SG11202000808WA - Computer-implemented method of generating a threshold vault - Google Patents

Computer-implemented method of generating a threshold vault

Info

Publication number
SG11202000808WA
SG11202000808WA SG11202000808WA SG11202000808WA SG11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA SG 11202000808W A SG11202000808W A SG 11202000808WA
Authority
SG
Singapore
Prior art keywords
generating
computer
implemented method
threshold vault
vault
Prior art date
Application number
SG11202000808WA
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1713064.2A external-priority patent/GB201713064D0/en
Priority claimed from GBGB1714660.6A external-priority patent/GB201714660D0/en
Priority claimed from PCT/IB2018/055604 external-priority patent/WO2019034951A1/en
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202000808WA publication Critical patent/SG11202000808WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Saccharide Compounds (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
SG11202000808WA 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault SG11202000808WA (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
GBGB1713064.2A GB201713064D0 (en) 2017-08-15 2017-08-15 Computer-implemented methods and systems
IB2017054961 2017-08-15
IB2017055497 2017-09-12
GBGB1714660.6A GB201714660D0 (en) 2017-08-15 2017-09-12 Computer-implemented methods and systems
IB2017057782 2017-12-11
PCT/IB2018/055604 WO2019034951A1 (en) 2017-08-15 2018-07-26 Threshold digital signature method and system
PCT/IB2018/056094 WO2019034986A1 (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault

Publications (1)

Publication Number Publication Date
SG11202000808WA true SG11202000808WA (en) 2020-02-27

Family

ID=67702926

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202000808WA SG11202000808WA (en) 2017-08-15 2018-08-13 Computer-implemented method of generating a threshold vault

Country Status (8)

Country Link
US (2) US11381389B2 (en)
EP (2) EP4325770A3 (en)
JP (2) JP7202358B2 (en)
KR (2) KR20240011260A (en)
CN (1) CN110999207B (en)
SG (1) SG11202000808WA (en)
TW (2) TW202403575A (en)
WO (1) WO2019034986A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760547A (en) * 2023-08-21 2023-09-15 湖南湘江树图信息科技创新中心有限公司 Distributed private key management method and system
CN116865957A (en) * 2023-07-04 2023-10-10 北京邮电大学 Quantum security multiparty computing system

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6753403B2 (en) * 2015-08-26 2020-09-09 日本電気株式会社 Information processing equipment, authentication systems, authentication methods, and computer programs
US10505723B1 (en) * 2017-04-26 2019-12-10 Wells Fargo Bank, N.A. Secret sharing information management and security system
KR102667837B1 (en) 2017-08-30 2024-05-21 인퍼, 인코포레이티드 High-precision privacy-preserving real-value function evaluation
US11481761B2 (en) 2018-06-03 2022-10-25 VVOW Company Limited Peer-to-peer cryptocurrency and crypto asset trading platform
WO2020123926A1 (en) * 2018-12-13 2020-06-18 Login Id Inc. Decentralized computing systems and methods for performing actions using stored private data
EP3696670A1 (en) * 2019-02-13 2020-08-19 UVUE Limited Distributed computation system and method of operation thereof
IL285484B1 (en) * 2019-02-22 2024-03-01 Inpher Inc Arithmetic for secure multi-party computation with modular integers
US10951415B2 (en) * 2019-03-13 2021-03-16 Digital 14 Llc System, method, and computer program product for implementing zero round trip secure communications based on noisy secrets with a polynomial secret sharing scheme
US10892891B2 (en) * 2019-03-13 2021-01-12 Digital 14 Llc System, method, and computer program product for zero round trip secure communications based on two noisy secrets
US11451406B2 (en) * 2019-04-04 2022-09-20 Moac Blockchain Tech Inc Cross-chain messaging and message validation
US11646877B2 (en) * 2019-05-14 2023-05-09 Samsung Sds Co., Ltd. Apparatus and method for generating secret key, apparatus and method for generating evaluation key
GB2584154A (en) 2019-05-24 2020-11-25 Nchain Holdings Ltd Knowledge proof
US10790990B2 (en) * 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
CN110457936B (en) * 2019-07-01 2020-08-14 阿里巴巴集团控股有限公司 Data interaction method and device and electronic equipment
CN111064557A (en) * 2019-12-25 2020-04-24 杭州安司源科技有限公司 Distributed trusteeship digital currency threshold signature key distribution method
CN113129001B (en) * 2019-12-31 2023-02-17 上海证锘信息科技有限公司 Anti-quantum attack threshold signature method for block chain cross-chain and asset hosting
GB2597123B (en) * 2020-05-14 2023-08-30 Hung Hung Chiu A method for creating a hierarchical threshold signature digital asset wallet
CN113746623B (en) * 2020-05-28 2023-03-24 华为技术有限公司 Threshold key verification method and related equipment
US11621834B2 (en) * 2020-06-15 2023-04-04 Acronis International Gmbh Systems and methods for preserving data integrity when integrating secure multiparty computation and blockchain technology
GB2597539A (en) * 2020-07-28 2022-02-02 Nchain Holdings Ltd Generating shared private keys
EP3955110A1 (en) 2020-08-12 2022-02-16 UVUE Limited Distributed computing system and method of operation thereof
GB2598112A (en) * 2020-08-18 2022-02-23 Nchain Holdings Ltd Threshold signatures
GB2600684A (en) * 2020-10-28 2022-05-11 Nchain Holdings Ltd Identifying denial-of-service attacks
CN112635010B (en) * 2020-12-28 2023-07-07 扬州大学 Data storage and sharing method under edge computing based on double block chains
CN112906038B (en) * 2021-03-26 2023-04-07 成都卫士通信息产业股份有限公司 Thresholding processing method, device and equipment based on SM9 key and storage medium
CN113438070B (en) * 2021-05-25 2023-07-21 中国科学院计算技术研究所 CAPSS-based block chain key recovery method and system
CN113569261B (en) * 2021-07-30 2024-05-14 华北电力科学研究院有限责任公司 Power grid data processing method and device, electronic equipment and storage medium
GB2612309A (en) * 2021-10-26 2023-05-03 Nchain Licensing Ag Threshold signature scheme
GB2612310A (en) * 2021-10-26 2023-05-03 Nchain Licensing Ag Generating shared keys
US11811752B1 (en) * 2022-08-03 2023-11-07 1080 Network, Inc. Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
CN116915416B (en) * 2023-09-14 2023-12-15 北京信安世纪科技股份有限公司 Certificate signing method and device and certificate obtaining method and device

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5764767A (en) 1996-08-21 1998-06-09 Technion Research And Development Foundation Ltd. System for reconstruction of a secret shared by a plurality of participants
EP1944906A3 (en) * 1998-05-22 2012-07-04 Certco Incorporated Robust efficient distributed RSA-key generation
US6363481B1 (en) 1998-08-03 2002-03-26 Nortel Networks Limited Method and apparatus for secure data storage using distributed databases
JP3560860B2 (en) 1999-07-23 2004-09-02 株式会社東芝 Secret sharing system, device, and storage medium
JP4292835B2 (en) 2003-03-13 2009-07-08 沖電気工業株式会社 Secret reconstruction method, distributed secret reconstruction device, and secret reconstruction system
CN101425902A (en) * 2008-11-12 2009-05-06 电子科技大学 Threshold digital signature method and system having forward security
US20110213975A1 (en) 2010-03-01 2011-09-01 Alessandro Sorniotti Secret interest groups in online social networks
US8874991B2 (en) 2011-04-01 2014-10-28 Cleversafe, Inc. Appending data to existing data stored in a dispersed storage network
EP2689333B1 (en) 2012-07-06 2014-09-10 NEC Europe Ltd. Method and system for storing and reading data in or from a key value storage
TW201424322A (en) * 2012-12-04 2014-06-16 Cheng-Chung Lee System for validating digital signature represented by signature identification and method thereof
US9450938B1 (en) 2013-03-13 2016-09-20 Hrl Laboratories, Llc Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity
US9489522B1 (en) * 2013-03-13 2016-11-08 Hrl Laboratories, Llc Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security
US9350550B2 (en) * 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
WO2015160839A1 (en) 2014-04-17 2015-10-22 Hrl Laboratories, Llc A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security
US10432409B2 (en) * 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
WO2016015141A1 (en) * 2014-07-28 2016-02-04 Infosec Global Inc. System and method for cryptographic suite management
WO2016049406A1 (en) * 2014-09-26 2016-03-31 Technicolor Usa, Inc. Method and apparatus for secure non-interactive threshold signatures
US9813234B2 (en) 2015-05-11 2017-11-07 The United States of America, as represented by the Secretery of the Air Force Transferable multiparty computation
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
EP3259724B1 (en) * 2016-02-23 2021-03-24 Nchain Holdings Limited Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
AU2017223133B2 (en) 2016-02-23 2022-09-08 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US10046228B2 (en) * 2016-05-02 2018-08-14 Bao Tran Smart device
US20170345011A1 (en) * 2016-05-26 2017-11-30 Hitfin, Inc. System and method executed on a blockchain network
CN107040380A (en) * 2017-06-13 2017-08-11 厦门大学 A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method
US10700850B2 (en) * 2018-11-27 2020-06-30 Alibaba Group Holding Limited System and method for information protection
BR112019007232B1 (en) * 2018-11-27 2022-02-15 Advanced New Technologies Co., Ltd COMPUTER-IMPLEMENTED METHODS FOR INFORMATION PROTECTION, SYSTEMS FOR INFORMATION PROTECTION AND NON-TRANSITORY COMPUTER-LEABLE STORAGE MEDIA

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116865957A (en) * 2023-07-04 2023-10-10 北京邮电大学 Quantum security multiparty computing system
CN116760547A (en) * 2023-08-21 2023-09-15 湖南湘江树图信息科技创新中心有限公司 Distributed private key management method and system

Also Published As

Publication number Publication date
US20200213099A1 (en) 2020-07-02
TW202403575A (en) 2024-01-16
EP3669491A1 (en) 2020-06-24
EP3669491B1 (en) 2024-02-07
KR20240011260A (en) 2024-01-25
CN110999207A (en) 2020-04-10
KR20200035280A (en) 2020-04-02
JP2023024683A (en) 2023-02-16
US20230013158A1 (en) 2023-01-19
EP4325770A2 (en) 2024-02-21
TWI822693B (en) 2023-11-21
TW201921888A (en) 2019-06-01
JP7202358B2 (en) 2023-01-11
JP2020532168A (en) 2020-11-05
US11381389B2 (en) 2022-07-05
CN110999207B (en) 2024-05-31
EP4325770A3 (en) 2024-04-24
KR102627049B1 (en) 2024-01-19
WO2019034986A1 (en) 2019-02-21

Similar Documents

Publication Publication Date Title
SG11202000808WA (en) Computer-implemented method of generating a threshold vault
PL3490395T3 (en) Method of generating aerosol
PL3448674T3 (en) A veneered element and method of producing such a veneered element
GB2522494B (en) Perforating gun assembly and method of forming wellbore perfortions
GB2548555B (en) A method of redatuming geophysical data
EP3426748A4 (en) Method of increasing the density of a well treatment brine
GB201703847D0 (en) Curable composition and resing for treatment of a subterranean formation
GB2542317B (en) Reverse cementation of liner string for formation stimulation
GB2575408B (en) A banknote and a method of producing a banknote
PL3576958T3 (en) Method of forming a security document
GB201718895D0 (en) A method of generating training data
GB201522544D0 (en) Method of forming a closure
PL3242801T3 (en) Method of producing a security element and security element
HK1257292A1 (en) Method of generating a georeferenced plan
TWI563099B (en) A plated steel and a method of producing thereof
EP3497875C0 (en) A method of generating a secure record of a conversation
PL3177781T3 (en) A beam and a method of producing such a beam
GB201521886D0 (en) A method of treating a well
IL246869A0 (en) Introductory assembly and method for inserting intracardiac instruments
GB201501940D0 (en) A method of forming a closure
GB201417528D0 (en) A method of colouring titanium or titanium alloy
GB201805448D0 (en) Computer-implemented method
ZA201803802B (en) Method of forming a closure member
GB201721461D0 (en) Computer-implemented methods of evaluating
GB201615934D0 (en) A method of combining data