SG11202103165YA - Computer-implemented system and method including public key combination verification - Google Patents

Computer-implemented system and method including public key combination verification

Info

Publication number
SG11202103165YA
SG11202103165YA SG11202103165YA SG11202103165YA SG11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA
Authority
SG
Singapore
Prior art keywords
computer
public key
method including
implemented system
key combination
Prior art date
Application number
SG11202103165YA
Inventor
Craig Steven Wright
Owen Vaughan
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202103165YA publication Critical patent/SG11202103165YA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
SG11202103165YA 2018-10-17 2019-10-09 Computer-implemented system and method including public key combination verification SG11202103165YA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1816936.7A GB201816936D0 (en) 2018-10-17 2018-10-17 Computer-implemented system and method
PCT/IB2019/058580 WO2020079534A1 (en) 2018-10-17 2019-10-09 Computer-implemented system and method including public key combination verification

Publications (1)

Publication Number Publication Date
SG11202103165YA true SG11202103165YA (en) 2021-05-28

Family

ID=64394914

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202103165YA SG11202103165YA (en) 2018-10-17 2019-10-09 Computer-implemented system and method including public key combination verification

Country Status (9)

Country Link
US (1) US20210344510A1 (en)
EP (1) EP3868054B1 (en)
JP (2) JP7383017B2 (en)
KR (1) KR20210074358A (en)
CN (1) CN112970227A (en)
GB (1) GB201816936D0 (en)
SG (1) SG11202103165YA (en)
TW (1) TWI834741B (en)
WO (1) WO2020079534A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220094555A1 (en) * 2020-09-18 2022-03-24 Fujitsu Limited Validator control for transaction between blockchains
GB2624202A (en) * 2022-11-10 2024-05-15 Nchain Licensing Ag Blockchain transaction

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7602655B2 (en) * 2006-01-12 2009-10-13 Mediatek Inc. Embedded system
JP2008203548A (en) * 2007-02-20 2008-09-04 Oki Electric Ind Co Ltd Key generating method using quadric hyperbolic curve group, decoding method, signature verification method, key stream generating method and device
TWI444028B (en) * 2011-12-23 2014-07-01 Univ Nat Chiao Tung Method of using enhanced window-based and method of mutual opposite form for scalar multiplication in elliptic curve cryptography
CA3013180A1 (en) * 2016-02-23 2017-08-31 nChain Holdings Limited Blockchain-based exchange with tokenisation
MA44883A (en) * 2016-05-04 2021-03-24 Algorand Inc DISTRIBUTED TRANSACTION PROPAGATION AND VERIFICATION SYSTEM
KR102603069B1 (en) * 2016-11-19 2023-11-15 디피니티 스티프텅 System architecture and data processing methods in system architecture
CA3051928A1 (en) * 2016-12-27 2018-07-05 Helder Silvestre Paiva FIGUEIRA Equivocation augmentation
GB201705621D0 (en) 2017-04-07 2017-05-24 Nchain Holdings Ltd Computer-implemented system and method
CN108154549A (en) * 2017-12-25 2018-06-12 太平洋未来有限公司 A kind of three dimensional image processing method

Also Published As

Publication number Publication date
JP7383017B2 (en) 2023-11-17
TW202036344A (en) 2020-10-01
WO2020079534A1 (en) 2020-04-23
GB201816936D0 (en) 2018-11-28
EP3868054B1 (en) 2024-05-15
JP2022504224A (en) 2022-01-13
TWI834741B (en) 2024-03-11
KR20210074358A (en) 2021-06-21
EP3868054A1 (en) 2021-08-25
CN112970227A (en) 2021-06-15
JP2023184657A (en) 2023-12-28
US20210344510A1 (en) 2021-11-04

Similar Documents

Publication Publication Date Title
SG11202005596XA (en) System and method for authenticating off-chain data based on proof verification
GB201806112D0 (en) Computer-implemented system and method
EP3373202C0 (en) Verification method and system
SG11202010352WA (en) Identity verification and account information updating methods and apparatuses
GB201803706D0 (en) Computer-implemented system and method
GB201815816D0 (en) Computer-implemented system and method
EP3035587A4 (en) Hypersphere-based multivariable public key signature/verification system and method
GB201802148D0 (en) Computer-implemented system and method
GB201807835D0 (en) Computer-implemented system and method
GB201800818D0 (en) Computer-implemented system and method
GB201811968D0 (en) Computer-implemented System and Method
GB201811672D0 (en) Computer-implemented system and method
GB201805429D0 (en) Security system and method
SG11202103165YA (en) Computer-implemented system and method including public key combination verification
GB2572068B (en) Signature system and method for multivariable public key
GB201820947D0 (en) Computer-implemented system and method
GB201804479D0 (en) Computer-implemented system and method
EP3514768C0 (en) System and method providing enhanced security ballot image records
ZA202206279B (en) Security system and method
GB201811773D0 (en) Computer-implemented system and method
GB201810981D0 (en) Computer-implemented system and method
SG11202009000YA (en) Secure authentication system and method
GB201905279D0 (en) Computer-implemented security system and method
GB2587404B (en) Encryption and verification method
GB201813863D0 (en) Computer-Implemented system and method