SG11202102221SA - Computer implemented system and method for sharing a common secret - Google Patents
Computer implemented system and method for sharing a common secretInfo
- Publication number
- SG11202102221SA SG11202102221SA SG11202102221SA SG11202102221SA SG11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA
- Authority
- SG
- Singapore
- Prior art keywords
- sharing
- computer implemented
- implemented system
- common secret
- secret
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Hardware Redundancy (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1815396.5A GB201815396D0 (en) | 2018-09-21 | 2018-09-21 | Computer implemented system and method |
PCT/IB2019/057632 WO2020058806A1 (en) | 2018-09-21 | 2019-09-11 | Computer implemented system and method for sharing a common secret |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202102221SA true SG11202102221SA (en) | 2021-04-29 |
Family
ID=64024331
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202102221SA SG11202102221SA (en) | 2018-09-21 | 2019-09-11 | Computer implemented system and method for sharing a common secret |
Country Status (9)
Country | Link |
---|---|
US (2) | US11616641B2 (en) |
EP (1) | EP3854052A1 (en) |
JP (1) | JP2022500920A (en) |
KR (1) | KR20210063378A (en) |
CN (1) | CN112771832A (en) |
GB (1) | GB201815396D0 (en) |
SG (1) | SG11202102221SA (en) |
TW (1) | TWI807103B (en) |
WO (1) | WO2020058806A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022552420A (en) * | 2019-10-18 | 2022-12-15 | ティービーシーエーソフト,インコーポレイテッド | Distributed ledger based method and system for certificate authentication |
GB2605784A (en) * | 2021-04-09 | 2022-10-19 | Vodafone Group Services Ltd | SIM cryptographic key storage |
CN115037441B (en) * | 2022-07-07 | 2023-11-10 | 三未信安科技股份有限公司 | SM2 collaborative signature method, device and system based on homomorphic operation |
CN115080723B (en) * | 2022-08-23 | 2022-11-11 | 云南师范大学 | Automatic generation method for reading and understanding problems |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE187588T1 (en) | 1993-08-17 | 1999-12-15 | R3 Security Engineering Ag | PROCEDURE FOR DIGITAL SIGNATURE AND PROCEDURE FOR KEY AGREEMENT |
WO1996004602A1 (en) | 1994-07-29 | 1996-02-15 | Certicom Corp. | Elliptic curve encryption systems |
AU5266596A (en) | 1995-04-21 | 1996-11-07 | Certicom Corp. | Method for signature and session key generation |
US6785813B1 (en) | 1997-11-07 | 2004-08-31 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
US5761305A (en) | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
CA2176972C (en) | 1995-05-17 | 2008-11-25 | Scott A. Vanstone | Key agreement and transport protocol with implicit signatures |
GB9510035D0 (en) | 1995-05-18 | 1995-08-02 | Cryptech Systems Inc | Strengthened public key protocols |
US5999626A (en) | 1996-04-16 | 1999-12-07 | Certicom Corp. | Digital signatures on a smartcard |
US6078667A (en) | 1996-10-10 | 2000-06-20 | Certicom Corp. | Generating unique and unpredictable values |
CA2235359C (en) | 1998-03-23 | 2012-04-10 | Certicom Corp. | Implicit certificate scheme with ca chaining |
DE602005015831D1 (en) * | 2004-04-02 | 2009-09-17 | Research In Motion Ltd | USE AND PROVISIONATION OF WIRELESS HAND-HELD EQUIPMENT |
US7958356B1 (en) * | 2006-09-29 | 2011-06-07 | Netapp, Inc. | System and method for establishing a shared secret among nodes of a security appliance |
CN106230872A (en) * | 2009-11-25 | 2016-12-14 | 安全第公司 | To moving medial according to the system and method protected |
EP2363977B1 (en) * | 2010-02-26 | 2012-10-24 | Research In Motion Limited | Methods and devices for computing a shared encryption key |
US8510561B2 (en) * | 2010-02-26 | 2013-08-13 | Research In Motion Limited | Methods and devices for computing a shared encryption key |
US20150213433A1 (en) | 2014-01-28 | 2015-07-30 | Apple Inc. | Secure provisioning of credentials on an electronic device using elliptic curve cryptography |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
US10356054B2 (en) * | 2014-05-20 | 2019-07-16 | Secret Double Octopus Ltd | Method for establishing a secure private interconnection over a multipath network |
WO2016049225A1 (en) * | 2014-09-23 | 2016-03-31 | The Regents Of The University Of California | Provably secure virus detection |
US9813234B2 (en) * | 2015-05-11 | 2017-11-07 | The United States of America, as represented by the Secretery of the Air Force | Transferable multiparty computation |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
US20160352710A1 (en) * | 2015-05-31 | 2016-12-01 | Cisco Technology, Inc. | Server-assisted secure exponentiation |
US9705859B2 (en) * | 2015-12-11 | 2017-07-11 | Amazon Technologies, Inc. | Key exchange through partially trusted third party |
AU2017223133B2 (en) * | 2016-02-23 | 2022-09-08 | nChain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
GB2561729A (en) * | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
JP6495858B2 (en) * | 2016-04-04 | 2019-04-03 | 日本電信電話株式会社 | Server device, error correction system, error correction method, program |
CN106357401B (en) * | 2016-11-11 | 2019-09-10 | 武汉理工大学 | A kind of storage of private key and application method |
US10965448B1 (en) * | 2017-05-03 | 2021-03-30 | Board Of Trustees Of The University Of Illinois | Dynamic distributed storage for scaling blockchain |
IL256234A (en) * | 2017-12-10 | 2018-01-31 | Kipnis Aviad | Computation using somewhat homomorphic encryption |
US20190305940A1 (en) * | 2018-03-28 | 2019-10-03 | Ca, Inc. | Group shareable credentials |
-
2018
- 2018-09-21 GB GBGB1815396.5A patent/GB201815396D0/en not_active Ceased
-
2019
- 2019-09-11 SG SG11202102221SA patent/SG11202102221SA/en unknown
- 2019-09-11 CN CN201980062151.0A patent/CN112771832A/en active Pending
- 2019-09-11 JP JP2021514094A patent/JP2022500920A/en active Pending
- 2019-09-11 EP EP19769921.8A patent/EP3854052A1/en active Pending
- 2019-09-11 US US17/278,198 patent/US11616641B2/en active Active
- 2019-09-11 WO PCT/IB2019/057632 patent/WO2020058806A1/en unknown
- 2019-09-11 KR KR1020217011769A patent/KR20210063378A/en unknown
- 2019-09-20 TW TW108134023A patent/TWI807103B/en active
-
2023
- 2023-02-06 US US18/106,302 patent/US20230299947A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN112771832A (en) | 2021-05-07 |
JP2022500920A (en) | 2022-01-04 |
KR20210063378A (en) | 2021-06-01 |
WO2020058806A1 (en) | 2020-03-26 |
US20210367772A1 (en) | 2021-11-25 |
US11616641B2 (en) | 2023-03-28 |
EP3854052A1 (en) | 2021-07-28 |
US20230299947A1 (en) | 2023-09-21 |
TWI807103B (en) | 2023-07-01 |
TW202025666A (en) | 2020-07-01 |
GB201815396D0 (en) | 2018-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201805633D0 (en) | Computer implemented method and system | |
IL262352A (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
EP3637272A4 (en) | Data sharing system and data sharing method therefor | |
GB201815800D0 (en) | A computer implemented determination method and system | |
SG10202110666RA (en) | System and method for distributing data records using a blockchain | |
GB201717751D0 (en) | A computer implemented determination method and system | |
SG11202102221SA (en) | Computer implemented system and method for sharing a common secret | |
EP3503465A4 (en) | Method for distributing key, related devices and system | |
GB201817506D0 (en) | Computer implemented method and system | |
GB201701360D0 (en) | Computer implemented method and system | |
GB201817507D0 (en) | Computer implemented system and method | |
GB201905348D0 (en) | Computer implemented method and system for encrypting data | |
SG10201903114RA (en) | Methods and systems for facilitating microservices for cryptographic operations | |
GB201619903D0 (en) | Method and system for securely storing data using a secret sharing scheme | |
SG11202003580XA (en) | System and method for data management | |
EP3721580A4 (en) | System and method for cryptographic choice mechanisms | |
GB2559028B (en) | A computer implemented system and method for steganography | |
GB201804948D0 (en) | Computer implemented system and method | |
EP3625965C0 (en) | Processing method and processing system for video data | |
GB201704710D0 (en) | A data management system and method | |
GB201515263D0 (en) | Method and system for preventing unauthorized computer processing | |
GB201901893D0 (en) | Computer implemented system and method | |
GB201810847D0 (en) | Method and system for integrating data sets | |
GB201821135D0 (en) | Improved cryptographic method and system | |
GB201702813D0 (en) | Method for a computer system and computer system |