SG11202103412PA - Computer implemented system and method for distributing shares of digitally signed data - Google Patents
Computer implemented system and method for distributing shares of digitally signed dataInfo
- Publication number
- SG11202103412PA SG11202103412PA SG11202103412PA SG11202103412PA SG11202103412PA SG 11202103412P A SG11202103412P A SG 11202103412PA SG 11202103412P A SG11202103412P A SG 11202103412PA SG 11202103412P A SG11202103412P A SG 11202103412PA SG 11202103412P A SG11202103412P A SG 11202103412PA
- Authority
- SG
- Singapore
- Prior art keywords
- computer implemented
- digitally signed
- implemented system
- signed data
- distributing shares
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1817507.5A GB201817507D0 (en) | 2018-10-27 | 2018-10-27 | Computer implemented system and method |
PCT/IB2019/058902 WO2020084418A1 (en) | 2018-10-27 | 2019-10-18 | Computer implemented system and method for distributing shares of digitally signed data |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202103412PA true SG11202103412PA (en) | 2021-05-28 |
Family
ID=64560504
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202103412PA SG11202103412PA (en) | 2018-10-27 | 2019-10-18 | Computer implemented system and method for distributing shares of digitally signed data |
Country Status (9)
Country | Link |
---|---|
US (1) | US11979492B2 (en) |
EP (1) | EP3871365A1 (en) |
JP (1) | JP2022504932A (en) |
KR (1) | KR20210082201A (en) |
CN (1) | CN112930660A (en) |
GB (1) | GB201817507D0 (en) |
SG (1) | SG11202103412PA (en) |
TW (1) | TWI807125B (en) |
WO (1) | WO2020084418A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112532580B (en) * | 2020-10-23 | 2022-09-06 | 暨南大学 | Data transmission method and system based on block chain and proxy re-encryption |
TWI748925B (en) * | 2021-06-09 | 2021-12-01 | 中華電信股份有限公司 | Key exchange system, method for end-to-end encrypted communication and computer readable medium thereof |
GB2609906B (en) * | 2021-08-09 | 2023-12-27 | Nchain Licensing Ag | Generating digital signature shares |
GB2609908B (en) * | 2021-08-09 | 2023-10-18 | Nchain Licensing Ag | Generating Digital signatures |
TWI783804B (en) * | 2021-12-01 | 2022-11-11 | 英屬開曼群島商現代財富控股有限公司 | Shares generation system based on linear integer secret sharing and method thereof |
TWI787094B (en) * | 2022-03-08 | 2022-12-11 | 穎利科研國際事業有限公司 | Information security protection system |
CN115767515B (en) * | 2022-10-28 | 2023-07-14 | 广州声博士声学技术有限公司 | Encryption sharing method and system for base station-free real-time noise big data |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7239701B1 (en) | 2000-05-02 | 2007-07-03 | Murata Machinery Ltd. | Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
US10411897B2 (en) * | 2017-02-17 | 2019-09-10 | Factom, Inc. | Secret sharing via blockchains |
US10320565B2 (en) * | 2017-02-28 | 2019-06-11 | Certicom Corp. | Generating an elliptic curve point in an elliptic curve cryptographic system |
EP3511851A1 (en) * | 2018-01-12 | 2019-07-17 | Siemens Healthcare GmbH | Storing and accessing medical datasets on the blockchain |
-
2018
- 2018-10-27 GB GBGB1817507.5A patent/GB201817507D0/en not_active Ceased
-
2019
- 2019-10-18 SG SG11202103412PA patent/SG11202103412PA/en unknown
- 2019-10-18 KR KR1020217015256A patent/KR20210082201A/en unknown
- 2019-10-18 JP JP2021520548A patent/JP2022504932A/en active Pending
- 2019-10-18 WO PCT/IB2019/058902 patent/WO2020084418A1/en active Application Filing
- 2019-10-18 CN CN201980071178.6A patent/CN112930660A/en active Pending
- 2019-10-18 US US17/288,844 patent/US11979492B2/en active Active
- 2019-10-18 EP EP19794254.3A patent/EP3871365A1/en active Pending
- 2019-10-25 TW TW108138676A patent/TWI807125B/en active
Also Published As
Publication number | Publication date |
---|---|
GB201817507D0 (en) | 2018-12-12 |
JP2022504932A (en) | 2022-01-13 |
KR20210082201A (en) | 2021-07-02 |
CN112930660A (en) | 2021-06-08 |
EP3871365A1 (en) | 2021-09-01 |
TWI807125B (en) | 2023-07-01 |
TW202029693A (en) | 2020-08-01 |
US11979492B2 (en) | 2024-05-07 |
WO2020084418A1 (en) | 2020-04-30 |
US20220006615A1 (en) | 2022-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202103412PA (en) | Computer implemented system and method for distributing shares of digitally signed data | |
GB201805633D0 (en) | Computer implemented method and system | |
EP3732543A4 (en) | Method of providing detailed map data and system therefor | |
ZA202005041B (en) | Computer implemented method and system for obtaining digitally signed data | |
EP3796199A4 (en) | Data management system and data management method | |
PL3602457T3 (en) | System and method for blockchain-based data management | |
GB2567146B (en) | Method and system for secure storage of digital data | |
GB201817506D0 (en) | Computer implemented method and system | |
SG11202006493XA (en) | System architecture and method of processing data therein | |
GB201905348D0 (en) | Computer implemented method and system for encrypting data | |
SG11202104254UA (en) | Methods and systems for interactive data management | |
SG11202010500WA (en) | System and method for accelerating data delivery | |
SG11202003580XA (en) | System and method for data management | |
GB201815396D0 (en) | Computer implemented system and method | |
EP3695372A4 (en) | Asset management system and method | |
EP3877879C0 (en) | Methods and systems of securely transferring data | |
SG10201909996XA (en) | Systems and methods for projecting data trends | |
EP3672138A4 (en) | Data distribution method and distribution server | |
HUE056795T2 (en) | System and method for the protected transmission of data | |
EP3610634A4 (en) | System and method for dynamic management of private data | |
GB201819821D0 (en) | Blockchain data processing system and method of operation thereof | |
GB201804948D0 (en) | Computer implemented system and method | |
GB201901893D0 (en) | Computer implemented system and method | |
GB201705333D0 (en) | System and method for management of confidential data | |
GB201810847D0 (en) | Method and system for integrating data sets |