SG11202102221SA - Computer implemented system and method for sharing a common secret - Google Patents

Computer implemented system and method for sharing a common secret

Info

Publication number
SG11202102221SA
SG11202102221SA SG11202102221SA SG11202102221SA SG11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA SG 11202102221S A SG11202102221S A SG 11202102221SA
Authority
SG
Singapore
Prior art keywords
sharing
computer implemented
implemented system
common secret
secret
Prior art date
Application number
SG11202102221SA
Other languages
English (en)
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202102221SA publication Critical patent/SG11202102221SA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Hardware Redundancy (AREA)
SG11202102221SA 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret SG11202102221SA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1815396.5A GB201815396D0 (en) 2018-09-21 2018-09-21 Computer implemented system and method
PCT/IB2019/057632 WO2020058806A1 (en) 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret

Publications (1)

Publication Number Publication Date
SG11202102221SA true SG11202102221SA (en) 2021-04-29

Family

ID=64024331

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202102221SA SG11202102221SA (en) 2018-09-21 2019-09-11 Computer implemented system and method for sharing a common secret

Country Status (9)

Country Link
US (3) US11616641B2 (zh)
EP (1) EP3854052A1 (zh)
JP (1) JP2022500920A (zh)
KR (1) KR20210063378A (zh)
CN (1) CN112771832A (zh)
GB (1) GB201815396D0 (zh)
SG (1) SG11202102221SA (zh)
TW (1) TWI807103B (zh)
WO (1) WO2020058806A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021077120A1 (en) * 2019-10-18 2021-04-22 Tbcasoft, Inc. Distributed ledger-based methods and systems for certificate authentication
US11580240B2 (en) * 2020-03-24 2023-02-14 Kyndryl, Inc. Protecting sensitive data
GB2605784A (en) * 2021-04-09 2022-10-19 Vodafone Group Services Ltd SIM cryptographic key storage
CN115037441B (zh) * 2022-07-07 2023-11-10 三未信安科技股份有限公司 一种基于同态运算的sm2协同签名方法、装置及系统
CN115080723B (zh) * 2022-08-23 2022-11-11 云南师范大学 一种阅读理解问题的自动生成方法

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE187588T1 (de) 1993-08-17 1999-12-15 R3 Security Engineering Ag Verfahren zur digitalen unterschrift und verfahren zur schlüsselübereinkunft
WO1996004602A1 (en) 1994-07-29 1996-02-15 Certicom Corp. Elliptic curve encryption systems
US5761305A (en) 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
AU5266596A (en) 1995-04-21 1996-11-07 Certicom Corp. Method for signature and session key generation
US6785813B1 (en) 1997-11-07 2004-08-31 Certicom Corp. Key agreement and transport protocol with implicit signatures
CA2176972C (en) 1995-05-17 2008-11-25 Scott A. Vanstone Key agreement and transport protocol with implicit signatures
GB9510035D0 (en) 1995-05-18 1995-08-02 Cryptech Systems Inc Strengthened public key protocols
US5999626A (en) 1996-04-16 1999-12-07 Certicom Corp. Digital signatures on a smartcard
US6078667A (en) 1996-10-10 2000-06-20 Certicom Corp. Generating unique and unpredictable values
CA2235359C (en) 1998-03-23 2012-04-10 Certicom Corp. Implicit certificate scheme with ca chaining
DE19847944A1 (de) * 1998-10-09 2000-04-13 Deutsche Telekom Ag Verfahren zum Etablieren eines gemeinsamen Schlüssels zwischen einer Zentrale und einer Gruppe von Teilnehmern
JP2001268070A (ja) * 2000-03-22 2001-09-28 Advanced Mobile Telecommunications Security Technology Research Lab Co Ltd キーエスクロー方式
CA2561796C (en) * 2004-04-02 2012-04-17 Research In Motion Limited Key agreement and re-keying over a bidirectional communication path
US7958356B1 (en) * 2006-09-29 2011-06-07 Netapp, Inc. System and method for establishing a shared secret among nodes of a security appliance
AU2010326248B2 (en) * 2009-11-25 2015-08-27 Security First Corp. Systems and methods for securing data in motion
US8510561B2 (en) * 2010-02-26 2013-08-13 Research In Motion Limited Methods and devices for computing a shared encryption key
EP2363977B1 (en) * 2010-02-26 2012-10-24 Research In Motion Limited Methods and devices for computing a shared encryption key
JP5750728B2 (ja) * 2011-10-19 2015-07-22 国立研究開発法人産業技術総合研究所 鍵共有システム、鍵生成装置、及びプログラム
US20150213433A1 (en) 2014-01-28 2015-07-30 Apple Inc. Secure provisioning of credentials on an electronic device using elliptic curve cryptography
CN103825733A (zh) * 2014-02-28 2014-05-28 华为技术有限公司 基于组合公钥密码体制的通信方法、装置及系统
US10356054B2 (en) * 2014-05-20 2019-07-16 Secret Double Octopus Ltd Method for establishing a secure private interconnection over a multipath network
WO2016049225A1 (en) * 2014-09-23 2016-03-31 The Regents Of The University Of California Provably secure virus detection
US9813234B2 (en) * 2015-05-11 2017-11-07 The United States of America, as represented by the Secretery of the Air Force Transferable multiparty computation
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US20160352710A1 (en) * 2015-05-31 2016-12-01 Cisco Technology, Inc. Server-assisted secure exponentiation
US9705859B2 (en) * 2015-12-11 2017-07-11 Amazon Technologies, Inc. Key exchange through partially trusted third party
AU2017223129A1 (en) * 2016-02-23 2018-07-12 nChain Holdings Limited Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
KR20180116278A (ko) * 2016-02-23 2018-10-24 엔체인 홀딩스 리미티드 안전한 정보 교환과 계층 구조적이고 결정론적인 암호키를 위한 공통 비밀 결정
JP6495858B2 (ja) * 2016-04-04 2019-04-03 日本電信電話株式会社 サーバ装置、誤り訂正システム、誤り訂正方法、プログラム
CN106357401B (zh) * 2016-11-11 2019-09-10 武汉理工大学 一种私钥存储及使用方法
US10965448B1 (en) * 2017-05-03 2021-03-30 Board Of Trustees Of The University Of Illinois Dynamic distributed storage for scaling blockchain
IL256234A (en) * 2017-12-10 2018-01-31 Kipnis Aviad Computation using somewhat homomorphic encryption
US20190305940A1 (en) * 2018-03-28 2019-10-03 Ca, Inc. Group shareable credentials

Also Published As

Publication number Publication date
EP3854052A1 (en) 2021-07-28
KR20210063378A (ko) 2021-06-01
US20230299947A1 (en) 2023-09-21
WO2020058806A1 (en) 2020-03-26
TWI807103B (zh) 2023-07-01
GB201815396D0 (en) 2018-11-07
US20240305451A1 (en) 2024-09-12
US11616641B2 (en) 2023-03-28
CN112771832A (zh) 2021-05-07
TW202025666A (zh) 2020-07-01
JP2022500920A (ja) 2022-01-04
US12034840B2 (en) 2024-07-09
US20210367772A1 (en) 2021-11-25

Similar Documents

Publication Publication Date Title
GB201805633D0 (en) Computer implemented method and system
IL262352A (en) System and methods for validating and performing operations on homomorphically encrypted data
GB201815800D0 (en) A computer implemented determination method and system
SG10202110666RA (en) System and method for distributing data records using a blockchain
EP3637272A4 (en) DATA-SHARING SYSTEM AND RELATED DATA-SHARING PROCESS
SG11202102221SA (en) Computer implemented system and method for sharing a common secret
GB201717751D0 (en) A computer implemented determination method and system
GB201817506D0 (en) Computer implemented method and system
GB201701360D0 (en) Computer implemented method and system
EP3503465A4 (en) METHOD FOR DISTRIBUTION OF KEYS, ASSOCIATED DEVICES AND SYSTEM
SG10201903114RA (en) Methods and systems for facilitating microservices for cryptographic operations
GB201817507D0 (en) Computer implemented system and method
GB201905348D0 (en) Computer implemented method and system for encrypting data
EP3721580A4 (en) SYSTEM AND METHOD FOR CHOICE CRYPTOGRAPHIC MECHANISMS
GB201619903D0 (en) Method and system for securely storing data using a secret sharing scheme
SG11202003580XA (en) System and method for data management
GB2559028B (en) A computer implemented system and method for steganography
GB201804948D0 (en) Computer implemented system and method
PL3625965T3 (pl) Sposób przetwarzania i system przetwarzania danych wideo
GB201515263D0 (en) Method and system for preventing unauthorized computer processing
GB201901893D0 (en) Computer implemented system and method
GB201810847D0 (en) Method and system for integrating data sets
GB201821135D0 (en) Improved cryptographic method and system
GB201702813D0 (en) Method for a computer system and computer system
GB201812979D0 (en) System and method for maintaining data integrity