SG11202008222WA - Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key - Google Patents

Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key

Info

Publication number
SG11202008222WA
SG11202008222WA SG11202008222WA SG11202008222WA SG11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA
Authority
SG
Singapore
Prior art keywords
key
components
encrypted
subset
encrypt
Prior art date
Application number
SG11202008222WA
Inventor
Tron Black
Denny Becker
Tyler Perkins
Joel Weight
Jesse Empey
Original Assignee
Medici Ventures Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Medici Ventures Inc filed Critical Medici Ventures Inc
Publication of SG11202008222WA publication Critical patent/SG11202008222WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
SG11202008222WA 2018-03-15 2019-03-15 Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key SG11202008222WA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862643653P 2018-03-15 2018-03-15
US201862643655P 2018-03-15 2018-03-15
PCT/US2019/022607 WO2019178559A1 (en) 2018-03-15 2019-03-15 Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key

Publications (1)

Publication Number Publication Date
SG11202008222WA true SG11202008222WA (en) 2020-09-29

Family

ID=67904214

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202008222WA SG11202008222WA (en) 2018-03-15 2019-03-15 Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key

Country Status (6)

Country Link
US (2) US11146392B2 (en)
EP (1) EP3766204A4 (en)
JP (1) JP7530294B2 (en)
KR (1) KR20200123478A (en)
SG (1) SG11202008222WA (en)
WO (1) WO2019178559A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3766204A4 (en) 2018-03-15 2021-12-15 tZERO IP, LLC Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key
WO2020076722A1 (en) 2018-10-12 2020-04-16 Medici Ventures, Inc. Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
US11233658B2 (en) * 2019-08-14 2022-01-25 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys
US11418340B2 (en) * 2019-10-11 2022-08-16 Atakama LLC Waterfall request for decryption
US11323252B2 (en) * 2019-10-11 2022-05-03 Atakama LLC Relay network for encryption system
US11251944B2 (en) * 2020-02-21 2022-02-15 Nutanix, Inc. Secure storage and usage of cryptography keys
EP4111639A4 (en) 2020-02-26 2024-02-28 tZERO IP, LLC Secret splitting and metadata storage
US20220286282A1 (en) * 2021-03-02 2022-09-08 Seagate Technology Llc Updateable encryption in self encrypting drives
US11196558B1 (en) * 2021-03-09 2021-12-07 Technology Innovation Institute Systems, methods, and computer-readable media for protecting cryptographic keys
EP4156001A1 (en) * 2021-09-27 2023-03-29 ARRIS Enterprises LLC Method and apparatus for two-step data signing
CN114205084B (en) * 2022-02-16 2022-05-17 国网浙江省电力有限公司金华供电公司 Quantum key-based electronic mail multi-operation encryption method and device
US20230291549A1 (en) * 2022-03-14 2023-09-14 Vmware, Inc. Securely sharing secret information through an unsecure channel
KR102629335B1 (en) * 2023-01-11 2024-01-25 주식회사 그루핀 Electronic device for digital wallet management based on doubled mnemonic code, and operating method thereof
CN117574409B (en) * 2024-01-15 2024-04-12 北京易油互联科技有限公司 Chemical product transportation data encryption method

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11134259A (en) * 1997-10-29 1999-05-21 Oki Electric Ind Co Ltd Management method and device for information
WO2000074298A1 (en) * 1999-05-26 2000-12-07 Ascom Hasler Mailing Systems, Inc. Technique for split knowledge backup and recovery of a cryptographic key
US20020071566A1 (en) * 2000-12-11 2002-06-13 Kurn David Michael Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US6931133B2 (en) * 2002-09-03 2005-08-16 Verisign, Inc. Method and system of securely escrowing private keys in a public key infrastructure
US20050086471A1 (en) * 2003-10-20 2005-04-21 Spencer Andrew M. Removable information storage device that includes a master encryption key and encryption keys
KR100617456B1 (en) * 2004-04-28 2006-08-31 주식회사 니츠 Management method and terminal apparatus for management function of secret key
JP4701381B2 (en) * 2005-01-24 2011-06-15 国立大学法人 奈良先端科学技術大学院大学 Encryption key generation device, encryption key generation method, encrypted data distribution device, individual encryption key regeneration device, encrypted data reception device, encrypted data distribution system, encryption key generation program, and recording medium
US8989390B2 (en) * 2005-12-12 2015-03-24 Qualcomm Incorporated Certify and split system and method for replacing cryptographic keys
WO2009020078A1 (en) * 2007-08-03 2009-02-12 Pioneer Corporation Dispersion information management system
JP2009103774A (en) * 2007-10-22 2009-05-14 Panasonic Corp Secret sharing system
US8634553B2 (en) * 2007-11-05 2014-01-21 Sumitomo Electric Industries, Ltd. Encryption key generation device
JP2009135871A (en) * 2007-11-05 2009-06-18 Sumitomo Electric Ind Ltd Method for generating encryption key
US8855318B1 (en) * 2008-04-02 2014-10-07 Cisco Technology, Inc. Master key generation and distribution for storage area network devices
JP5332004B2 (en) * 2009-06-29 2013-11-06 独立行政法人産業技術総合研究所 Electronic device and its unauthorized use prevention method
EP2553904A2 (en) 2010-03-31 2013-02-06 Rick L. Orsini Systems and methods for securing data in motion
EP2817916B1 (en) * 2012-02-21 2020-06-10 Microchip Technology Incorporated Cryptographic transmission system using key encryption key
JP2014060614A (en) * 2012-09-18 2014-04-03 Hitachi Solutions Ltd Encrypted data management system
US8745415B2 (en) * 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key
US9673975B1 (en) * 2015-06-26 2017-06-06 EMC IP Holding Company LLC Cryptographic key splitting for offline and online data protection
US11251978B2 (en) * 2017-06-02 2022-02-15 Bae Systems Information And Electronic Systems Integration Inc. System and method for cryptographic protections of customized computing environment
EP3766204A4 (en) 2018-03-15 2021-12-15 tZERO IP, LLC Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key

Also Published As

Publication number Publication date
WO2019178559A1 (en) 2019-09-19
KR20200123478A (en) 2020-10-29
JP7530294B2 (en) 2024-08-07
EP3766204A4 (en) 2021-12-15
US20220029791A1 (en) 2022-01-27
EP3766204A1 (en) 2021-01-20
JP2021520085A (en) 2021-08-12
US11888975B2 (en) 2024-01-30
US11146392B2 (en) 2021-10-12
US20190288834A1 (en) 2019-09-19

Similar Documents

Publication Publication Date Title
SG11202008222WA (en) Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key
EP3864793A4 (en) Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
BR112016018486A8 (en) system and method for protecting content keys delivered in manifest files
CO2019004510A2 (en) Share protection for a screen sharing experience
EA201301077A1 (en) METHOD FOR PROTECTING INFORMATION IN CLOUD CALCULATIONS USING HOMORPHIC ENCRYPTION
GB2615983B (en) Secure re-encryption of homomorphically encrypted data
EP3453135A4 (en) System and method for encryption and decryption based on quantum key distribution
IN2014CH00971A (en)
GB2520387B (en) Alteration of encryption and decryption keys
EP3420705A4 (en) Structure of policies for evaluating key attributes of encryption keys
WO2017034642A3 (en) Optimizable full-path encryption in a virtualization environment
GB2509422A (en) Decryption and encryption of application data
WO2015157735A3 (en) Content encryption and decryption
EP3311320A4 (en) Accelerated encryption and decryption of files with shared secret and method therefor
GB2570214B (en) Content encryption and decryption using a custom key
EA201591431A1 (en) SEMICONDUCTOR DEVICE FOR ENSURING SAFETY WITH PROPERTIES FOR PREVENTION OF REVERSE DESIGN
PH12016502362B1 (en) Systems and methods for controlling media distribution
WO2018213744A3 (en) Reducing compromise of sensitive data in virtual machine
MX2018010943A (en) Cable modem anti-cloning.
GB201703301D0 (en) Password-based generation and management of secret cryptographic keys
GB2550786A (en) Automatic key management using enterprise user identity management
GB2581096B (en) Altering cipher and key within an established session
WO2014113132A3 (en) Method for secure symbol comparison
EP3767874A4 (en) Decrypting device, encrypting device, and encryption system
SG11201805601QA (en) Process for monovalent one-to-one extraction of keys from the propagation channel