SG11202103354PA - Continuous space-bounded non-malleable codes from stronger proofs-of-space - Google Patents

Continuous space-bounded non-malleable codes from stronger proofs-of-space

Info

Publication number
SG11202103354PA
SG11202103354PA SG11202103354PA SG11202103354PA SG11202103354PA SG 11202103354P A SG11202103354P A SG 11202103354PA SG 11202103354P A SG11202103354P A SG 11202103354PA SG 11202103354P A SG11202103354P A SG 11202103354PA SG 11202103354P A SG11202103354P A SG 11202103354PA
Authority
SG
Singapore
Prior art keywords
space
proofs
malleable
codes
stronger
Prior art date
Application number
SG11202103354PA
Inventor
Pratyay Mukherjee
Binyi Chen
Yilei Chen
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11202103354PA publication Critical patent/SG11202103354PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/004Countermeasures against attacks on cryptographic mechanisms for fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
SG11202103354PA 2018-10-02 2019-08-07 Continuous space-bounded non-malleable codes from stronger proofs-of-space SG11202103354PA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862740301P 2018-10-02 2018-10-02
US201962851565P 2019-05-22 2019-05-22
PCT/US2019/045562 WO2020072129A1 (en) 2018-10-02 2019-08-07 Continuous space-bounded non-malleable codes from stronger proofs-of-space

Publications (1)

Publication Number Publication Date
SG11202103354PA true SG11202103354PA (en) 2021-04-29

Family

ID=70055827

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202103354PA SG11202103354PA (en) 2018-10-02 2019-08-07 Continuous space-bounded non-malleable codes from stronger proofs-of-space

Country Status (5)

Country Link
US (2) US11212103B1 (en)
EP (1) EP3861671A4 (en)
CN (1) CN112868202B (en)
SG (1) SG11202103354PA (en)
WO (1) WO2020072129A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4009210B1 (en) * 2019-09-03 2024-03-13 Nippon Telegraph And Telephone Corporation Verification device, verification system, verification method, and verification program
US11693733B2 (en) * 2021-01-21 2023-07-04 Kioxia Corporation Soft error detection and correction for data storage devices

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697488B1 (en) * 1998-08-26 2004-02-24 International Business Machines Corporation Practical non-malleable public-key cryptosystem
US7516331B2 (en) 2003-11-26 2009-04-07 International Business Machines Corporation Tamper-resistant trusted java virtual machine and method of using the same
US8281131B2 (en) 2008-08-28 2012-10-02 International Business Machines Corporation Attributes in cryptographic credentials
US8995534B2 (en) 2010-09-20 2015-03-31 Bevara Technologies, Llc Systems and methods for encoding and decoding
US9858208B2 (en) * 2013-03-21 2018-01-02 International Business Machines Corporation System for securing contents of removable memory
US9167207B1 (en) 2013-12-31 2015-10-20 Google Inc. Processing and/or distributing media content associated with at least one parameter related to a memory operation
US10070310B2 (en) 2014-05-08 2018-09-04 Visa International Service Association Method and system for provisioning access data to mobile device
US20170249460A1 (en) 2014-09-23 2017-08-31 The Regents Of The University Of California Provably secure virus detection
JP6267657B2 (en) 2015-01-07 2018-01-24 日本電信電話株式会社 Safety enhancement method, safety enhancement system, safety enhancement device, verification device, and program
EP3304800B1 (en) 2016-04-01 2020-05-06 Nec Corporation Method for providing a space puzzle
EP3532972B1 (en) * 2016-10-31 2022-01-05 Katholieke Universiteit Leuven Authentication method and system
EP3776318B1 (en) 2018-04-10 2024-05-29 Visa International Service Association Tamper-resistant data encoding for mobile devices

Also Published As

Publication number Publication date
US11212103B1 (en) 2021-12-28
CN112868202A (en) 2021-05-28
WO2020072129A8 (en) 2020-06-25
US12052365B2 (en) 2024-07-30
EP3861671A4 (en) 2021-11-24
CN112868202B (en) 2024-05-28
EP3861671A1 (en) 2021-08-11
WO2020072129A1 (en) 2020-04-09
US20220086003A1 (en) 2022-03-17

Similar Documents

Publication Publication Date Title
SG11202103354PA (en) Continuous space-bounded non-malleable codes from stronger proofs-of-space
PL3626317T3 (en) Goal
EP3899160C0 (en) Profile
GB201915890D0 (en) Profile
GB201818449D0 (en) Profile
GB201907249D0 (en) Disclosure
GB201906344D0 (en) Disclosure
GB201903609D0 (en) Disclosure
GB201809933D0 (en) Sprays
GB201821152D0 (en) Disclosure
GB201902072D0 (en) Disclosure
GB201901746D0 (en) Disclosure
GB201820046D0 (en) Disclosure
GB201901379D0 (en) Disclosure
GB201819733D0 (en) Disclosure
GB201901225D0 (en) Disclosure
GB201901088D0 (en) Disclosure
GB201901004D0 (en) Disclosure
GB201819377D0 (en) Disclosure
GB201900897D0 (en) Disclosure
GB201819219D0 (en) Disclosure
GB201900768D0 (en) Disclosure
GB201900637D0 (en) Disclosure
GB201900454D0 (en) Disclosure
GB201818764D0 (en) Disclosure