201908552R A SG11201908552R A SG 11201908552RA SG 11201908552R A SG11201908552R A SG 11201908552RA
Authority
SG
Singapore
Prior art keywords
testing
international
blockchain system
execution result
group
Prior art date
Application number
Inventor
Yu Ma
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11201908552RA publication Critical patent/SG11201908552RA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]

Abstract

StartObtain one or more testing configurations from a configuration file Generate a plurality of computer processes or threads 404 for testing configurations in the configuration file End Obtain the comparison resul of each of the testing 418 configurations in the confi uration file (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 31 May 2019 (31.05.2019) WIPO I PCT 11111111111110111111111111111101111101011111111111110111111111111111111111101111001111 (10) International Publication Number WO 2019/101235 A3 (51) International Patent Classification: G06Q 20/06 (2012.01) (21) International Application Number: PCT/CN2019/076884 (22) International Filing Date: 04 March 2019 (04.03.2019) (25) Filing Language: English (26) Publication Language: English (71) Applicant: ALIBABA GROUP HOLDING LIMITED [—/CN]; Fourth Floor, One Capital Place, P.O. BOX 847, George Town, Grand Cayman (KY). (72) Inventor: MA, Yu; Alibaba Group Legal Department 5/F, Building 3, No.969 West Wen Yi Road, Yu Hang District, Hangzhou, Zhejiang 311121 (CN). (74) Agent: BEIJING BESTIPR INTELLECTUAL PROP- ERTY LAW CORPORATION; Room 409, Tower B, Ka Wah Building, No. 9 Shangdi 3rd Street, Haidian District, Beijing 100085 (CN). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, 1E, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). Published: with international search report (Art. 21(3)) before the expiration of the time limit for amending the claims and to be republished in the event of receipt of amendments (Rule 48.2(h)) upon request of the applicant, before the expiration of the time limit referred to in Article 21(2) (a) (54) Title: METHODS AND DEVICES FOR TESTING SIGNATURE VERIFICATION FOR BLOCKCHAIN SYSTEM (57) : Disclosed herein are methods, devices, and apparatus- es, including computer programs stored on computer-readable media, for testing signature verification for a blockchain system. One of the meth- ods includes: obtaining a testing configuration from a configuration file, wherein the testing configuration specifies a cryptography algorithm used in the blockchain system, a group of one or more private keys correspond- ing to the cryptography algorithm, and a predetermined execution result based on the cryptography algorithm and the group of one or more private keys; signing a transaction, by encrypting data representing the transac- tion based on the cryptography algorithm and the group of one or more private keys, to generate one or more signed transactions; sending the one or more signed transactions to the blockchain system and receiving an ex- 416 ecution result from the blockchain system; and determining whether the predetermined execution result is satisfied based on the execution result. Generate a transaction for each testing configuration in the 406 configuration file Determine whether the predetermined execution result is satisfied based on the received execution result Obtain each private key based on a representation of the private key Sign the generated transaction with the group of private keys in the testing configuration Receive the execution result from the blockchain system ,-414 Send one or more signed transactions to the blockchain 412 system FIG. 4 W O 20 19/ 10 1235 A3 408 ,-- 410 [Continued on next page] WO 2019/101235 A3 I Illi I 01111I 0111010111111110111110 1 0 111 0 111 11111 OHO Ill 0111 INHUME (88) Date of publication of the international search report: 18 July 2019 (18.07.2019)
SG11201908552R 2019-03-04 2019-03-04 Methods and devices for testing signature verification for blockchain system SG11201908552RA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/076884 WO2019101235A2 (en) 2019-03-04 2019-03-04 Methods and devices for testing signature verification for blockchain system

Publications (1)

Publication Number Publication Date
SG11201908552RA true SG11201908552RA (en) 2019-10-30

Family

ID=66631233

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201908552R SG11201908552RA (en) 2019-03-04 2019-03-04 Methods and devices for testing signature verification for blockchain system

Country Status (6)

Country Link
US (1) US11315111B2 (en)
EP (1) EP3590084B1 (en)
CN (1) CN110785783B (en)
SG (1) SG11201908552RA (en)
TW (1) TW202034251A (en)
WO (1) WO2019101235A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112404425A (en) * 2020-11-24 2021-02-26 福州大学 High-strength 12Cr steel and preparation method thereof

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10970180B2 (en) * 2019-03-29 2021-04-06 Nakamoto & Turing Labs Inc Methods and apparatus for verifying processing results and/or taking corrective actions in response to a detected invalid result
CN110471827B (en) * 2019-08-09 2023-02-17 中国信息通信研究院 Block chain performance benchmark test method and device
CN110719165B (en) * 2019-10-12 2022-07-12 杭州云象网络技术有限公司 Block chain distributed dynamic network key generation and encryption method
CN111008827B (en) * 2019-11-25 2023-07-21 深圳前海微众银行股份有限公司 Cross-chain transaction signature method and device
CN113221157B (en) * 2020-02-04 2023-09-26 北京京东振世信息技术有限公司 Equipment upgrading method and device
CN111245617B (en) * 2020-03-11 2022-07-05 杭州泛链科技有限公司 Double threshold signature method based on ECDSA
CN111523889B (en) * 2020-04-17 2023-09-01 昆明大棒客科技有限公司 Multiple signature implementation method, device, equipment and storage medium
CN111782537B (en) * 2020-07-08 2021-12-17 上海计算机软件技术开发中心 Crowd-sourcing process management system and method based on block chain technology
CN112507360A (en) * 2020-12-10 2021-03-16 浙商银行股份有限公司 Block chain data uplink method and device based on threshold signature and prediction machine
CN112702323B (en) * 2020-12-14 2022-06-03 杭州溪塔科技有限公司 License issuing verification method and device for block chain software and electronic equipment
CN112651835B (en) * 2020-12-30 2023-05-23 成都佳华物链云科技有限公司 Alliance chain transaction method, device, electronic equipment and storage medium
CN113240418B (en) * 2021-04-23 2024-01-12 上海和数软件有限公司 Block chain-based intelligent access control method and equipment for private data
CN113506104B (en) * 2021-05-07 2024-03-01 杭州宇链科技有限公司 Signature generation and verification modes and system combining software and hardware

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005043807A1 (en) * 2003-10-28 2005-05-12 Certicom Corp. Method and apparatus for verifiable generation of public keys
JP4827468B2 (en) * 2005-07-25 2011-11-30 キヤノン株式会社 Information processing apparatus, information processing apparatus control method, computer program, and computer-readable storage medium
US7822206B2 (en) * 2006-10-26 2010-10-26 International Business Machines Corporation Systems and methods for management and auto-generation of encryption keys
US10572371B2 (en) * 2012-09-07 2020-02-25 Red Hat Israel, Ltd. Generating valid use cases from a parsed configuration file describing use case options
US10148441B2 (en) * 2014-09-12 2018-12-04 Verisign, Inc. Systems, devices, and methods for detecting double signing in a one-time use signature scheme
US10015017B2 (en) * 2015-04-09 2018-07-03 Qualcomm Incorporated Proof of work based user identification system
US10812274B2 (en) * 2015-05-07 2020-10-20 Blockstream Corporation Transferring ledger assets between blockchains via pegged sidechains
US10326602B2 (en) * 2015-09-18 2019-06-18 Virginia Tech Intellectual Properties, Inc. Group signatures with probabilistic revocation
US9948467B2 (en) * 2015-12-21 2018-04-17 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN106411503B (en) * 2016-11-28 2019-11-08 中国银行股份有限公司 The bookkeeping methods and system, ballot and accounting nodes of block chain ballot accounting mode
MX2019007034A (en) * 2016-12-14 2019-08-22 Walmart Apollo Llc Controlling access to a locked space using cryptographic keys stored on a blockchain.
CN106651331B (en) * 2016-12-22 2019-11-29 飞天诚信科技股份有限公司 A kind of electronic trade method and system based on digital cash
CN107392040B (en) * 2017-04-28 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and device of common recognition verifying
US20180349896A1 (en) * 2017-06-05 2018-12-06 Mastercard International Incorporated Method and system for anonymization of electronic transactions via blockchain
CN108063758A (en) * 2017-11-27 2018-05-22 众安信息技术服务有限公司 For the node in the signature verification method of block chain network and block chain network
US20190295049A1 (en) * 2018-03-22 2019-09-26 NEC Laboratories Europe GmbH System and method for secure transaction verification in a distributed ledger system
US11263605B2 (en) * 2018-03-22 2022-03-01 R3 Llc Weighted multiple authorizations
CN108876369B (en) * 2018-06-05 2021-07-13 上海和数软件有限公司 Block chain-based data communication method and device and computer-readable storage medium
CN109104287A (en) * 2018-07-27 2018-12-28 众安信息技术服务有限公司 The method and apparatus communicated in block chain
EP3644558A1 (en) * 2018-10-23 2020-04-29 Siemens Aktiengesellschaft Testing of network functions of a communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112404425A (en) * 2020-11-24 2021-02-26 福州大学 High-strength 12Cr steel and preparation method thereof

Also Published As

Publication number Publication date
WO2019101235A2 (en) 2019-05-31
EP3590084B1 (en) 2022-05-11
CN110785783A (en) 2020-02-11
EP3590084A2 (en) 2020-01-08
TW202034251A (en) 2020-09-16
US11315111B2 (en) 2022-04-26
US20200286087A1 (en) 2020-09-10
EP3590084A4 (en) 2020-04-01
WO2019101235A3 (en) 2019-07-18
CN110785783B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
SG11201908552RA (en) Methods and devices for testing signature verification for blockchain system
SG11201908946PA (en) Program execution and data proof scheme using multiple key pair signatures
SG11201908981SA (en) Retrieving public data for blockchain networks using highly available trusted execution environments
SG11201908651SA (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
SG11201909630TA (en) Anti-replay attack authentication protocol
SG11201909855YA (en) Distributed key management for trusted execution environments
SG11201910054WA (en) Securely executing smart contract operations in a trusted execution environment
SG11201906830XA (en) Verifying integrity of data stored in a consortium blockchain using a public sidechain
SG11201908983WA (en) Retrieving access data for blockchain networks using highly available trusted execution environments
SG11201908937RA (en) System and method for managing user interactions with a blockchain
SG11201903566XA (en) Regulating blockchain confidential transactions
SG11201908554PA (en) Methods and devices for acquiring and recording tracking information on blockchain
SG11201903562QA (en) Recovering encrypted transaction information in blockchain confidential transactions
SG11201909013RA (en) Authentication based on a recoverd public key
SG11201906834SA (en) Achieving consensus among network nodes in a distributed system
SG11201909014QA (en) Preventing misrepresentation of input data by participants in a secure multi-party computation
SG11201909112PA (en) Field-programmable gate array based trusted execution environment for use in a blockchain network
SG11201908387SA (en) Consensus system downtime recovery
SG11201907281WA (en) Blockchain data protection based on generic account model and homomorphic encryption
SG11201908294TA (en) System and method for parallel-processing blockchain transactions
SG11201909809VA (en) Processing blockchain data based on smart contract operations executed in a trusted execution environment
SG11201908794UA (en) Property management system utilizing a blockchain network
SG11201908982QA (en) Managing sensitive data elements in a blockchain network
SG11201908853YA (en) System and method for ending view change protocol
SG11201908647SA (en) Methods and devices for processing certificates in blockchain system