SG11202113362XA - Key recovery using encrypted secret shares - Google Patents
Key recovery using encrypted secret sharesInfo
- Publication number
- SG11202113362XA SG11202113362XA SG11202113362XA SG11202113362XA SG11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA
- Authority
- SG
- Singapore
- Prior art keywords
- key recovery
- encrypted secret
- secret shares
- shares
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962859568P | 2019-06-10 | 2019-06-10 | |
US201962931753P | 2019-11-06 | 2019-11-06 | |
PCT/US2020/035543 WO2020251795A1 (en) | 2019-06-10 | 2020-06-01 | Key recovery using encrypted secret shares |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202113362XA true SG11202113362XA (en) | 2021-12-30 |
Family
ID=73650897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202113362XA SG11202113362XA (en) | 2019-06-10 | 2020-06-01 | Key recovery using encrypted secret shares |
Country Status (6)
Country | Link |
---|---|
US (1) | US11374750B2 (en) |
EP (1) | EP3981103A4 (en) |
JP (1) | JP2022536645A (en) |
KR (1) | KR20220016910A (en) |
SG (1) | SG11202113362XA (en) |
WO (1) | WO2020251795A1 (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019061001A1 (en) * | 2017-09-29 | 2019-04-04 | Peerio Technologies Inc. | Access to secured information |
US11271728B2 (en) * | 2019-12-20 | 2022-03-08 | Fujitsu Limited | Secure key management |
US11870898B2 (en) * | 2020-05-21 | 2024-01-09 | Workday, Inc. | Split keys for wallet recovery |
US11271739B2 (en) * | 2020-06-25 | 2022-03-08 | Digital 14 Llc | Error-correcting key agreement for noisy cryptographic systems |
US11632244B2 (en) * | 2020-09-14 | 2023-04-18 | Paypal, Inc. | Techniques for single round multi-party computation for digital signatures |
CN112491550B (en) * | 2020-12-22 | 2022-05-17 | 湖南科技学院 | Mobile terminal equipment credibility authentication method and system based on Internet of vehicles |
CN112769567B (en) * | 2021-01-19 | 2023-04-07 | 北京枫玉科技有限公司 | Block chain HD private key retrieving method |
US20220271933A1 (en) * | 2021-02-19 | 2022-08-25 | Samsung Electronics Co., Ltd. | System and method for device to device secret backup and recovery |
US11973865B2 (en) * | 2021-03-05 | 2024-04-30 | Michael Heu | Device and method of storing a seed phrase |
CN112926087B (en) * | 2021-03-09 | 2023-05-05 | 南京信息工程大学 | Secret sharing method with verification function and high embedding capacity based on two-dimensional code |
EP4315217A1 (en) * | 2021-03-31 | 2024-02-07 | Jio Platforms Limited | System and method for secure and traceable fund transfer operation through a distributed ledger |
CN113346999B (en) * | 2021-08-09 | 2021-10-26 | 国网浙江省电力有限公司杭州供电公司 | Splitting encryption-based brain central system |
GB202111737D0 (en) * | 2021-08-16 | 2021-09-29 | Blockhouse Tech Limited | Storing cryptographic keys securely |
US20230099755A1 (en) * | 2021-09-24 | 2023-03-30 | Sap Se | Sql extension to key transfer system with authenticity, confidentiality, and integrity |
WO2024004116A1 (en) * | 2022-06-30 | 2024-01-04 | 日本電気株式会社 | Key issuance device, information processing system, method, and computer-readable medium |
US11777727B1 (en) * | 2022-08-29 | 2023-10-03 | Osom Products, Inc. | Distributed digital wallet seed phrase |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5796830A (en) * | 1996-07-29 | 1998-08-18 | International Business Machines Corporation | Interoperable cryptographic key recovery system |
US7181015B2 (en) * | 2001-07-31 | 2007-02-20 | Mcafee, Inc. | Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique |
US8170216B2 (en) | 2008-06-18 | 2012-05-01 | Apple Inc. | Techniques for validating and sharing secrets |
EP2684311A1 (en) * | 2011-03-07 | 2014-01-15 | Security First Corp. | Secure file sharing method and system |
US8731203B2 (en) * | 2012-02-13 | 2014-05-20 | Alephcloud Systems, Inc. | Securing a secret of a user |
US9485096B2 (en) * | 2013-02-06 | 2016-11-01 | Apurva Shrivastava | Encryption / decryption of data with non-persistent, non-shared passkey |
US10354325B1 (en) | 2013-06-28 | 2019-07-16 | Winklevoss Ip, Llc | Computer-generated graphical user interface |
US9768953B2 (en) * | 2015-09-30 | 2017-09-19 | Pure Storage, Inc. | Resharing of a split secret |
US10333705B2 (en) | 2016-04-30 | 2019-06-25 | Civic Technologies, Inc. | Methods and apparatus for providing attestation of information using a centralized or distributed ledger |
US10547592B2 (en) * | 2017-01-19 | 2020-01-28 | Hewlett Packard Enterprise Development Lp | Computing a global sum that preserves privacy of parties in a multi-party environment |
US10263775B2 (en) * | 2017-06-23 | 2019-04-16 | Microsoft Technology Licensing, Llc | Policy-based key recovery |
EP3688922A4 (en) * | 2017-09-27 | 2020-09-09 | Visa International Service Association | Secure shared key establishment for peer to peer communications |
EP4216487A1 (en) * | 2017-10-30 | 2023-07-26 | Visa International Service Association | Multi-party threshold authenticated encryption |
JP7269944B2 (en) | 2018-01-17 | 2023-05-09 | ティーゼロ・アイピー,エルエルシー | A multi-authorization system that uses M out of N keys to generate transaction addresses |
US10084600B1 (en) * | 2018-04-16 | 2018-09-25 | Xage Security, Inc. | Decentralized information protection for confidentiality and tamper-proofing on distributed database |
US11063754B2 (en) * | 2018-05-01 | 2021-07-13 | Huawei Technologies Co., Ltd. | Systems, devices, and methods for hybrid secret sharing |
DE102018111081A1 (en) * | 2018-05-08 | 2019-11-14 | Uniscon Universal Identity Control Gmbh | Method for securing a data exchange in a distributed infrastructure |
KR101954863B1 (en) * | 2018-07-09 | 2019-03-06 | 서울대학교산학협력단 | Online wallet apparatus, and method for generating and verifying online wallet |
US20200052889A1 (en) * | 2018-08-09 | 2020-02-13 | Cyberark Software Ltd. | Secure distributed transmission and recombination of secrets |
KR20210066867A (en) * | 2018-10-12 | 2021-06-07 | 티제로 아이피, 엘엘씨 | An encrypted asset encryption key portion that allows assembly of an asset encryption key using a subset of the encrypted asset encryption key portion. |
-
2020
- 2020-06-01 JP JP2021573170A patent/JP2022536645A/en active Pending
- 2020-06-01 SG SG11202113362XA patent/SG11202113362XA/en unknown
- 2020-06-01 US US16/889,277 patent/US11374750B2/en active Active
- 2020-06-01 WO PCT/US2020/035543 patent/WO2020251795A1/en unknown
- 2020-06-01 KR KR1020217043014A patent/KR20220016910A/en unknown
- 2020-06-01 EP EP20822324.8A patent/EP3981103A4/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20200389306A1 (en) | 2020-12-10 |
WO2020251795A1 (en) | 2020-12-17 |
JP2022536645A (en) | 2022-08-18 |
EP3981103A4 (en) | 2023-06-21 |
KR20220016910A (en) | 2022-02-10 |
US11374750B2 (en) | 2022-06-28 |
EP3981103A1 (en) | 2022-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202113362XA (en) | Key recovery using encrypted secret shares | |
ZA201902554B (en) | Blockchain data protection using homomorphic encryption | |
GB2601928B (en) | Cryptographic architecture for cryptographic permutation | |
EP3545640A4 (en) | Blockchain data protection using homomorphic encryption | |
EP3949265A4 (en) | Verification of identity using a secret key | |
EP3598714A4 (en) | Method, device, and system for encrypting secret key | |
SG11201708750TA (en) | Network system, and methods of encrypting data, decrypting encrypted data in the same | |
ZA202000536B (en) | Security key derivation for handover | |
GB201710329D0 (en) | Progressive key encryption Algorithm | |
EP3676987A4 (en) | Secure key transmission protocol without certificates or pre-shared symmetrical keys | |
GB2570214B (en) | Content encryption and decryption using a custom key | |
EP3371928B8 (en) | Key sequence generation for cryptographic operations | |
EP3096488A4 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
GB202009062D0 (en) | Generating secret shares | |
EP3763075A4 (en) | Key encryption key wrapping | |
EP3704829B8 (en) | Cryptographic key generation system and method | |
IL290283A (en) | Secure out-of-band symmetric encryption key delivery | |
GB201621278D0 (en) | Password-authenticated public key encryption and decryption | |
GB201807257D0 (en) | Cryptographic key distribution | |
GB201802582D0 (en) | Protecting cryptographic key data | |
GB2590239B (en) | Secure operations on encrypted data | |
EP3767874A4 (en) | Decrypting device, encrypting device, and encryption system | |
GB202101118D0 (en) | Cryptographic key management for end-to end communication security | |
GB202301430D0 (en) | Secure secret recovery | |
HUE054442T2 (en) | Symmetric key stream cipher cryptographic method and device |