SG11202006382VA - Computer implemented method and system for obtaining digitally signed data - Google Patents
Computer implemented method and system for obtaining digitally signed dataInfo
- Publication number
- SG11202006382VA SG11202006382VA SG11202006382VA SG11202006382VA SG11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA SG 11202006382V A SG11202006382V A SG 11202006382VA
- Authority
- SG
- Singapore
- Prior art keywords
- implemented method
- computer implemented
- digitally signed
- signed data
- obtaining digitally
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Optimization (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Emergency Protection Circuit Devices (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IB2018050264 | 2018-01-16 | ||
GBGB1800706.2A GB201800706D0 (en) | 2018-01-16 | 2018-01-16 | Computer implemented method and system |
PCT/IB2019/050178 WO2019142075A1 (en) | 2018-01-16 | 2019-01-10 | Computer implemented method and system for obtaining digitally signed data |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202006382VA true SG11202006382VA (en) | 2020-08-28 |
Family
ID=65139055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202006382VA SG11202006382VA (en) | 2018-01-16 | 2019-01-10 | Computer implemented method and system for obtaining digitally signed data |
Country Status (9)
Country | Link |
---|---|
US (2) | US11838426B2 (zh) |
EP (2) | EP4002759A1 (zh) |
JP (2) | JP7316283B2 (zh) |
KR (1) | KR20200108343A (zh) |
CN (1) | CN111615810A (zh) |
SG (1) | SG11202006382VA (zh) |
TW (2) | TWI813616B (zh) |
WO (1) | WO2019142075A1 (zh) |
ZA (1) | ZA202005041B (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10089178B2 (en) * | 2016-02-29 | 2018-10-02 | International Business Machines Corporation | Developing an accurate dispersed storage network memory performance model through training |
JP7101031B2 (ja) * | 2018-04-13 | 2022-07-14 | 株式会社bitFlyer Blockchain | ブロックチェーン・ネットワーク及びそのための確定方法 |
FR3085215B1 (fr) * | 2018-08-21 | 2020-11-20 | Maxim Integrated Products | Dispositifs et procedes de masquage d'operations de cryptographie ecc |
EP3696670A1 (en) * | 2019-02-13 | 2020-08-19 | UVUE Limited | Distributed computation system and method of operation thereof |
EP3955110A1 (en) | 2020-08-12 | 2022-02-16 | UVUE Limited | Distributed computing system and method of operation thereof |
GB2610559A (en) * | 2021-09-07 | 2023-03-15 | Licensing Ag Nchain | Generating shared cryptographic keys |
CN114499894B (zh) * | 2022-04-01 | 2022-09-09 | 南京金宁汇科技有限公司 | 区块链网络中的文件存储、读取方法及存储读取系统 |
CN114726542B (zh) * | 2022-04-08 | 2024-04-09 | 中国再保险(集团)股份有限公司 | 一种基于隐私求交的数据传输方法及装置 |
CN115131029A (zh) * | 2022-06-28 | 2022-09-30 | 蚂蚁区块链科技(上海)有限公司 | 基于区块链的数字文件签署方法及装置 |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8271336B2 (en) * | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
JP4018370B2 (ja) | 2001-10-30 | 2007-12-05 | 株式会社東芝 | 署名分散システム、プログラム及び方法 |
JP3910529B2 (ja) | 2002-12-06 | 2007-04-25 | 株式会社エヌ・ティ・ティ・データ | 電子投票システム |
KR20030008182A (ko) | 2002-12-24 | 2003-01-24 | 학교법인 한국정보통신학원 | 겹선형쌍을 이용한 개인식별정보 기반의 은닉서명 방법 |
EP1571777A1 (en) | 2004-03-02 | 2005-09-07 | France Telecom | Electronic voting process using fair blind signatures |
JP4249171B2 (ja) | 2005-10-17 | 2009-04-02 | 日本電信電話株式会社 | 匿名アプリケーション格納方法及びシステム及び利用者装置及び発行装置及びデータ提供装置及びコンピュータ読み取り可能な記録媒体 |
US20110213975A1 (en) | 2010-03-01 | 2011-09-01 | Alessandro Sorniotti | Secret interest groups in online social networks |
EP2603996A1 (en) * | 2010-08-11 | 2013-06-19 | Rick L. Orsini | Systems and methods for secure multi-tenant data storage |
CN106209382A (zh) * | 2010-09-20 | 2016-12-07 | 安全第公司 | 用于安全数据共享的系统和方法 |
AU2012347452A1 (en) * | 2011-12-09 | 2014-06-26 | Echarge2 Corporation | Systems and methods for using cipher objects to protect data |
CN102647423B (zh) * | 2012-04-12 | 2016-04-06 | 熊楚渝 | 一种数字签章及印鉴的鉴别方法及系统 |
US9722776B2 (en) * | 2012-06-21 | 2017-08-01 | Microsoft Technology Licensing, Llc | Homomorphic signatures and network coding signatures |
US9049011B1 (en) * | 2012-08-15 | 2015-06-02 | Washington State University | Secure key storage and distribution |
US9489522B1 (en) * | 2013-03-13 | 2016-11-08 | Hrl Laboratories, Llc | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security |
EP3132560A4 (en) * | 2014-04-17 | 2017-12-20 | Hrl Laboratories, Llc | A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
JP6267658B2 (ja) | 2015-01-09 | 2018-01-24 | 日本電信電話株式会社 | 署名生成装置、署名システム、署名生成方法、およびプログラム |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
LT3268914T (lt) | 2016-02-23 | 2018-11-12 | nChain Holdings Limited | Bendros paslapties, skirtos saugiems informacijos mainams, nustatymas ir hierarchiniai determinuoti kriptografiniai raktai |
US10476888B2 (en) | 2016-03-23 | 2019-11-12 | Georgia Tech Research Corporation | Systems and methods for using video for user and message authentication |
US10447467B2 (en) | 2016-05-04 | 2019-10-15 | International Business Machines Corporation | Revocable PKI signatures |
US10193895B2 (en) * | 2016-05-18 | 2019-01-29 | Abdulrahman Alhothaily | System and method for remote authentication with dynamic usernames |
CN106127079B (zh) | 2016-07-15 | 2019-04-12 | 中电长城网际系统应用有限公司 | 一种数据共享方法及装置 |
CN106296138A (zh) * | 2016-08-09 | 2017-01-04 | 西安电子科技大学 | 基于部分盲签名技术的比特币支付系统及其方法 |
US20180203916A1 (en) * | 2017-01-19 | 2018-07-19 | Acquire Media Ventures Inc. | Data clustering with reduced partial signature matching using key-value storage and retrieval |
US9753964B1 (en) * | 2017-01-19 | 2017-09-05 | Acquire Media Ventures, Inc. | Similarity clustering in linear time with error-free retrieval using signature overlap with signature size matching |
CN110445619B (zh) * | 2017-03-30 | 2020-10-16 | 腾讯科技(深圳)有限公司 | 区块链系统、消息处理方法及存储介质 |
US10521616B2 (en) * | 2017-11-08 | 2019-12-31 | Analog Devices, Inc. | Remote re-enrollment of physical unclonable functions |
US10929125B2 (en) * | 2017-12-28 | 2021-02-23 | Microsoft Technology Licensing, Llc | Determining provenance of files in source code projects |
US11288740B2 (en) * | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
-
2019
- 2019-01-10 JP JP2020537521A patent/JP7316283B2/ja active Active
- 2019-01-10 CN CN201980007985.1A patent/CN111615810A/zh active Pending
- 2019-01-10 WO PCT/IB2019/050178 patent/WO2019142075A1/en unknown
- 2019-01-10 US US16/962,800 patent/US11838426B2/en active Active
- 2019-01-10 SG SG11202006382VA patent/SG11202006382VA/en unknown
- 2019-01-10 EP EP21201382.5A patent/EP4002759A1/en active Pending
- 2019-01-10 KR KR1020207023485A patent/KR20200108343A/ko not_active Application Discontinuation
- 2019-01-10 EP EP19701271.9A patent/EP3741081B1/en active Active
- 2019-01-15 TW TW108101507A patent/TWI813616B/zh active
- 2019-01-15 TW TW112127750A patent/TW202347988A/zh unknown
-
2020
- 2020-08-14 ZA ZA2020/05041A patent/ZA202005041B/en unknown
-
2023
- 2023-06-30 JP JP2023107665A patent/JP2023115331A/ja active Pending
- 2023-10-20 US US18/382,427 patent/US20240154819A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20240154819A1 (en) | 2024-05-09 |
EP3741081A1 (en) | 2020-11-25 |
TW201937899A (zh) | 2019-09-16 |
TW202347988A (zh) | 2023-12-01 |
WO2019142075A1 (en) | 2019-07-25 |
KR20200108343A (ko) | 2020-09-17 |
JP7316283B2 (ja) | 2023-07-27 |
CN111615810A (zh) | 2020-09-01 |
US11838426B2 (en) | 2023-12-05 |
JP2023115331A (ja) | 2023-08-18 |
TWI813616B (zh) | 2023-09-01 |
ZA202005041B (en) | 2022-03-30 |
US20210377050A1 (en) | 2021-12-02 |
EP3741081B1 (en) | 2021-10-13 |
JP2021510954A (ja) | 2021-04-30 |
EP4002759A1 (en) | 2022-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA202005041B (en) | Computer implemented method and system for obtaining digitally signed data | |
GB201805633D0 (en) | Computer implemented method and system | |
SG10202104872UA (en) | Acoustic method and system for providing digital data | |
SG11202006772QA (en) | System and method for decentralized-identifier creation | |
GB2583793B (en) | System and method for data acquisition | |
GB201815800D0 (en) | A computer implemented determination method and system | |
SG11202003808PA (en) | System and method for data processing | |
GB201817506D0 (en) | Computer implemented method and system | |
GB201717751D0 (en) | A computer implemented determination method and system | |
PL3602457T3 (pl) | System i sposób zarządzania danymi w łańcuchu bloków | |
EP3602546C0 (en) | SYSTEM AND METHOD FOR PROCESSING AUDIO DATA | |
GB201817507D0 (en) | Computer implemented system and method | |
GB201818293D0 (en) | Data processing system and method | |
GB2587154B (en) | Data capture system and method for object dimensioning | |
GB201815396D0 (en) | Computer implemented system and method | |
SG11202003580XA (en) | System and method for data management | |
GB201716304D0 (en) | Data analysis system and method | |
GB201708340D0 (en) | Data processing system and method | |
EP3593960A4 (en) | DATA STRUCTURE FOR GENERATING IMAGE PROCESSING DATA AND METHOD FOR GENERATING IMAGE PROCESSING DATA | |
GB201804948D0 (en) | Computer implemented system and method | |
GB2585197B (en) | Method and system for obtaining depth data | |
SG10201905523TA (en) | Data analysis method and data analysis system thereof | |
GB201819821D0 (en) | Blockchain data processing system and method of operation thereof | |
GB201901893D0 (en) | Computer implemented system and method | |
GB201906869D0 (en) | Data processing system and method |