SG11202102221SA - Computer implemented system and method for sharing a common secret - Google Patents

Computer implemented system and method for sharing a common secret

Info

Publication number
SG11202102221SA
SG11202102221SA SG11202102221SA SG11202102221SA SG11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA
Authority
SG
Singapore
Prior art keywords
sharing
computer implemented
implemented system
common secret
secret
Prior art date
Application number
SG11202102221SA
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202102221SA publication Critical patent/SG11202102221SA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Algebra (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG11202102221SA 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret SG11202102221SA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1815396.5A GB201815396D0 (en) 2018-09-21 2018-09-21 Computer implemented system and method
PCT/IB2019/057632 WO2020058806A1 (en) 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret

Publications (1)

Publication Number Publication Date
SG11202102221SA true SG11202102221SA (en) 2021-04-29

Family

ID=64024331

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202102221SA SG11202102221SA (en) 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret

Country Status (9)

Country Link
US (2) US11616641B2 (en)
EP (1) EP3854052A1 (en)
JP (1) JP2022500920A (en)
KR (1) KR20210063378A (en)
CN (1) CN112771832A (en)
GB (1) GB201815396D0 (en)
SG (1) SG11202102221SA (en)
TW (1) TWI807103B (en)
WO (1) WO2020058806A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022552420A (en) * 2019-10-18 2022-12-15 ティービーシーエーソフト,インコーポレイテッド Distributed ledger based method and system for certificate authentication
GB2605784A (en) * 2021-04-09 2022-10-19 Vodafone Group Services Ltd SIM cryptographic key storage
CN115037441B (en) * 2022-07-07 2023-11-10 三未信安科技股份有限公司 SM2 collaborative signature method, device and system based on homomorphic operation
CN115080723B (en) * 2022-08-23 2022-11-11 云南师范大学 Automatic generation method for reading and understanding problems

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE187588T1 (en) 1993-08-17 1999-12-15 R3 Security Engineering Ag PROCEDURE FOR DIGITAL SIGNATURE AND PROCEDURE FOR KEY AGREEMENT
WO1996004602A1 (en) 1994-07-29 1996-02-15 Certicom Corp. Elliptic curve encryption systems
AU5266596A (en) 1995-04-21 1996-11-07 Certicom Corp. Method for signature and session key generation
US6785813B1 (en) 1997-11-07 2004-08-31 Certicom Corp. Key agreement and transport protocol with implicit signatures
US5761305A (en) 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
CA2176972C (en) 1995-05-17 2008-11-25 Scott A. Vanstone Key agreement and transport protocol with implicit signatures
GB9510035D0 (en) 1995-05-18 1995-08-02 Cryptech Systems Inc Strengthened public key protocols
US5999626A (en) 1996-04-16 1999-12-07 Certicom Corp. Digital signatures on a smartcard
US6078667A (en) 1996-10-10 2000-06-20 Certicom Corp. Generating unique and unpredictable values
CA2235359C (en) 1998-03-23 2012-04-10 Certicom Corp. Implicit certificate scheme with ca chaining
DE602005015831D1 (en) * 2004-04-02 2009-09-17 Research In Motion Ltd USE AND PROVISIONATION OF WIRELESS HAND-HELD EQUIPMENT
US7958356B1 (en) * 2006-09-29 2011-06-07 Netapp, Inc. System and method for establishing a shared secret among nodes of a security appliance
CN106230872A (en) * 2009-11-25 2016-12-14 安全第公司 To moving medial according to the system and method protected
EP2363977B1 (en) * 2010-02-26 2012-10-24 Research In Motion Limited Methods and devices for computing a shared encryption key
US8510561B2 (en) * 2010-02-26 2013-08-13 Research In Motion Limited Methods and devices for computing a shared encryption key
US20150213433A1 (en) 2014-01-28 2015-07-30 Apple Inc. Secure provisioning of credentials on an electronic device using elliptic curve cryptography
CN103825733A (en) * 2014-02-28 2014-05-28 华为技术有限公司 Communication method, device and system based on combined public key cryptography system
US10356054B2 (en) * 2014-05-20 2019-07-16 Secret Double Octopus Ltd Method for establishing a secure private interconnection over a multipath network
WO2016049225A1 (en) * 2014-09-23 2016-03-31 The Regents Of The University Of California Provably secure virus detection
US9813234B2 (en) * 2015-05-11 2017-11-07 The United States of America, as represented by the Secretery of the Air Force Transferable multiparty computation
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US20160352710A1 (en) * 2015-05-31 2016-12-01 Cisco Technology, Inc. Server-assisted secure exponentiation
US9705859B2 (en) * 2015-12-11 2017-07-11 Amazon Technologies, Inc. Key exchange through partially trusted third party
AU2017223133B2 (en) * 2016-02-23 2022-09-08 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
GB2561729A (en) * 2016-02-23 2018-10-24 Nchain Holdings Ltd Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
JP6495858B2 (en) * 2016-04-04 2019-04-03 日本電信電話株式会社 Server device, error correction system, error correction method, program
CN106357401B (en) * 2016-11-11 2019-09-10 武汉理工大学 A kind of storage of private key and application method
US10965448B1 (en) * 2017-05-03 2021-03-30 Board Of Trustees Of The University Of Illinois Dynamic distributed storage for scaling blockchain
IL256234A (en) * 2017-12-10 2018-01-31 Kipnis Aviad Computation using somewhat homomorphic encryption
US20190305940A1 (en) * 2018-03-28 2019-10-03 Ca, Inc. Group shareable credentials

Also Published As

Publication number Publication date
CN112771832A (en) 2021-05-07
JP2022500920A (en) 2022-01-04
KR20210063378A (en) 2021-06-01
WO2020058806A1 (en) 2020-03-26
US20210367772A1 (en) 2021-11-25
US11616641B2 (en) 2023-03-28
EP3854052A1 (en) 2021-07-28
US20230299947A1 (en) 2023-09-21
TWI807103B (en) 2023-07-01
TW202025666A (en) 2020-07-01
GB201815396D0 (en) 2018-11-07

Similar Documents

Publication Publication Date Title
GB201805633D0 (en) Computer implemented method and system
IL262352A (en) System and methods for validating and performing operations on homomorphically encrypted data
EP3637272A4 (en) Data sharing system and data sharing method therefor
GB201815800D0 (en) A computer implemented determination method and system
SG10202110666RA (en) System and method for distributing data records using a blockchain
GB201717751D0 (en) A computer implemented determination method and system
SG11202102221SA (en) Computer implemented system and method for sharing a common secret
EP3503465A4 (en) Method for distributing key, related devices and system
GB201817506D0 (en) Computer implemented method and system
GB201701360D0 (en) Computer implemented method and system
GB201817507D0 (en) Computer implemented system and method
GB201905348D0 (en) Computer implemented method and system for encrypting data
SG10201903114RA (en) Methods and systems for facilitating microservices for cryptographic operations
GB201619903D0 (en) Method and system for securely storing data using a secret sharing scheme
SG11202003580XA (en) System and method for data management
EP3721580A4 (en) System and method for cryptographic choice mechanisms
GB2559028B (en) A computer implemented system and method for steganography
GB201804948D0 (en) Computer implemented system and method
EP3625965C0 (en) Processing method and processing system for video data
GB201704710D0 (en) A data management system and method
GB201515263D0 (en) Method and system for preventing unauthorized computer processing
GB201901893D0 (en) Computer implemented system and method
GB201810847D0 (en) Method and system for integrating data sets
GB201821135D0 (en) Improved cryptographic method and system
GB201702813D0 (en) Method for a computer system and computer system