SG11202005570XA - Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords - Google Patents

Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords

Info

Publication number
SG11202005570XA
SG11202005570XA SG11202005570XA SG11202005570XA SG11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA SG 11202005570X A SG11202005570X A SG 11202005570XA
Authority
SG
Singapore
Prior art keywords
authorising
computer
methods
low
blockchain transactions
Prior art date
Application number
SG11202005570XA
Other languages
English (en)
Inventor
Silvia Bartolucci
John Fletcher
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202005570XA publication Critical patent/SG11202005570XA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG11202005570XA 2017-12-15 2018-12-12 Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords SG11202005570XA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB201721049 2017-12-15
PCT/IB2018/059921 WO2019116249A1 (en) 2017-12-15 2018-12-12 Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords

Publications (1)

Publication Number Publication Date
SG11202005570XA true SG11202005570XA (en) 2020-07-29

Family

ID=65013745

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202005570XA SG11202005570XA (en) 2017-12-15 2018-12-12 Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords

Country Status (8)

Country Link
US (2) US11429956B2 (ja)
EP (2) EP3725029B1 (ja)
JP (2) JP7289298B2 (ja)
KR (1) KR20200099149A (ja)
CN (1) CN111480315B (ja)
SG (1) SG11202005570XA (ja)
WO (1) WO2019116249A1 (ja)
ZA (1) ZA202004320B (ja)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11238450B2 (en) * 2016-12-21 2022-02-01 Nchain Licensing Ag Computer-implemented systems and methods to enable complex functionality on a blockchain while preserving security-based restrictions on script size and opcode limits
GB201701589D0 (en) 2017-01-31 2017-03-15 Nchain Holdings Ltd Computer-implemented system and method
EP3725029B1 (en) * 2017-12-15 2023-07-12 nChain Licensing AG Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords
US11188897B2 (en) * 2018-02-13 2021-11-30 Bank Of America Corporation Multi-tiered digital wallet security
US11995648B2 (en) * 2018-03-23 2024-05-28 Nchain Licensing Ag Computer-implemented system and method for enabling zero-knowledge proof
SG11202010346TA (en) 2018-05-14 2020-11-27 Nchain Holdings Ltd Computer-implemented systems and methods for using a blockchain to perform an atomic swap
EP3671599A1 (de) * 2018-12-21 2020-06-24 Siemens Aktiengesellschaft Verfahren zum betreiben eines verteilten datenbanksystems, verteiltes datenbanksystem und industrieautomatisierungssystem
GB2585010B (en) * 2019-06-24 2022-07-13 Blockstar Developments Ltd Cryptocurrency key management
CN112418862A (zh) * 2019-06-26 2021-02-26 创新先进技术有限公司 采用环签名的机密区块链交易的实现方法及装置
US11238447B2 (en) 2019-06-26 2022-02-01 Advanced New Technologies Co., Ltd. Blockchain transactions with ring signatures
US10790990B2 (en) 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
CN112488703A (zh) * 2019-06-26 2021-03-12 创新先进技术有限公司 基于环签名的匿名交易方法及装置
CN110544167B (zh) * 2019-07-25 2022-03-01 晋商博创(北京)科技有限公司 基于cpk的联盟链的数据处理方法、服务器及存储介质
CN110519059B (zh) * 2019-09-29 2023-05-05 四川师范大学 一种基于双线性映射的区块链双密钥隐匿地址处理方法
CN111160905B (zh) * 2019-12-17 2023-07-18 浙江大学 一种区块链节点用户请求处理保护方法及装置
CN111371558B (zh) * 2020-02-26 2024-01-16 百度在线网络技术(北京)有限公司 区块链数据处理方法、装置、电子设备及介质
US11424911B2 (en) * 2020-03-03 2022-08-23 International Business Machines Corporation Storage and communication environment for cryptographic tags
CN111309711A (zh) * 2020-03-13 2020-06-19 财付通支付科技有限公司 跨区块链的数据迁移方法、装置、设备及存储介质
US11087016B1 (en) * 2020-08-20 2021-08-10 Spideroak, Inc. Implementation of a file system on a block chain
CN112241553B (zh) * 2020-10-27 2022-11-04 上海万向区块链股份公司 一种基于多账本架构的区块链隐私保护方法及系统
CN112636929B (zh) * 2020-12-29 2023-01-17 北京百度网讯科技有限公司 群组业务实现方法、装置、设备和存储介质
CN113393225B (zh) * 2021-06-30 2022-10-28 杭州链网科技有限公司 数字货币加密支付方法及系统
CN113538140A (zh) * 2021-07-05 2021-10-22 杭州宇链科技有限公司 一种基于可信执行环境与门限签名的数据交易方法
US11538027B1 (en) * 2021-07-07 2022-12-27 Ava Labs, Inc. Secure and trustworthy bridge for transferring assets across different networks with an updating pool of wardens
US11677552B2 (en) * 2021-09-09 2023-06-13 Coinbase Il Rd Ltd. Method for preventing misuse of a cryptographic key
WO2023238172A1 (ja) * 2022-06-06 2023-12-14 日本電信電話株式会社 鍵発行システム、鍵発行方法、およびプログラム

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483523A (zh) 2002-04-15 2009-07-15 株式会社Ntt都科摩 利用双线性映射的签名方案
US9240884B2 (en) * 2003-10-28 2016-01-19 Certicom Corp. Method and apparatus for verifiable generation of public keys
US20060153364A1 (en) 2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge
KR100718687B1 (ko) * 2005-12-23 2007-05-15 학교법인 대전기독학원 한남대학교 겹선형 쌍 함수를 이용한 아이디 기반의 문턱 서명 방법
US9489522B1 (en) * 2013-03-13 2016-11-08 Hrl Laboratories, Llc Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security
GB201309702D0 (en) * 2013-05-30 2013-07-17 Certivox Ltd Security
WO2015160839A1 (en) * 2014-04-17 2015-10-22 Hrl Laboratories, Llc A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security
EP3134849A4 (en) * 2014-04-23 2017-11-22 Signpass Ltd. Methods and systems for signature analysis and authentication
EP2975570A1 (de) 2014-07-17 2016-01-20 draglet GmbH Verfahren und eine Vorrichtung zur Absicherung von Zugriffen auf Wallets in denen Kryptowährungen abgelegt sind
WO2016049406A1 (en) * 2014-09-26 2016-03-31 Technicolor Usa, Inc. Method and apparatus for secure non-interactive threshold signatures
US9830480B2 (en) * 2015-05-27 2017-11-28 Google Llc Policies for secrets in trusted execution environments
WO2017001972A1 (en) 2015-06-30 2017-01-05 Raghav Bhaskar User friendly two factor authentication
US9948467B2 (en) * 2015-12-21 2018-04-17 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
US9565020B1 (en) 2016-02-02 2017-02-07 International Business Machines Corporation System and method for generating a server-assisted strong password from a weak secret
AU2017225932C1 (en) 2016-02-29 2021-06-24 Securekey Technologies Inc. Systems and methods for distributed identity verification
US9800411B1 (en) * 2016-05-05 2017-10-24 ISARA Corporation Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme
US11361316B2 (en) 2016-06-06 2022-06-14 Refinitiv Us Organization Llc Systems and methods for providing a personal distributed ledger
US10681038B1 (en) * 2016-10-26 2020-06-09 Marvell Asia Pte, Ltd. Systems and methods for efficient password based public key authentication
CN106357401B (zh) * 2016-11-11 2019-09-10 武汉理工大学 一种私钥存储及使用方法
CN110574059A (zh) * 2017-04-11 2019-12-13 区块链控股有限公司 关于区块链的快速分布式共识
GB201707168D0 (en) * 2017-05-05 2017-06-21 Nchain Holdings Ltd Computer-implemented system and method
WO2018229632A1 (en) * 2017-06-14 2018-12-20 nChain Holdings Limited Systems and methods for addressing security-related vulnerabilities arising in relation to off-blockchain channels in the event of failures in a network
CN107395367B (zh) * 2017-08-08 2020-08-04 三峡大学 一种基于量子密钥的群签名系统
CN113765657B (zh) 2017-08-28 2023-10-24 创新先进技术有限公司 一种密钥数据处理方法、装置及服务器
CN107483205B (zh) * 2017-09-28 2019-08-20 武汉理工大学 一种基于加密的私钥秘密的数字签名生成方法及系统
CN107623569A (zh) 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 基于秘密共享技术的区块链密钥托管和恢复方法、装置
EP3725029B1 (en) * 2017-12-15 2023-07-12 nChain Licensing AG Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords

Also Published As

Publication number Publication date
JP2021507564A (ja) 2021-02-22
EP4235479A1 (en) 2023-08-30
US20210158342A1 (en) 2021-05-27
ZA202004320B (en) 2024-08-28
WO2019116249A1 (en) 2019-06-20
US20230131970A1 (en) 2023-04-27
EP3725029B1 (en) 2023-07-12
CN111480315B (zh) 2024-07-16
CN111480315A (zh) 2020-07-31
KR20200099149A (ko) 2020-08-21
JP7289298B2 (ja) 2023-06-09
EP3725029A1 (en) 2020-10-21
US11429956B2 (en) 2022-08-30
JP2023109981A (ja) 2023-08-08

Similar Documents

Publication Publication Date Title
SG11202005570XA (en) Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords
IL289298A (en) Decentralized transaction transfer and verification system
GB201806521D0 (en) Computer-implemented methods and systems for validating tokens for blockchain-based cryptocurrencies
GB2550277B (en) Computing devices having swiping interfaces and methods of operating the same
GB201715423D0 (en) Computer-implemented system and method
GB201707168D0 (en) Computer-implemented system and method
GB201707788D0 (en) Computer-implemented system and method
GB201803815D0 (en) Computer-implemented methods and systems
GB201613144D0 (en) Computer-implemented method and system
EP3454762A4 (en) METHODS AND SYSTEMS FOR LOCATING AND TREATING THROUGH COLD THERAPY
GB201721021D0 (en) Computer-implemented methods and systems
GB201709518D0 (en) Computer-implemented system and method
HK1231610A1 (zh) 用於無卡式交易處理的系統和方法
GB201703562D0 (en) Computer-implemented system and method
GB201613174D0 (en) Computer-implemented system and method
IL258453A (en) Systems and methods to enable secure electronic transactions
GB201802063D0 (en) Computer-implemented methods and systems
EP3284028A4 (en) Dynamic transaction card with emv interface and method of manufacturing
GB201806448D0 (en) Computer-implemented methods and systems
SG10201605433SA (en) Computerized methods and computer systems for matching customers with merchants
EP3288963A4 (en) Pink1 c-terminal domain polypeptide and methods using the same in cancer treatment
GB201714660D0 (en) Computer-implemented methods and systems
GB201713064D0 (en) Computer-implemented methods and systems
GB201806930D0 (en) Computer-implemented systems and methods
GB201618230D0 (en) Computer-implemented methods and systems