SG11202008222WA - Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key - Google Patents
Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted keyInfo
- Publication number
- SG11202008222WA SG11202008222WA SG11202008222WA SG11202008222WA SG11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA SG 11202008222W A SG11202008222W A SG 11202008222WA
- Authority
- SG
- Singapore
- Prior art keywords
- key
- components
- encrypted
- subset
- encrypt
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862643653P | 2018-03-15 | 2018-03-15 | |
US201862643655P | 2018-03-15 | 2018-03-15 | |
PCT/US2019/022607 WO2019178559A1 (en) | 2018-03-15 | 2019-03-15 | Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202008222WA true SG11202008222WA (en) | 2020-09-29 |
Family
ID=67904214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202008222WA SG11202008222WA (en) | 2018-03-15 | 2019-03-15 | Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key |
Country Status (6)
Country | Link |
---|---|
US (2) | US11146392B2 (en) |
EP (1) | EP3766204A4 (en) |
JP (1) | JP7530294B2 (en) |
KR (1) | KR20200123478A (en) |
SG (1) | SG11202008222WA (en) |
WO (1) | WO2019178559A1 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3766204A4 (en) | 2018-03-15 | 2021-12-15 | tZERO IP, LLC | Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key |
WO2020076722A1 (en) | 2018-10-12 | 2020-04-16 | Medici Ventures, Inc. | Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts |
US11233658B2 (en) * | 2019-08-14 | 2022-01-25 | OX Labs Inc. | Digital transaction signing for multiple client devices using secured encrypted private keys |
US11418340B2 (en) * | 2019-10-11 | 2022-08-16 | Atakama LLC | Waterfall request for decryption |
US11323252B2 (en) * | 2019-10-11 | 2022-05-03 | Atakama LLC | Relay network for encryption system |
US11251944B2 (en) * | 2020-02-21 | 2022-02-15 | Nutanix, Inc. | Secure storage and usage of cryptography keys |
EP4111639A4 (en) | 2020-02-26 | 2024-02-28 | tZERO IP, LLC | Secret splitting and metadata storage |
US20220286282A1 (en) * | 2021-03-02 | 2022-09-08 | Seagate Technology Llc | Updateable encryption in self encrypting drives |
US11196558B1 (en) * | 2021-03-09 | 2021-12-07 | Technology Innovation Institute | Systems, methods, and computer-readable media for protecting cryptographic keys |
EP4156001A1 (en) * | 2021-09-27 | 2023-03-29 | ARRIS Enterprises LLC | Method and apparatus for two-step data signing |
CN114205084B (en) * | 2022-02-16 | 2022-05-17 | 国网浙江省电力有限公司金华供电公司 | Quantum key-based electronic mail multi-operation encryption method and device |
US20230291549A1 (en) * | 2022-03-14 | 2023-09-14 | Vmware, Inc. | Securely sharing secret information through an unsecure channel |
KR102629335B1 (en) * | 2023-01-11 | 2024-01-25 | 주식회사 그루핀 | Electronic device for digital wallet management based on doubled mnemonic code, and operating method thereof |
CN117574409B (en) * | 2024-01-15 | 2024-04-12 | 北京易油互联科技有限公司 | Chemical product transportation data encryption method |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11134259A (en) * | 1997-10-29 | 1999-05-21 | Oki Electric Ind Co Ltd | Management method and device for information |
WO2000074298A1 (en) * | 1999-05-26 | 2000-12-07 | Ascom Hasler Mailing Systems, Inc. | Technique for split knowledge backup and recovery of a cryptographic key |
US20020071566A1 (en) * | 2000-12-11 | 2002-06-13 | Kurn David Michael | Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme |
US20030037237A1 (en) * | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US6931133B2 (en) * | 2002-09-03 | 2005-08-16 | Verisign, Inc. | Method and system of securely escrowing private keys in a public key infrastructure |
US20050086471A1 (en) * | 2003-10-20 | 2005-04-21 | Spencer Andrew M. | Removable information storage device that includes a master encryption key and encryption keys |
KR100617456B1 (en) * | 2004-04-28 | 2006-08-31 | 주식회사 니츠 | Management method and terminal apparatus for management function of secret key |
JP4701381B2 (en) * | 2005-01-24 | 2011-06-15 | 国立大学法人 奈良先端科学技術大学院大学 | Encryption key generation device, encryption key generation method, encrypted data distribution device, individual encryption key regeneration device, encrypted data reception device, encrypted data distribution system, encryption key generation program, and recording medium |
US8989390B2 (en) * | 2005-12-12 | 2015-03-24 | Qualcomm Incorporated | Certify and split system and method for replacing cryptographic keys |
WO2009020078A1 (en) * | 2007-08-03 | 2009-02-12 | Pioneer Corporation | Dispersion information management system |
JP2009103774A (en) * | 2007-10-22 | 2009-05-14 | Panasonic Corp | Secret sharing system |
US8634553B2 (en) * | 2007-11-05 | 2014-01-21 | Sumitomo Electric Industries, Ltd. | Encryption key generation device |
JP2009135871A (en) * | 2007-11-05 | 2009-06-18 | Sumitomo Electric Ind Ltd | Method for generating encryption key |
US8855318B1 (en) * | 2008-04-02 | 2014-10-07 | Cisco Technology, Inc. | Master key generation and distribution for storage area network devices |
JP5332004B2 (en) * | 2009-06-29 | 2013-11-06 | 独立行政法人産業技術総合研究所 | Electronic device and its unauthorized use prevention method |
EP2553904A2 (en) | 2010-03-31 | 2013-02-06 | Rick L. Orsini | Systems and methods for securing data in motion |
EP2817916B1 (en) * | 2012-02-21 | 2020-06-10 | Microchip Technology Incorporated | Cryptographic transmission system using key encryption key |
JP2014060614A (en) * | 2012-09-18 | 2014-04-03 | Hitachi Solutions Ltd | Encrypted data management system |
US8745415B2 (en) * | 2012-09-26 | 2014-06-03 | Pure Storage, Inc. | Multi-drive cooperation to generate an encryption key |
US9673975B1 (en) * | 2015-06-26 | 2017-06-06 | EMC IP Holding Company LLC | Cryptographic key splitting for offline and online data protection |
US11251978B2 (en) * | 2017-06-02 | 2022-02-15 | Bae Systems Information And Electronic Systems Integration Inc. | System and method for cryptographic protections of customized computing environment |
EP3766204A4 (en) | 2018-03-15 | 2021-12-15 | tZERO IP, LLC | Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key |
-
2019
- 2019-03-15 EP EP19768416.0A patent/EP3766204A4/en active Pending
- 2019-03-15 KR KR1020207029504A patent/KR20200123478A/en not_active Application Discontinuation
- 2019-03-15 SG SG11202008222WA patent/SG11202008222WA/en unknown
- 2019-03-15 US US16/355,527 patent/US11146392B2/en active Active
- 2019-03-15 WO PCT/US2019/022607 patent/WO2019178559A1/en active Application Filing
- 2019-03-15 JP JP2020549049A patent/JP7530294B2/en active Active
-
2021
- 2021-10-11 US US17/498,322 patent/US11888975B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2019178559A1 (en) | 2019-09-19 |
KR20200123478A (en) | 2020-10-29 |
JP7530294B2 (en) | 2024-08-07 |
EP3766204A4 (en) | 2021-12-15 |
US20220029791A1 (en) | 2022-01-27 |
EP3766204A1 (en) | 2021-01-20 |
JP2021520085A (en) | 2021-08-12 |
US11888975B2 (en) | 2024-01-30 |
US11146392B2 (en) | 2021-10-12 |
US20190288834A1 (en) | 2019-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202008222WA (en) | Splitting encrypted key and encryption key used to encrypt key into key components allowing assembly with subset of key components to decrypt encrypted key | |
EP3864793A4 (en) | Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts | |
BR112016018486A8 (en) | system and method for protecting content keys delivered in manifest files | |
CO2019004510A2 (en) | Share protection for a screen sharing experience | |
EA201301077A1 (en) | METHOD FOR PROTECTING INFORMATION IN CLOUD CALCULATIONS USING HOMORPHIC ENCRYPTION | |
GB2615983B (en) | Secure re-encryption of homomorphically encrypted data | |
EP3453135A4 (en) | System and method for encryption and decryption based on quantum key distribution | |
IN2014CH00971A (en) | ||
GB2520387B (en) | Alteration of encryption and decryption keys | |
EP3420705A4 (en) | Structure of policies for evaluating key attributes of encryption keys | |
WO2017034642A3 (en) | Optimizable full-path encryption in a virtualization environment | |
GB2509422A (en) | Decryption and encryption of application data | |
WO2015157735A3 (en) | Content encryption and decryption | |
EP3311320A4 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
GB2570214B (en) | Content encryption and decryption using a custom key | |
EA201591431A1 (en) | SEMICONDUCTOR DEVICE FOR ENSURING SAFETY WITH PROPERTIES FOR PREVENTION OF REVERSE DESIGN | |
PH12016502362B1 (en) | Systems and methods for controlling media distribution | |
WO2018213744A3 (en) | Reducing compromise of sensitive data in virtual machine | |
MX2018010943A (en) | Cable modem anti-cloning. | |
GB201703301D0 (en) | Password-based generation and management of secret cryptographic keys | |
GB2550786A (en) | Automatic key management using enterprise user identity management | |
GB2581096B (en) | Altering cipher and key within an established session | |
WO2014113132A3 (en) | Method for secure symbol comparison | |
EP3767874A4 (en) | Decrypting device, encrypting device, and encryption system | |
SG11201805601QA (en) | Process for monovalent one-to-one extraction of keys from the propagation channel |