SG11202103165YA - Computer-implemented system and method including public key combination verification - Google Patents
Computer-implemented system and method including public key combination verificationInfo
- Publication number
- SG11202103165YA SG11202103165YA SG11202103165YA SG11202103165YA SG11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA SG 11202103165Y A SG11202103165Y A SG 11202103165YA
- Authority
- SG
- Singapore
- Prior art keywords
- computer
- public key
- method including
- implemented system
- key combination
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Optimization (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1816936.7A GB201816936D0 (en) | 2018-10-17 | 2018-10-17 | Computer-implemented system and method |
PCT/IB2019/058580 WO2020079534A1 (en) | 2018-10-17 | 2019-10-09 | Computer-implemented system and method including public key combination verification |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202103165YA true SG11202103165YA (en) | 2021-05-28 |
Family
ID=64394914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202103165YA SG11202103165YA (en) | 2018-10-17 | 2019-10-09 | Computer-implemented system and method including public key combination verification |
Country Status (9)
Country | Link |
---|---|
US (1) | US20210344510A1 (en) |
EP (1) | EP3868054B1 (en) |
JP (2) | JP7383017B2 (en) |
KR (1) | KR20210074358A (en) |
CN (1) | CN112970227A (en) |
GB (1) | GB201816936D0 (en) |
SG (1) | SG11202103165YA (en) |
TW (1) | TWI834741B (en) |
WO (1) | WO2020079534A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220094555A1 (en) * | 2020-09-18 | 2022-03-24 | Fujitsu Limited | Validator control for transaction between blockchains |
GB2624202A (en) * | 2022-11-10 | 2024-05-15 | Nchain Licensing Ag | Blockchain transaction |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7602655B2 (en) * | 2006-01-12 | 2009-10-13 | Mediatek Inc. | Embedded system |
JP2008203548A (en) * | 2007-02-20 | 2008-09-04 | Oki Electric Ind Co Ltd | Key generating method using quadric hyperbolic curve group, decoding method, signature verification method, key stream generating method and device |
TWI444028B (en) * | 2011-12-23 | 2014-07-01 | Univ Nat Chiao Tung | Method of using enhanced window-based and method of mutual opposite form for scalar multiplication in elliptic curve cryptography |
CA3013180A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Blockchain-based exchange with tokenisation |
MA44883A (en) * | 2016-05-04 | 2021-03-24 | Algorand Inc | DISTRIBUTED TRANSACTION PROPAGATION AND VERIFICATION SYSTEM |
KR102603069B1 (en) * | 2016-11-19 | 2023-11-15 | 디피니티 스티프텅 | System architecture and data processing methods in system architecture |
CA3051928A1 (en) * | 2016-12-27 | 2018-07-05 | Helder Silvestre Paiva FIGUEIRA | Equivocation augmentation |
GB201705621D0 (en) | 2017-04-07 | 2017-05-24 | Nchain Holdings Ltd | Computer-implemented system and method |
CN108154549A (en) * | 2017-12-25 | 2018-06-12 | 太平洋未来有限公司 | A kind of three dimensional image processing method |
-
2018
- 2018-10-17 GB GBGB1816936.7A patent/GB201816936D0/en not_active Ceased
-
2019
- 2019-10-09 CN CN201980068650.0A patent/CN112970227A/en active Pending
- 2019-10-09 WO PCT/IB2019/058580 patent/WO2020079534A1/en unknown
- 2019-10-09 JP JP2021518541A patent/JP7383017B2/en active Active
- 2019-10-09 EP EP19789761.4A patent/EP3868054B1/en active Active
- 2019-10-09 SG SG11202103165YA patent/SG11202103165YA/en unknown
- 2019-10-09 US US17/285,856 patent/US20210344510A1/en active Pending
- 2019-10-09 KR KR1020217014562A patent/KR20210074358A/en unknown
- 2019-10-15 TW TW108137096A patent/TWI834741B/en active
-
2023
- 2023-11-07 JP JP2023190064A patent/JP2023184657A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
JP7383017B2 (en) | 2023-11-17 |
TW202036344A (en) | 2020-10-01 |
WO2020079534A1 (en) | 2020-04-23 |
GB201816936D0 (en) | 2018-11-28 |
EP3868054B1 (en) | 2024-05-15 |
JP2022504224A (en) | 2022-01-13 |
TWI834741B (en) | 2024-03-11 |
KR20210074358A (en) | 2021-06-21 |
EP3868054A1 (en) | 2021-08-25 |
CN112970227A (en) | 2021-06-15 |
JP2023184657A (en) | 2023-12-28 |
US20210344510A1 (en) | 2021-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202005596XA (en) | System and method for authenticating off-chain data based on proof verification | |
GB201806112D0 (en) | Computer-implemented system and method | |
EP3373202C0 (en) | Verification method and system | |
SG11202010352WA (en) | Identity verification and account information updating methods and apparatuses | |
GB201803706D0 (en) | Computer-implemented system and method | |
GB201815816D0 (en) | Computer-implemented system and method | |
EP3035587A4 (en) | Hypersphere-based multivariable public key signature/verification system and method | |
GB201802148D0 (en) | Computer-implemented system and method | |
GB201807835D0 (en) | Computer-implemented system and method | |
GB201800818D0 (en) | Computer-implemented system and method | |
GB201811968D0 (en) | Computer-implemented System and Method | |
GB201811672D0 (en) | Computer-implemented system and method | |
GB201805429D0 (en) | Security system and method | |
SG11202103165YA (en) | Computer-implemented system and method including public key combination verification | |
GB2572068B (en) | Signature system and method for multivariable public key | |
GB201820947D0 (en) | Computer-implemented system and method | |
GB201804479D0 (en) | Computer-implemented system and method | |
EP3514768C0 (en) | System and method providing enhanced security ballot image records | |
ZA202206279B (en) | Security system and method | |
GB201811773D0 (en) | Computer-implemented system and method | |
GB201810981D0 (en) | Computer-implemented system and method | |
SG11202009000YA (en) | Secure authentication system and method | |
GB201905279D0 (en) | Computer-implemented security system and method | |
GB2587404B (en) | Encryption and verification method | |
GB201813863D0 (en) | Computer-Implemented system and method |