SG11202006382VA - Computer implemented method and system for obtaining digitally signed data - Google Patents

Computer implemented method and system for obtaining digitally signed data

Info

Publication number
SG11202006382VA
SG11202006382VA SG11202006382VA SG11202006382VA SG11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA
Authority
SG
Singapore
Prior art keywords
implemented method
computer implemented
digitally signed
signed data
obtaining digitally
Prior art date
Application number
SG11202006382VA
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1800706.2A external-priority patent/GB201800706D0/en
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202006382VA publication Critical patent/SG11202006382VA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3257Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
SG11202006382VA 2018-01-16 2019-01-10 Computer implemented method and system for obtaining digitally signed data SG11202006382VA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IB2018050264 2018-01-16
GBGB1800706.2A GB201800706D0 (en) 2018-01-16 2018-01-16 Computer implemented method and system
PCT/IB2019/050178 WO2019142075A1 (en) 2018-01-16 2019-01-10 Computer implemented method and system for obtaining digitally signed data

Publications (1)

Publication Number Publication Date
SG11202006382VA true SG11202006382VA (en) 2020-08-28

Family

ID=65139055

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202006382VA SG11202006382VA (en) 2018-01-16 2019-01-10 Computer implemented method and system for obtaining digitally signed data

Country Status (9)

Country Link
US (1) US11838426B2 (en)
EP (2) EP4002759A1 (en)
JP (2) JP7316283B2 (en)
KR (1) KR20200108343A (en)
CN (1) CN111615810A (en)
SG (1) SG11202006382VA (en)
TW (2) TW202347988A (en)
WO (1) WO2019142075A1 (en)
ZA (1) ZA202005041B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10089178B2 (en) * 2016-02-29 2018-10-02 International Business Machines Corporation Developing an accurate dispersed storage network memory performance model through training
JP7101031B2 (en) * 2018-04-13 2022-07-14 株式会社bitFlyer Blockchain Blockchain network and confirmation method for it
FR3085215B1 (en) * 2018-08-21 2020-11-20 Maxim Integrated Products DEVICES AND METHODS FOR MASKING ECC CRYPTOGRAPHY OPERATIONS
EP3696670A1 (en) * 2019-02-13 2020-08-19 UVUE Limited Distributed computation system and method of operation thereof
GB2610559A (en) * 2021-09-07 2023-03-15 Licensing Ag Nchain Generating shared cryptographic keys
CN114499894B (en) * 2022-04-01 2022-09-09 南京金宁汇科技有限公司 File storage and reading method and system in block chain network
CN114726542B (en) * 2022-04-08 2024-04-09 中国再保险(集团)股份有限公司 Data transmission method and device based on privacy intersection

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8271336B2 (en) * 1999-11-22 2012-09-18 Accenture Global Services Gmbh Increased visibility during order management in a network-based supply chain environment
JP4018370B2 (en) 2001-10-30 2007-12-05 株式会社東芝 Signature distribution system, program, and method
JP3910529B2 (en) 2002-12-06 2007-04-25 株式会社エヌ・ティ・ティ・データ Electronic voting system
KR20030008182A (en) 2002-12-24 2003-01-24 학교법인 한국정보통신학원 Method of id-based blind signature by using bilinear parings
EP1571777A1 (en) 2004-03-02 2005-09-07 France Telecom Electronic voting process using fair blind signatures
JP4249171B2 (en) 2005-10-17 2009-04-02 日本電信電話株式会社 Anonymous application storage method and system, user device, issuing device, data providing device, and computer-readable recording medium
US20110213975A1 (en) 2010-03-01 2011-09-01 Alessandro Sorniotti Secret interest groups in online social networks
WO2012021734A1 (en) * 2010-08-11 2012-02-16 Orsini Rick L Systems and methods for secure multi-tenant data storage
EP2619939A2 (en) * 2010-09-20 2013-07-31 Rick L. Orsini Systems and methods for secure data sharing
SG11201402874PA (en) * 2011-12-09 2014-07-30 Echarge2 Corp Systems and methods for using cipher objects to protect data
CN102647423B (en) * 2012-04-12 2016-04-06 熊楚渝 The discrimination method of a kind of digital signature and seal and system
US9722776B2 (en) * 2012-06-21 2017-08-01 Microsoft Technology Licensing, Llc Homomorphic signatures and network coding signatures
US9049011B1 (en) * 2012-08-15 2015-06-02 Washington State University Secure key storage and distribution
US9489522B1 (en) * 2013-03-13 2016-11-08 Hrl Laboratories, Llc Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
JP6267658B2 (en) 2015-01-09 2018-01-24 日本電信電話株式会社 Signature generation apparatus, signature system, signature generation method, and program
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
HUE040631T2 (en) 2016-02-23 2019-03-28 Nchain Holdings Ltd Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US10476888B2 (en) 2016-03-23 2019-11-12 Georgia Tech Research Corporation Systems and methods for using video for user and message authentication
US10447467B2 (en) 2016-05-04 2019-10-15 International Business Machines Corporation Revocable PKI signatures
US10193895B2 (en) * 2016-05-18 2019-01-29 Abdulrahman Alhothaily System and method for remote authentication with dynamic usernames
CN106127079B (en) 2016-07-15 2019-04-12 中电长城网际系统应用有限公司 A kind of data sharing method and device
CN106296138A (en) * 2016-08-09 2017-01-04 西安电子科技大学 Bit coin payment system based on Partial Blind Signature technology and method thereof
US20180203916A1 (en) * 2017-01-19 2018-07-19 Acquire Media Ventures Inc. Data clustering with reduced partial signature matching using key-value storage and retrieval
US9753964B1 (en) * 2017-01-19 2017-09-05 Acquire Media Ventures, Inc. Similarity clustering in linear time with error-free retrieval using signature overlap with signature size matching
CN110445619B (en) * 2017-03-30 2020-10-16 腾讯科技(深圳)有限公司 Block chain system, message processing method and storage medium
US10521616B2 (en) * 2017-11-08 2019-12-31 Analog Devices, Inc. Remote re-enrollment of physical unclonable functions
US10929125B2 (en) * 2017-12-28 2021-02-23 Microsoft Technology Licensing, Llc Determining provenance of files in source code projects
US11288740B2 (en) * 2017-12-29 2022-03-29 Intel Corporation Securing distributed electronic wallet shares

Also Published As

Publication number Publication date
TW201937899A (en) 2019-09-16
EP4002759A1 (en) 2022-05-25
JP2021510954A (en) 2021-04-30
TWI813616B (en) 2023-09-01
TW202347988A (en) 2023-12-01
JP2023115331A (en) 2023-08-18
US11838426B2 (en) 2023-12-05
EP3741081B1 (en) 2021-10-13
ZA202005041B (en) 2022-03-30
KR20200108343A (en) 2020-09-17
JP7316283B2 (en) 2023-07-27
EP3741081A1 (en) 2020-11-25
CN111615810A (en) 2020-09-01
US20210377050A1 (en) 2021-12-02
WO2019142075A1 (en) 2019-07-25

Similar Documents

Publication Publication Date Title
GB201805633D0 (en) Computer implemented method and system
SG11202006772QA (en) System and method for decentralized-identifier creation
SG10202104872UA (en) Acoustic method and system for providing digital data
ZA202005041B (en) Computer implemented method and system for obtaining digitally signed data
GB2583793B (en) System and method for data acquisition
GB201815800D0 (en) A computer implemented determination method and system
SG11202003808PA (en) System and method for data processing
GB201717751D0 (en) A computer implemented determination method and system
GB201817506D0 (en) Computer implemented method and system
PL3602457T3 (en) System and method for blockchain-based data management
GB201817507D0 (en) Computer implemented system and method
GB201818293D0 (en) Data processing system and method
GB2587154B (en) Data capture system and method for object dimensioning
GB201815396D0 (en) Computer implemented system and method
SG11202003580XA (en) System and method for data management
GB201716304D0 (en) Data analysis system and method
GB201708340D0 (en) Data processing system and method
EP3593960A4 (en) Data structure for creating image-processing data and method for creating image-processing data
SG11202101201UA (en) A method and system for securing data
GB2585197B (en) Method and system for obtaining depth data
SG10201905523TA (en) Data analysis method and data analysis system thereof
GB201804948D0 (en) Computer implemented system and method
GB201819821D0 (en) Blockchain data processing system and method of operation thereof
GB201901893D0 (en) Computer implemented system and method
GB201906869D0 (en) Data processing system and method