SG11202006382VA - Computer implemented method and system for obtaining digitally signed data - Google Patents
Computer implemented method and system for obtaining digitally signed dataInfo
- Publication number
- SG11202006382VA SG11202006382VA SG11202006382VA SG11202006382VA SG11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA
- Authority
- SG
- Singapore
- Prior art keywords
- implemented method
- computer implemented
- digitally signed
- signed data
- obtaining digitally
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IB2018050264 | 2018-01-16 | ||
GBGB1800706.2A GB201800706D0 (en) | 2018-01-16 | 2018-01-16 | Computer implemented method and system |
PCT/IB2019/050178 WO2019142075A1 (en) | 2018-01-16 | 2019-01-10 | Computer implemented method and system for obtaining digitally signed data |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202006382VA true SG11202006382VA (en) | 2020-08-28 |
Family
ID=65139055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202006382VA SG11202006382VA (en) | 2018-01-16 | 2019-01-10 | Computer implemented method and system for obtaining digitally signed data |
Country Status (9)
Country | Link |
---|---|
US (1) | US11838426B2 (en) |
EP (2) | EP4002759A1 (en) |
JP (2) | JP7316283B2 (en) |
KR (1) | KR20200108343A (en) |
CN (1) | CN111615810A (en) |
SG (1) | SG11202006382VA (en) |
TW (2) | TW202347988A (en) |
WO (1) | WO2019142075A1 (en) |
ZA (1) | ZA202005041B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10089178B2 (en) * | 2016-02-29 | 2018-10-02 | International Business Machines Corporation | Developing an accurate dispersed storage network memory performance model through training |
JP7101031B2 (en) * | 2018-04-13 | 2022-07-14 | 株式会社bitFlyer Blockchain | Blockchain network and confirmation method for it |
FR3085215B1 (en) * | 2018-08-21 | 2020-11-20 | Maxim Integrated Products | DEVICES AND METHODS FOR MASKING ECC CRYPTOGRAPHY OPERATIONS |
EP3696670A1 (en) * | 2019-02-13 | 2020-08-19 | UVUE Limited | Distributed computation system and method of operation thereof |
GB2610559A (en) * | 2021-09-07 | 2023-03-15 | Licensing Ag Nchain | Generating shared cryptographic keys |
CN114499894B (en) * | 2022-04-01 | 2022-09-09 | 南京金宁汇科技有限公司 | File storage and reading method and system in block chain network |
CN114726542B (en) * | 2022-04-08 | 2024-04-09 | 中国再保险(集团)股份有限公司 | Data transmission method and device based on privacy intersection |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8271336B2 (en) * | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
JP4018370B2 (en) | 2001-10-30 | 2007-12-05 | 株式会社東芝 | Signature distribution system, program, and method |
JP3910529B2 (en) | 2002-12-06 | 2007-04-25 | 株式会社エヌ・ティ・ティ・データ | Electronic voting system |
KR20030008182A (en) | 2002-12-24 | 2003-01-24 | 학교법인 한국정보통신학원 | Method of id-based blind signature by using bilinear parings |
EP1571777A1 (en) | 2004-03-02 | 2005-09-07 | France Telecom | Electronic voting process using fair blind signatures |
JP4249171B2 (en) | 2005-10-17 | 2009-04-02 | 日本電信電話株式会社 | Anonymous application storage method and system, user device, issuing device, data providing device, and computer-readable recording medium |
US20110213975A1 (en) | 2010-03-01 | 2011-09-01 | Alessandro Sorniotti | Secret interest groups in online social networks |
WO2012021734A1 (en) * | 2010-08-11 | 2012-02-16 | Orsini Rick L | Systems and methods for secure multi-tenant data storage |
EP2619939A2 (en) * | 2010-09-20 | 2013-07-31 | Rick L. Orsini | Systems and methods for secure data sharing |
SG11201402874PA (en) * | 2011-12-09 | 2014-07-30 | Echarge2 Corp | Systems and methods for using cipher objects to protect data |
CN102647423B (en) * | 2012-04-12 | 2016-04-06 | 熊楚渝 | The discrimination method of a kind of digital signature and seal and system |
US9722776B2 (en) * | 2012-06-21 | 2017-08-01 | Microsoft Technology Licensing, Llc | Homomorphic signatures and network coding signatures |
US9049011B1 (en) * | 2012-08-15 | 2015-06-02 | Washington State University | Secure key storage and distribution |
US9489522B1 (en) * | 2013-03-13 | 2016-11-08 | Hrl Laboratories, Llc | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
JP6267658B2 (en) | 2015-01-09 | 2018-01-24 | 日本電信電話株式会社 | Signature generation apparatus, signature system, signature generation method, and program |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
HUE040631T2 (en) | 2016-02-23 | 2019-03-28 | Nchain Holdings Ltd | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
US10476888B2 (en) | 2016-03-23 | 2019-11-12 | Georgia Tech Research Corporation | Systems and methods for using video for user and message authentication |
US10447467B2 (en) | 2016-05-04 | 2019-10-15 | International Business Machines Corporation | Revocable PKI signatures |
US10193895B2 (en) * | 2016-05-18 | 2019-01-29 | Abdulrahman Alhothaily | System and method for remote authentication with dynamic usernames |
CN106127079B (en) | 2016-07-15 | 2019-04-12 | 中电长城网际系统应用有限公司 | A kind of data sharing method and device |
CN106296138A (en) * | 2016-08-09 | 2017-01-04 | 西安电子科技大学 | Bit coin payment system based on Partial Blind Signature technology and method thereof |
US20180203916A1 (en) * | 2017-01-19 | 2018-07-19 | Acquire Media Ventures Inc. | Data clustering with reduced partial signature matching using key-value storage and retrieval |
US9753964B1 (en) * | 2017-01-19 | 2017-09-05 | Acquire Media Ventures, Inc. | Similarity clustering in linear time with error-free retrieval using signature overlap with signature size matching |
CN110445619B (en) * | 2017-03-30 | 2020-10-16 | 腾讯科技(深圳)有限公司 | Block chain system, message processing method and storage medium |
US10521616B2 (en) * | 2017-11-08 | 2019-12-31 | Analog Devices, Inc. | Remote re-enrollment of physical unclonable functions |
US10929125B2 (en) * | 2017-12-28 | 2021-02-23 | Microsoft Technology Licensing, Llc | Determining provenance of files in source code projects |
US11288740B2 (en) * | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
-
2019
- 2019-01-10 WO PCT/IB2019/050178 patent/WO2019142075A1/en unknown
- 2019-01-10 JP JP2020537521A patent/JP7316283B2/en active Active
- 2019-01-10 US US16/962,800 patent/US11838426B2/en active Active
- 2019-01-10 CN CN201980007985.1A patent/CN111615810A/en active Pending
- 2019-01-10 EP EP21201382.5A patent/EP4002759A1/en active Pending
- 2019-01-10 KR KR1020207023485A patent/KR20200108343A/en not_active Application Discontinuation
- 2019-01-10 SG SG11202006382VA patent/SG11202006382VA/en unknown
- 2019-01-10 EP EP19701271.9A patent/EP3741081B1/en active Active
- 2019-01-15 TW TW112127750A patent/TW202347988A/en unknown
- 2019-01-15 TW TW108101507A patent/TWI813616B/en active
-
2020
- 2020-08-14 ZA ZA2020/05041A patent/ZA202005041B/en unknown
-
2023
- 2023-06-30 JP JP2023107665A patent/JP2023115331A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
TW201937899A (en) | 2019-09-16 |
EP4002759A1 (en) | 2022-05-25 |
JP2021510954A (en) | 2021-04-30 |
TWI813616B (en) | 2023-09-01 |
TW202347988A (en) | 2023-12-01 |
JP2023115331A (en) | 2023-08-18 |
US11838426B2 (en) | 2023-12-05 |
EP3741081B1 (en) | 2021-10-13 |
ZA202005041B (en) | 2022-03-30 |
KR20200108343A (en) | 2020-09-17 |
JP7316283B2 (en) | 2023-07-27 |
EP3741081A1 (en) | 2020-11-25 |
CN111615810A (en) | 2020-09-01 |
US20210377050A1 (en) | 2021-12-02 |
WO2019142075A1 (en) | 2019-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201805633D0 (en) | Computer implemented method and system | |
SG11202006772QA (en) | System and method for decentralized-identifier creation | |
SG10202104872UA (en) | Acoustic method and system for providing digital data | |
ZA202005041B (en) | Computer implemented method and system for obtaining digitally signed data | |
GB2583793B (en) | System and method for data acquisition | |
GB201815800D0 (en) | A computer implemented determination method and system | |
SG11202003808PA (en) | System and method for data processing | |
GB201717751D0 (en) | A computer implemented determination method and system | |
GB201817506D0 (en) | Computer implemented method and system | |
PL3602457T3 (en) | System and method for blockchain-based data management | |
GB201817507D0 (en) | Computer implemented system and method | |
GB201818293D0 (en) | Data processing system and method | |
GB2587154B (en) | Data capture system and method for object dimensioning | |
GB201815396D0 (en) | Computer implemented system and method | |
SG11202003580XA (en) | System and method for data management | |
GB201716304D0 (en) | Data analysis system and method | |
GB201708340D0 (en) | Data processing system and method | |
EP3593960A4 (en) | Data structure for creating image-processing data and method for creating image-processing data | |
SG11202101201UA (en) | A method and system for securing data | |
GB2585197B (en) | Method and system for obtaining depth data | |
SG10201905523TA (en) | Data analysis method and data analysis system thereof | |
GB201804948D0 (en) | Computer implemented system and method | |
GB201819821D0 (en) | Blockchain data processing system and method of operation thereof | |
GB201901893D0 (en) | Computer implemented system and method | |
GB201906869D0 (en) | Data processing system and method |