SG11202005342UA - Blockchain-implemented security systems and methods for blinded outcome selection - Google Patents

Blockchain-implemented security systems and methods for blinded outcome selection

Info

Publication number
SG11202005342UA
SG11202005342UA SG11202005342UA SG11202005342UA SG11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA SG 11202005342U A SG11202005342U A SG 11202005342UA
Authority
SG
Singapore
Prior art keywords
blinded
blockchain
methods
security systems
implemented security
Prior art date
Application number
SG11202005342UA
Other languages
English (en)
Inventor
Silvia Bartolucci
Pauline Bernat
Daniel Joseph
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202005342UA publication Critical patent/SG11202005342UA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG11202005342UA 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection SG11202005342UA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1720389.4A GB201720389D0 (en) 2017-12-07 2017-12-07 Computer-implemented system and method
PCT/IB2018/059555 WO2019111125A1 (en) 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection

Publications (1)

Publication Number Publication Date
SG11202005342UA true SG11202005342UA (en) 2020-07-29

Family

ID=61007262

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202005342UA SG11202005342UA (en) 2017-12-07 2018-12-03 Blockchain-implemented security systems and methods for blinded outcome selection

Country Status (8)

Country Link
US (2) US11728969B2 (ja)
EP (2) EP4195588A1 (ja)
JP (3) JP7231630B2 (ja)
KR (1) KR20200096241A (ja)
CN (1) CN111466098B (ja)
GB (1) GB201720389D0 (ja)
SG (1) SG11202005342UA (ja)
WO (1) WO2019111125A1 (ja)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11989208B2 (en) * 2018-08-06 2024-05-21 Inveniam Capital Partners, Inc. Transactional sharding of blockchain transactions
US11356276B2 (en) * 2018-08-28 2022-06-07 R&D 3 Llc Digital data management
CN110197433B (zh) * 2018-10-25 2021-07-27 腾讯科技(深圳)有限公司 数值转移方法、装置及系统
US10790990B2 (en) 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
KR102654541B1 (ko) * 2022-02-15 2024-04-05 한국전력공사 블록체인 네트워크의 트랜잭션 합의 방법 및 블록체인 노드
US11538028B1 (en) * 2022-06-22 2022-12-27 Alexei Dulub Implementing non-fungible tokens using bitcoin

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100329448A1 (en) * 2009-06-30 2010-12-30 Rane Shantanu D Method for Secure Evaluation of a Function Applied to Encrypted Signals
US10423961B1 (en) * 2014-02-19 2019-09-24 Hrl Laboratories, Llc System and method for operating a proactive digital currency ledger
FR3018378A1 (fr) * 2014-03-12 2015-09-11 Enrico Maim Systeme et procede transactionnels a architecture repartie fondees sur des transactions de transferts d'unites de compte entre adresses
AU2015308608B2 (en) * 2014-08-29 2019-07-04 Visa International Service Association Methods for secure cryptogram generation
US20160300223A1 (en) * 2015-04-08 2016-10-13 Portable Data Corporation Protected data transfer across disparate networks
WO2017065209A1 (ja) * 2015-10-16 2017-04-20 国立大学法人東北大学 情報処理システム、情報処理装置、情報処理方法、及び、プログラム
AU2017223129A1 (en) * 2016-02-23 2018-07-12 nChain Holdings Limited Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US20170244687A1 (en) * 2016-02-24 2017-08-24 Whitewood Encryption Systems, Inc. Techniques for confidential delivery of random data over a network
US11176584B2 (en) * 2016-08-03 2021-11-16 Raise Marketplace, Llc Cross-brand redemption in an exchange item marketplace network
CN106055993A (zh) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 一种用于区块链的加密存储系统及其使用方法
CN106788985A (zh) 2016-11-25 2017-05-31 中国电子科技集团公司第三十研究所 一种第三方可监管的隐身地址实现方法
CN106790253A (zh) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 基于区块链的认证方法和装置
CN107395349A (zh) * 2017-08-16 2017-11-24 深圳国微技术有限公司 一种基于自认证公钥体制的区块链网络密钥分发方法

Also Published As

Publication number Publication date
US20200389292A1 (en) 2020-12-10
GB201720389D0 (en) 2018-01-24
EP4195588A1 (en) 2023-06-14
KR20200096241A (ko) 2020-08-11
EP3721582A1 (en) 2020-10-14
JP7231630B2 (ja) 2023-03-01
WO2019111125A1 (en) 2019-06-13
JP2024059932A (ja) 2024-05-01
US11728969B2 (en) 2023-08-15
JP7449423B2 (ja) 2024-03-13
JP2021506151A (ja) 2021-02-18
CN111466098A (zh) 2020-07-28
US20230412358A1 (en) 2023-12-21
CN111466098B (zh) 2024-04-02
JP2023056011A (ja) 2023-04-18
EP3721582B1 (en) 2023-01-04

Similar Documents

Publication Publication Date Title
IL283779A (en) Systems and methods for preventing, alleviating and/or treating dementia
GB202110037D0 (en) Security systems and methods
GB202002269D0 (en) Methods and systems for ion manipulation
SG10201607277VA (en) Method and system for access control
EP3500992A4 (en) SYSTEMS AND METHODS FOR ADVANCED AUTHORIZATION RESPONSE
SG11202005342UA (en) Blockchain-implemented security systems and methods for blinded outcome selection
GB2549371B (en) Access authentication method and system
HK1258246A1 (zh) 認證方法和系統
ZA202007214B (en) Systems and methods for encoder-guided adaptive-quality rendering
SG11201407621RA (en) Security control system for granting access and security control method thereof
GB201712951D0 (en) Systems and methods for selecting datasets
EP3391200A4 (en) SYSTEMS, DEVICES AND PROCESSES FOR STEP-BY-STEP ACCESS
GB201813390D0 (en) Systems and methods for muulti-factor authentication
GB2549270B (en) Control systems and methods
GB201621176D0 (en) Authentication systems and methods
GB201612706D0 (en) Control systems and methods
IL261535B (en) Controlled access system and method for this
IL257134B (en) Systems and methods for multi-layer security of a communication network
GB2567564B (en) Control systems and methods
EP3374236A4 (en) SYSTEMS AND METHODS FOR CONTROLLING AIRBAGS
ZA201807673B (en) Security system and method
GB201608976D0 (en) Task control system and method
AU2016900263A0 (en) Indirect security system and method
GB201509031D0 (en) Authentication methods and systems
GB201509030D0 (en) Authentication methods and systems